Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Microsoft > GitHub Administrator > GH-500

GH-500 GitHub Advanced Security Exam Question and Answers

Question # 4

Which key is required in the update settings of the Dependabot configuration file?

A.

rebase-strategy

B.

commit-message

C.

assignees

D.

package-ecosystem

Full Access
Question # 5

In a private repository, what minimum requirements does GitHub need to generate a dependency graph? (Each answer presents part of the solution. Choose two.)​

A.

Read-only access to all the repository's files

B.

Dependency graph enabled at the organization level for all new private repositories

C.

Write access to the dependency manifest and lock files for an enterprise

D.

Read-only access to the dependency manifest and lock files for a repository​

Full Access
Question # 6

Why should you dismiss a code scanning alert?

A.

If you fix the code that triggered the alert

B.

To prevent developers from introducing new problems

C.

If it includes an error in code that is used only for testing

D.

If there is a production error in your code

Full Access
Question # 7

What step is required to run a SARIF-compatible (Static Analysis Results Interchange Format) tool on GitHub Actions?​

A.

Update the workflow to include a final step that uploads the results.

B.

By default, the CodeQL runner automatically uploads results to GitHub on completion.

C.

The CodeQL action uploads the SARIF file automatically when it completes analysis.

D.

Use the CLI to upload results to GitHub.​

Full Access
Question # 8

What is required to trigger code scanning on a specified branch?

A.

The repository must be private.

B.

Secret scanning must be enabled on the repository.

C.

Developers must actively maintain the repository.

D.

The workflow file must exist in that branch.

Full Access
Question # 9

Which of the following information can be found in a repository's Security tab?

A.

Number of alerts per GHAS feature

B.

Two-factor authentication (2FA) options

C.

Access management

D.

GHAS settings

Full Access
Question # 10

Which of the following Watch settings could you use to get Dependabot alert notifications? (Each answer presents part of the solution. Choose two.)

A.

The Custom setting

B.

The Participating and @mentions setting

C.

The All Activity setting

D.

The Ignore setting

Full Access
Question # 11

As a contributor, you discovered a vulnerability in a repository. Where should you look for the instructions on how to report the vulnerability?

A.

support.md

B.

readme.md

C.

contributing.md

D.

security.md

Full Access
Question # 12

What do you need to do before you can define a custom pattern for a repository?​

A.

Provide a regular expression for the format of your secret pattern.

B.

Add a secret scanning custom pattern.

C.

Enable secret scanning on the repository.

D.

Provide match requirements for the secret format.​

Stack Overflow

Full Access
Question # 13

Where in the repository can you give additional users access to secret scanning alerts?

A.

Security

B.

Settings

C.

Secrets

D.

Insights

Full Access
Question # 14

Which of the following is the best way to prevent developers from adding secrets to the repository?

A.

Create a CODEOWNERS file

B.

Make the repository public

C.

Configure a security manager

D.

Enable push protection

Full Access
Question # 15

Which of the following statements most accurately describes push protection for secret scanning custom patterns?​

A.

Push protection must be enabled for all, or none, of a repository's custom patterns.

B.

Push protection is an opt-in experience for each custom pattern.

C.

Push protection is not available for custom patterns.

D.

Push protection is enabled by default for new custom patterns.​

Full Access
Question # 16

Which patterns are secret scanning validity checks available to?

A.

High entropy strings

B.

Custom patterns

C.

Partner patterns

D.

Push protection patterns

Full Access
Question # 17

What YAML syntax do you use to exclude certain files from secret scanning?

A.

decrypt_secret.sh

B.

paths-ignore:

C.

branches-ignore:

D.

secret scanning.yml

Full Access
Question # 18

The autobuild step in the CodeQL workflow has failed. What should you do?

A.

Remove specific build steps.

B.

Compile the source code.

C.

Remove the autobuild step from your code scanning workflow and add specific build steps.

D.

Use CodeQL, which implicitly detects the supported languages in your code base.

Full Access
Question # 19

Assuming that notification and alert recipients are not customized, what does GitHub do when it identifies a vulnerable dependency in a repository where Dependabot alerts are enabled? (Each answer presents part of the solution. Choose two.)​

A.

It generates a Dependabot alert and displays it on the Security tab for the repository.

B.

It notifies the repository administrators about the new alert.

C.

It generates Dependabot alerts by default for all private repositories.

D.

It consults with a security service and conducts a thorough vulnerability review.​

Full Access
Question # 20

Which of the following options would close a Dependabot alert?

A.

Creating a pull request to resolve the vulnerability that will be approved and merged

B.

Viewing the Dependabot alert on the Dependabot alerts tab of your repository

C.

Viewing the dependency graph

D.

Leaving the repository in its current state

Full Access
Question # 21

Which details do you have to provide to create a custom pattern for secret scanning? (Each answer presents part of the solution. Choose two.)

A.

The secret format

B.

The name of the pattern

C.

A list of repositories to scan

D.

Additional match requirements for the secret format

Full Access
Question # 22

Which of the following features helps to prioritize secret scanning alerts that present an immediate risk?

A.

Non-provider patterns

B.

Push protection

C.

Custom pattern dry runs

D.

Secret validation

Full Access