Github Advanced Security
Github Advanced Security
om
GitHub GitHub-Advanced-Security Exam Question &
Answers
.c
GitHub Advanced Security GHAS Exam Exam
ps
m
du
am
ex
id
al
.v
w
w
// w
s:
tp
ht
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 2/69
Product Questions: 75
Version: 4.0
om
.c
ps
m
du
Question: 1
am
– [Configure and Use Code Scanning]
ex
After investigating a code scanning alert related to injection, you determine that the input is properly
id
Answer: D
Explanation:
When you identify that a code scanning alert is a false positive—such as when your code uses a
custom sanitization method not recognized by the analysis—you should dismiss the alert with the
reason "false positive." This action helps improve the accuracy of future analyses and maintains the
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 3/69
"If you dismiss a CodeQL alert as a false positive result, for example because the code uses a
sanitization library that isn't supported, consider contributing to the CodeQL repository and
improving the analysis."
By dismissing the alert appropriately, you ensure that your codebase's security alerts remain
actionable and relevant.
om
Question: 2
.c
ps
– [Configure and Use Dependency Management]
m
When does Dependabot alert you of a vulnerability in your software development process?
du
am
A. When a pull request adding a vulnerable dependency is opened
ex
Answer: B
// w
s:
Explanation:
tp
ht
Dependabot alerts are generated as soon as GitHub detects a known vulnerability in one of your
dependencies. GitHub does this by analyzing your repository’s dependency graph and matching it
against vulnerabilities listed in the GitHub Advisory Database. Once a match is found, the system
raises an alert automatically without waiting for a PR or manual action.
This allows organizations to proactively mitigate vulnerabilities as early as possible, based on real-
time detection.
Reference: GitHub Docs – About Dependabot alerts; Managing alerts in GitHub Dependabot
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 4/69
Question: 3
Which of the following is the most complete method for Dependabot to find vulnerabilities in third-
party dependencies?
om
A. Dependabot reviews manifest files in the repository
.c
B. CodeQL analyzes the code and raises vulnerabilities in third-party dependencies
ps
C. A dependency graph is created, and Dependabot compares the graph to the GitHub Advisory
database
m
du
D. The build tool finds the vulnerable dependencies and calls the Dependabot API
am
Answer: C
ex
id
Explanation:
al
.v
w
Dependabot builds a dependency graph by analyzing package manifests and lockfiles in your
w
repository. This graph includes both direct and transitive dependencies. It then compares this graph
w
against the GitHub Advisory Database, which includes curated, security-reviewed advisories.
//
s:
This method provides a comprehensive and automated way to discover all known vulnerabilities
across your dependency tree.
tp
ht
Reference: GitHub Docs – About the dependency graph; About Dependabot alerts
Question: 4
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 5/69
A. An automatic detection of security vulnerabilities and coding errors in new or modified code
C. A file in a GitHub repository that provides instructions to users about how to report a security
vulnerability
Answer: C
om
.c
Explanation:
ps
m
A security policy is defined by a SECURITY.md file in the root of your repository or .github/ directory.
du
This file informs contributors and security researchers about how to responsibly report
vulnerabilities. It improves your project’s transparency and ensures timely communication and
am
mitigation of any reported issues.
ex
Adding this file also enables a “Report a vulnerability” button in the repository’s Security tab.
id
Question: 5
w
w
w
As a repository owner, you want to receive specific notifications, including security alerts, for an
individual repository. Which repository notification setting should you use?
tp
ht
A. Ignore
C. All Activity
D. Custom
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 6/69
Answer: D
Explanation:
Using the Custom setting allows you to subscribe to specific event types, such as Dependabot alerts
or vulnerability notifications, without being overwhelmed by all repository activity. This is essential
for repository maintainers who need fine-grained control over what kinds of events trigger
notifications.
om
This setting is configurable per repository and allows users to stay aware of critical issues while
minimizing notification noise.
.c
ps
Reference: GitHub Docs – Configuring notifications; Managing security alerts
m
du
Question: 6
am
– [Configure GitHub Advanced Security Tools in GitHub Enterprise]
ex
id
al
Which of the following Watch settings could you use to get Dependabot alert notifications? (Each
answer presents part of the solution. Choose two.)
.v
w
w
// w
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 7/69
Answer: A, C
Explanation:
om
To receive Dependabot alert notifications for a repository, you can utilize the following Watch
.c
settings:
ps
m
Custom setting: Allows you to tailor your notifications, enabling you to subscribe specifically to
du
security alerts, including those from Dependabot.
am
All Activity setting: Subscribes you to all notifications for the repository, encompassing issues, pull
ex
The Participating and @mentions setting limits notifications to conversations you're directly involved
in or mentioned, which may not include security alerts. The Ignore setting unsubscribes you from all
w
GitHub Docs
//
+1
s:
tp
GitHub Docs
ht
+1
Question: 7
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 8/69
Which Dependabot configuration fields are required? (Each answer presents part of the solution.
Choose three.)
A. directory
om
.c
B. package-ecosystem
ps
m
C. milestone
du
am
D. schedule.interval
ex
id
E. allow
al
.v
w
w
w
Answer: A, B, D
//
s:
Explanation:
tp
ht
When configuring Dependabot via the dependabot.yml file, the following fields are mandatory for
each update configuration:
directory: Specifies the location of the package manifest within the repository. This tells Dependabot
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 9/69
package-ecosystem: Indicates the type of package manager (e.g., npm, pip, maven) used in the
specified directory.
schedule.interval: Defines how frequently Dependabot checks for updates (e.g., daily, weekly). This
ensures regular scanning for outdated or vulnerable dependencies.
om
The milestone field is optional and used for associating pull requests with milestones. The allow field
.c
is also optional and used to specify which dependencies to update.
ps
GitLab
m
du
am
Reference: GitHub Docs – Configuration options for dependency updates
ex
Question: 8
id
al
.v
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 10/69
Answer: D
Explanation:
For code scanning to be triggered on a specific branch, the branch must contain the appropriate
om
workflow file, typically located in the .github/workflows directory. This YAML file defines the code
scanning configuration and specifies the events that trigger the scan (e.g., push, pull_request).
.c
ps
Without the workflow file in the branch, GitHub Actions will not execute the code scanning process
m
for that branch. The repository's visibility (private or public), the status of secret scanning, or the
du
activity level of developers do not directly influence the triggering of code scanning.
am
ex
Question: 9
.v
w
As a contributor, you discovered a vulnerability in a repository. Where should you look for the
//
A. support.md
B. readme.md
C. contributing.md
D. security.md
Answer: D
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 11/69
Explanation:
The correct place to look is the SECURITY.md file. This file provides contributors and security
researchers with instructions on how to responsibly report vulnerabilities. It may include contact
methods, preferred communication channels (e.g., security team email), and disclosure guidelines.
This file is considered a GitHub best practice and, when present, activates a “Report a vulnerability”
button in the repository’s Security tab.
om
.c
Question: 10
ps
m
– [Configure and Use Dependency Management]
du
Assuming there is no custom Dependabot behavior configured, where possible, what does
am
Dependabot do after sending an alert about a vulnerable dependency in a repository?
ex
id
A. Creates a pull request to upgrade the vulnerable dependency to the minimum possible secure
al
version
.v
B. Scans repositories for vulnerable dependencies on a schedule and adds those files to a manifest
w
C. Constructs a graph of all the repository's dependencies and public dependents for the default
w
branch
// w
D. Scans any push to all branches and generates an alert for each vulnerable repository
s:
tp
ht
Answer: A
Explanation:
After generating an alert for a vulnerable dependency, Dependabot automatically attempts to create
a pull request to upgrade that dependency to the minimum required secure version—if a fix is
available and compatible with your project.
This automated PR helps teams fix vulnerabilities quickly with minimal manual intervention. You can
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 12/69
also configure update behaviors using dependabot.yml, but in the default state, PR creation is
automatic.
Reference: GitHub Docs – About Dependabot alerts; About Dependabot security updates
Question: 11
om
What is the first step you should take to fix an alert in secret scanning?
.c
ps
A. Archive the repository.
m
B. Update your dependencies.
du
C. Revoke the alert if the secret is still valid.
am
D. Remove the secret in a commit to the main branch.
ex
id
Answer: C
al
.v
Explanation:
w
w
w
The first step when you receive a secret scanning alert is to revoke the secret if it is still valid. This
//
ensures the secret can no longer be used maliciously. Only after revoking it should you proceed to
s:
remove it from the code history and apply other mitigation steps.
tp
Simply deleting the secret from the code does not remove the risk if it hasn’t been revoked —
ht
Reference: GitHub Docs – About secret scanning alerts; Remediating a secret scanning alert
Question: 12
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 13/69
A dependency has a known vulnerability. What does the warning message include?
om
Answer: D
.c
ps
Explanation:
m
du
When a vulnerability is detected, GitHub shows a warning that includes a brief description of the
am
vulnerability. This typically covers the name of the CVE (if available), a short summary of the issue,
severity level, and potential impact. The message also links to additional advisory data from the
ex
This helps developers understand the context and urgency of the vulnerability before applying the
al
fix.
.v
Reference: GitHub Docs – About Dependabot alerts; Reviewing and managing alerts
w
w
w
Question: 13
//
s:
tp
Assuming that notification and alert recipients are not customized, what does GitHub do when it
identifies a vulnerable dependency in a repository where Dependabot alerts are enabled? (Each
answer presents part of the solution. Choose two.)
A. It generates a Dependabot alert and displays it on the Security tab for the repository.
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 14/69
om
.c
ps
Answer: A, B
m
du
Explanation: am
Comprehensive and Detailed Explanation:
ex
id
When GitHub identifies a vulnerable dependency in a repository with Dependabot alerts enabled, it
al
Generates a Dependabot alert: The alert is displayed on the repository's Security tab, providing
w
Notifies repository maintainers: By default, GitHub notifies users with write, maintain, or admin
ht
GitHub Docs
These actions ensure that responsible parties are informed promptly to address the vulnerability.
Reference: GitHub Docs – About Dependabot alerts; Configuring notifications for Dependabot alerts
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 15/69
Question: 14
What do you need to do before you can define a custom pattern for a repository?
om
.c
ps
A. Provide a regular expression for the format of your secret pattern.
m
du
B. Add a secret scanning custom pattern.
Stack Overflow
id
al
.v
w
Answer: C
w
// w
Explanation:
s:
tp
ht
Before defining a custom pattern for secret scanning in a repository, you must enable secret scanning
for that repository. Secret scanning must be active to utilize custom patterns, which allow you to
define specific formats (using regular expressions) for secrets unique to your organization.
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 16/69
Once secret scanning is enabled, you can add custom patterns to detect and prevent the exposure of
sensitive information tailored to your needs.
Question: 15
om
.c
– [Configure and Use Dependency Management]
ps
m
Assuming that no custom Dependabot behavior is configured, who has the ability to merge a pull
du
request created via Dependabot security updates?
am
ex
A. An enterprise administrator
id
al
Answer: B
ht
Explanation:
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 17/69
By default, users with write access to a repository have the ability to merge pull requests, including
those created by Dependabot for security updates. This access level allows contributors to manage
and integrate changes, ensuring that vulnerabilities are addressed promptly.
Users with only read access cannot merge pull requests, and enterprise administrators do not
automatically have merge rights unless they have write or higher permissions on the specific
repository.
om
Reference: GitHub Docs – About Dependabot security updates; Configuring Dependabot security
updates
.c
ps
m
du
Question: 16
am
– [Configure and Use Code Scanning]
ex
id
al
D. Users who have the security manager role within the repository
Answer: C
Explanation:
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 18/69
In private repositories, users with write access can fix code scanning alerts. They can do this by
committing changes that address the issues identified by the code scanning tools. This level of access
ensures that only trusted contributors can modify the code to resolve potential security
vulnerabilities.
om
GitHub Docs
.c
ps
Users with read or triage roles do not have the necessary permissions to make code changes, and the
m
security manager role is primarily focused on managing security settings rather than directly
du
modifying code.
am
ex
GitHub Docs
al
.v
Question: 17
w
w
w
C. Access management
D. GHAS settings
Answer: A
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 19/69
Explanation:
The Security tab in a GitHub repository provides a central location for viewing security-related
information, especially when GitHub Advanced Security is enabled. The following can be accessed:
Code scanning
om
Secret scanning
.c
Dependency (Dependabot) alerts
ps
Summary and visibility into open, closed, and dismissed security issues.
m
It does not show 2FA options, access control settings, or configuration panels for GHAS itself. Those
du
belong to account or organization-level settings.
am
Reference: GitHub Docs – Managing security and analysis settings for your repository
ex
id
Question: 18
al
.v
How many alerts are created when two instances of the same secret value are in the same
repository?
// w
s:
tp
A. 1
ht
B. 2
C. 3
D. 4
Answer: A
Explanation:
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 20/69
When multiple instances of the same secret value appear in a repository, only one alert is generated.
Secret scanning works by identifying exposed credentials and token patterns, and it groups identical
matches into a single alert to reduce noise and avoid duplication.
This makes triaging easier and helps teams focus on remediating the actual exposed credential
rather than reviewing multiple redundant alerts.
om
Question: 19
.c
ps
– [Configure and Use Secret Scanning]
m
What happens when you enable secret scanning on a private repository?
du
am
A. Repository administrators can view Dependabot alerts.
ex
Answer: C
// w
s:
Explanation:
tp
ht
When secret scanning is enabled on a private repository, GitHub performs a read-only analysis of the
repository's contents. This includes the entire Git history and files to identify strings that match
known secret patterns or custom-defined patterns.
GitHub does not alter the repository, and enabling secret scanning does not automatically enable
code scanning or dependency review — each must be configured separately.
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 21/69
Question: 20
You have enabled security updates for a repository. When does GitHub mark a Dependabot alert as
resolved for that repository?
om
B. When you dismiss the Dependabot alert
.c
C. When the pull request checks are successful
ps
D. When you merge a pull request that contains a security update
m
du Answer: D
am
ex
Explanation:
id
al
A Dependabot alert is marked as resolved only after the related pull request is merged into the
.v
repository. This indicates that the vulnerable dependency has been officially replaced with a secure
w
Simply generating a PR or passing checks does not change the alert status; merging is the key step.
w
Reference: GitHub Docs – About Dependabot security updates; Managing Dependabot alerts
//
s:
tp
Question: 21
ht
How would you build your code within the CodeQL analysis workflow? (Each answer presents a
complete solution. Choose two.)
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 22/69
C. Ignore paths.
om
D. Implement custom build steps.
.c
ps
m
E. Use jobs.analyze.runs-on.
du
am
F. Use CodeQL's autobuild action.
ex
id
al
Answer: D, F
.v
w
Explanation:
w
// w
s:
tp
When setting up CodeQL analysis for compiled languages, there are two primary methods to build
your code:
GitHub Docs
Autobuild: CodeQL attempts to automatically build your codebase using the most likely build
method. This is suitable for standard build processes.
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 23/69
GitHub Docs
Custom Build Steps: For complex or non-standard build processes, you can implement custom build
steps by specifying explicit build commands in your workflow. This provides greater control over the
build process.
GitHub Docs
om
The init action initializes the CodeQL analysis but does not build the code. The jobs.analyze.runs-on
specifies the operating system for the runner but is not directly related to building the code.
.c
Uploading compiled binaries is not a method supported by CodeQL for analysis.
ps
m
Reference: GitHub Docs – CodeQL code scanning for compiled languages
du
am
ex
Question: 22
id
al
Which of the following workflow events would trigger a dependency review? (Each answer presents
w
A. pull_request
B. workflow_dispatch
C. trigger
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 24/69
D. commit
Answer: A, B
Explanation:
om
Comprehensive and Detailed Explanation:
.c
ps
Dependency review is triggered by specific events in GitHub workflows:
m
du
pull_request: When a pull request is opened, synchronized, or reopened, GitHub can analyze the
am
changes in dependencies and provide a dependency review.
ex
id
workflow_dispatch: This manual trigger allows users to initiate workflows, including those that
al
The trigger and commit options are not recognized GitHub Actions events and would not initiate a
dependency review.
// w
s:
tp
Question: 23
You are a maintainer of a repository and Dependabot notifies you of a vulnerability. Where could the
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 25/69
vulnerability have been disclosed? (Each answer presents part of the solution. Choose two.)
om
C. In security advisories reported on GitHub
.c
ps
m
D. In manifest and lock files
du
am
ex
Answer: A, C
id
Explanation:
al
.v
w
GitHub Docs
Security Advisories Reported on GitHub: GitHub allows maintainers and security researchers to
report and discuss vulnerabilities, which are then included in the advisory database.
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 26/69
The dependency graph and manifest/lock files are tools used by GitHub to determine which
dependencies are present in a repository but are not sources of vulnerability disclosures themselves.
Question: 24
om
– [Configure and Use Secret Scanning]
.c
ps
Which of the following statements most accurately describes push protection for secret scanning
custom patterns?
m
du
am
A. Push protection must be enabled for all, or none, of a repository's custom patterns.
ex
Answer: B
tp
ht
Explanation:
Push protection for secret scanning custom patterns is an opt-in feature. This means that for each
custom pattern defined in a repository, maintainers can choose to enable or disable push protection
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 27/69
individually. This provides flexibility, allowing teams to enforce push protection on sensitive patterns
while leaving it disabled for others.
Reference: GitHub Docs – Working with push protection from the command line
Question: 25
om
– [Use Code Scanning with CodeQL]
.c
ps
When using the advanced CodeQL code scanning setup, what is the name of the workflow file?
m
du
am
A. codeql-config.yml
ex
B. codeql-scan.yml
id
C. codeql-workflow.yml
al
D. codeql-analysis.yml
.v
w
w
// w
Answer: D
s:
tp
Explanation:
ht
In the advanced setup for CodeQL code scanning, GitHub generates a workflow file named codeql-
analysis.yml. This file is located in the .github/workflows directory of your repository. It defines the
configuration for the CodeQL analysis, including the languages to analyze, the events that trigger the
analysis, and the steps to perform during the workflow.
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 28/69
Reference: GitHub Docs – Customizing your advanced setup for code scanning
Question: 26
om
.c
Which of the following statements best describes secret scanning push protection?
ps
m
du
A. Commits that contain secrets are blocked before code is added to the repository.
am
B. Secret scanning alerts must be closed before a branch can be merged into the repository.
ex
Answer: A
//
s:
Explanation:
tp
ht
Secret scanning push protection is a proactive feature that scans for secrets in your code during the
push process. If a secret is detected, the push is blocked, preventing the secret from being added to
the repository. This helps prevent accidental exposure of sensitive information.
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 29/69
GitHub Docs
Question: 27
om
– [Configure and Use Dependency Management]
.c
ps
In a private repository, what minimum requirements does GitHub need to generate a dependency
m
graph? (Each answer presents part of the solution. Choose two.)
du
am
ex
B. Dependency graph enabled at the organization level for all new private repositories
.v
w
w
C. Write access to the dependency manifest and lock files for an enterprise
// w
s:
D. Read-only access to the dependency manifest and lock files for a repository
tp
ht
Answer: B, D
Explanation:
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 30/69
Dependency graph enabled: The repository must have the dependency graph feature enabled. This
can be configured at the organization level to apply to all new private repositories.
om
Access to manifest and lock files: GitHub needs read-only access to the repository's dependency
manifest and lock files (e.g., package.json, requirements.txt) to identify and map dependencies.
.c
ps
m
Reference: GitHub Docs – About the dependency graph
du
am
Question: 28
ex
GitHub
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 31/69
Answer: B
Explanation:
om
A CodeQL database contains a representation of your codebase, including the build of the code and
.c
extracted data. This database is used to run CodeQL queries to analyze your code for potential
vulnerabilities and errors.
ps
GitHub Docs
m
du
am
Reference: GitHub Docs – Preparing your code for CodeQL analysis
ex
Question: 29
id
al
.v
When using CodeQL, how does extraction for compiled languages work?
w
// w
Answer: C
Explanation:
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 32/69
For compiled languages, CodeQL performs extraction by monitoring the normal build process. This
means it watches your usual build commands (like make, javac, or dotnet build) and extracts the
relevant data from the actual build steps being executed. CodeQL uses this information to construct a
semantic database of the application.
This approach ensures that CodeQL captures a precise, real-world representation of the code and its
behavior as it is compiled, including platform-specific configurations or conditional logic used during
build.
om
Question: 30
.c
ps
– [Configure and Use Secret Scanning]
m
du
Which of the following features helps to prioritize secret scanning alerts that present an immediate
risk?
am
ex
A. Non-provider patterns
id
B. Push protection
al
D. Secret validation
w
// w
Answer: D
s:
tp
Explanation:
ht
Secret validation checks whether a secret found in your repository is still valid and active with the
issuing provider (e.g., AWS, GitHub, Stripe). If a secret is confirmed to be active, the alert is marked
as verified, which means it's considered a high-priority issue because it presents an immediate
security risk.
This helps teams respond faster to valid, exploitable secrets rather than wasting time on expired or
fake tokens.
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 33/69
Question: 31
om
A. Change the repository visibility to Internal
.c
B. Close other secret scanning alerts
ps
C. Specify additional match criteria
m
du
D. Enable secret scanning am
Answer: D
ex
id
Explanation:
al
.v
w
You must enable secret scanning before defining custom patterns. Secret scanning provides the
w
foundational capability for detecting exposed credentials, and custom patterns build upon that by
w
allowing organizations to specify their own regex-based patterns for secrets unique to their
environment.
//
s:
Without enabling secret scanning, GitHub will not process or apply custom patterns.
tp
Question: 32
Where can you use CodeQL analysis for code scanning? (Each answer presents part of the solution.
Choose two.)
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 34/69
B. In a workflow
om
Answer: B, C
.c
Explanation:
ps
m
du
In a workflow: GitHub Actions workflows are the most common place for CodeQL code scanning. The
codeql-analysis.yml defines how the analysis runs and when it triggers.
am
In an external CI system: GitHub allows you to run CodeQL analysis outside of GitHub Actions. Once
complete, the results can be uploaded using the upload-sarif action to make alerts visible in the
ex
repository.
id
You cannot run or trigger analysis from third-party repositories directly, and the Files changed tab in
al
Question: 33
//
s:
tp
Where can you view code scanning results from CodeQL analysis?
B. A CodeQL database
D. At Security advisories
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 35/69
Answer: A
Explanation:
All results from CodeQL analysis appear under the repository’s code scanning alerts tab. This section
is part of the Security tab and provides a list of all current, fixed, and dismissed alerts found by
CodeQL.
om
A CodeQL database is used internally during scanning but does not display results. Query packs
.c
contain rules, not results. Security advisories are for published vulnerabilities, not per-repo findings.
ps
Reference: GitHub Docs – Viewing code scanning alerts
m
Question: 34 du
am
ex
A. .yml
w
B. .ql
w
C. .qll
//
s:
D. .qls
tp
ht
Answer: D
Explanation:
Query suite definitions in CodeQL are stored using the .qls file extension. A query suite defines a
collection of queries to be run during an analysis and allows for grouping them based on categories
like language, security relevance, or custom filters.
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 36/69
In contrast:
om
Question: 35
.c
– [Configure GitHub Advanced Security Tools in GitHub Enterprise]
ps
What role is required to change a repository's code scanning severity threshold that fails a pull
m
request status check?
du
am
A. Maintain
ex
B. Write
id
C. Triage
al
D. Admin
.v
w
w
Answer: D
// w
s:
Explanation:
tp
ht
To change the threshold that defines whether a pull request fails due to code scanning alerts (such as
blocking merges based on severity), the user must have Admin access on the repository. This is
because modifying these settings falls under repository configuration privileges.
Users with Write, Maintain, or Triage roles do not have the required access to modify rulesets or
status check policies.
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 37/69
Question: 36
When configuring code scanning with CodeQL, what are your options for specifying additional
queries? (Each answer presents part of the solution. Choose two.)
A. Packs
om
B. github/codeql
.c
C. Scope
ps
D. Queries
m
du Answer: AD
am
ex
Explanation:
id
al
You can customize CodeQL scanning by including additional query packs or by specifying individual
.v
queries:
w
Packs: These are reusable collections of CodeQL queries bundled into a single package.
w
w
Queries: You can point to specific files or directories containing .ql queries to include in the analysis.
//
github/codeql refers to a pack by name but is not a method or field. Scope is not a valid field used for
s:
Question: 37
What step is required to run a SARIF-compatible (Static Analysis Results Interchange Format) tool on
GitHub Actions?
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 38/69
A. Update the workflow to include a final step that uploads the results.
C. The CodeQL action uploads the SARIF file automatically when it completes analysis.
om
Answer: A
.c
Explanation:
ps
m
du
When using a SARIF-compatible tool within GitHub Actions, it's necessary to explicitly add a step in
your workflow to upload the analysis results. This is typically done using the upload-sarif action,
am
which takes the SARIF file generated by your tool and uploads it to GitHub for processing and display
in the Security tab. Without this step, the results won't be available in GitHub's code scanning
ex
interface.
id
Question: 38
// w
s:
You are managing code scanning alerts for your repository. You receive an alert highlighting a
ht
problem with data flow. What do you click for additional context on the alert?
A. Show paths
B. Security
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 39/69
Answer: A
Explanation:
When dealing with a data flow issue in a code scanning alert, clicking on "Show paths" provides a
detailed view of the data's journey through the code. This includes the source of the data, the path it
takes, and where it ends up (the sink). This information is crucial for understanding how untrusted
data might reach sensitive parts of your application and helps in identifying where to implement
om
proper validation or sanitization.
Reference: GitHub Docs – Assessing code scanning alerts for your repositoryGitHub Docs+1GitHub
.c
Docs+1
ps
m
du
am
Question: 39
ex
D. External services.
tp
ht
Answer: C
Explanation:
Secret scanning is a feature provided by GitHub that scans the contents of your GitHub repositories
for known types of secrets, such as API keys and tokens. It operates within the GitHub environment
and does not scan external systems, services, or repositories outside of GitHub. Its primary function
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 40/69
is to prevent the accidental exposure of sensitive information within your GitHub-hosted code.
Question: 40
om
Which of the following formats are used to describe a Dependabot alert? (Each answer presents a
.c
complete solution. Choose two.)
ps
m
A. Common Weakness Enumeration (CWE)
du
B. Exploit Prediction Scoring System (EPSS)
am
C. Common Vulnerabilities and Exposures (CVE)
ex
Answer: A, C
.v
w
w
Explanation:
// w
s:
CVE (Common Vulnerabilities and Exposures): A widely recognized identifier for publicly known
ht
cybersecurity vulnerabilities.
CWE (Common Weakness Enumeration): A category system for software weaknesses and
vulnerabilities.
These identifiers help developers understand the nature of the vulnerabilities and facilitate the
search for more information or remediation strategies.
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 41/69
Question: 41
What kind of repository permissions do you need to request a Common Vulnerabilities and
Exposures (CVE) identification number for a security advisory?
om
A. Maintain
.c
B. Admin
ps
C. Triage
m
D. Write
du
am
Answer: B
ex
id
Explanation:
al
.v
Requesting a CVE ID for a security advisory in a GitHub repository requires Admin permissions. This
w
level of access is necessary because it involves managing sensitive security information and
w
coordinating with external entities to assign a CVE, which is a formal process that can impact the
w
Question: 42
As a developer with write access, you navigate to a code scanning alert in your repository. When will
GitHub close this alert?
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 42/69
B. When you use data-flow analysis to find potential security issues in code
C. After you find the code and click the alert within the pull request
D. After you fix the code by committing within the pull request
Answer: D
Explanation:
om
.c
GitHub automatically closes a code scanning alert when the vulnerable code is fixed in the same
ps
branch where the alert was generated, usually via a commit inside a pull request. Simply clicking or
triaging an alert does not resolve it. The alert is re-evaluated after each push to the branch, and if the
m
issue no longer exists, it is marked as resolved.
Question: 43
id
al
Which details do you have to provide to create a custom pattern for secret scanning? (Each answer
presents part of the solution. Choose two.)
w
// w
s:
Answer: AB
Explanation:
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 43/69
When defining a custom pattern for secret scanning, two key fields are required:
Secret format: A regular expression that defines what the secret looks like (e.g., token format)
You can optionally specify additional match requirements (like required context keywords), but
they’re not mandatory. Listing repositories is also not part of the required fields during pattern
creation.
om
Reference: GitHub Docs – Defining Custom Patterns for Secret Scanning
.c
ps
Question: 44
m
du
– [Configure and Use Dependency Management]
am
Assuming that notification settings and Dependabot alert recipients have not been customized,
which user account setting should you use to get an alert when a vulnerability is detected in one of
ex
your repositories?
id
al
Answer: C
ht
Explanation:
To ensure you're notified whenever a vulnerability is detected via Dependabot, you must enable
alerts for Dependabot in your personal notification settings. This applies to both new and existing
repositories. It ensures you get timely alerts about security vulnerabilities.
The dependency graph must be enabled for scanning, but does not send alerts itself.
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 44/69
Question: 45
Which of the following benefits do code scanning, secret scanning, and dependency review provide?
om
A. Search for potential security vulnerabilities, detect secrets, and show the full impact of changes to
.c
dependencies
ps
B. Confidentially report security vulnerabilities and privately discuss and fix security vulnerabilities in
your repository's code
m
du
C. View alerts about dependencies that are known to contain security vulnerabilities
am
D. Automatically raise pull requests, which reduces your exposure to older versions of dependencies
ex
Answer: A
id
al
.v
Explanation:
w
w
w
Dependency review shows the impact of package changes during a pull request
Together, they give developers actionable insight into risk and coverage throughout the SDLC.
Question: 46
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 45/69
Assuming security and analysis features are not configured at the repository, organization, or
enterprise level, secret scanning is enabled on:
A. Public repositories
D. Private repositories
om
.c
Answer: A
ps
m
Explanation:
du
am
By default, secret scanning is enabled automatically for all public repositories. For private or internal
repositories, secret scanning must be enabled manually unless configured at the organization or
ex
enterprise level.
id
This default behavior helps protect open-source projects without requiring additional configuration.
al
.v
Question: 47
// w
s:
When secret scanning detects a set of credentials on a public repository, what does GitHub do?
ht
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 46/69
Answer: A
Explanation:
When a public repository contains credentials that match known secret formats, GitHub will
automatically notify the service provider that issued the secret. This process is known as "secret
scanning partner notification". The provider may then revoke the secret or contact the user directly.
GitHub does not publicly display the alert and does not send internal repository notifications for
om
public detections.
.c
Reference: GitHub Docs – Secret Scanning for Public Repositories
ps
m
Question: 48
du
am
– [Configure and Use Dependency Management]
ex
Which key is required in the update settings of the Dependabot configuration file?
id
al
A. rebase-strategy
.v
w
B. commit-message
w
C. assignees
w
D. package-ecosystem
//
s:
tp
Answer: D
ht
Explanation:
Without this key, Dependabot cannot determine how to analyze or update dependencies. Other keys
like rebase-strategy or commit-message are optional and used for customizing behavior.
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 47/69
Question: 49
Which of the following tasks can be performed by a security team as a proactive measure to help
address secret scanning alerts? (Each answer presents a complete solution. Choose two.)
om
.c
A. Dismiss alerts that are older than 90 days.
ps
B. Configure a webhook to monitor for secret scanning alert events.
m
C. Enable system for cross-domain identity management (SCIM) provisioning for the enterprise.
du
D. Document alternatives to storing secrets in the source code.
am
ex
Answer: BD
id
al
Explanation:
.v
w
w
Webhooks can be configured to listen for secret scanning events. This allows automation, logging, or
//
Documenting secure development practices (like using environment variables or secret managers)
helps reduce the likelihood of developers committing secrets in the first place.
ht
Dismissal based on age is not a best practice without triage. SCIM deals with user provisioning, not
scanning alerts.
Question: 50
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 48/69
What YAML syntax do you use to exclude certain files from secret scanning?
A. decrypt_secret.sh
B. paths-ignore:
C. branches-ignore:
D. secret scanning.yml
om
.c
ps
Answer: B
m
du
Explanation: am
To exclude specific files or directories from being scanned by secret scanning in GitHub Actions, you
ex
can use the paths-ignore: key within your YAML workflow file.
id
This tells GitHub to ignore specified paths when scanning for secrets, which can be useful for
al
Reference: GitHub Docs – Ignoring Files in GitHub Actions for Secret Scanning
ht
Question: 51
Which of the following options are code scanning application programming interface (API)
endpoints? (Each answer presents part of the solution. Choose two.)
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 49/69
A. List all open code scanning alerts for the default branch
Answer: AC
om
Explanation:
.c
ps
The GitHub Code Scanning API includes endpoints that allow you to:
m
du
List alerts for a repository (filtered by branch, state, or tool) — useful for monitoring security over
time.
am
Get a single alert by its ID to inspect its metadata, status, and locations in the code.
ex
However, GitHub does not support modifying the severity of alerts via API — severity is defined by
the scanning tool (e.g., CodeQL). Likewise, alerts cannot be deleted via the API; they are resolved by
id
Question: 52
// w
s:
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 50/69
Answer: C
Explanation:
You should dismiss a code scanning alert if the flagged code is not a true security concern, such as:
om
False positives from the scanner
.c
Fixing the code would automatically resolve the alert — not dismiss it. Dismissing is for valid
ps
exceptions or noise reduction.
m
Reference: GitHub Docs – Dismissing Code Scanning Alerts
du
am
Question: 53
ex
id
What should you do after receiving an alert about a dependency added in a pull request?
.v
w
w
Answer: C
Explanation:
If an alert is raised on a pull request dependency, best practice is to update the dependency to a
secure version before merging the PR. This prevents the vulnerable version from entering the main
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 51/69
codebase.
Merging or deploying the PR without fixing the issue exposes your production environment to known
risks.
Question: 54
om
– [Configure and Use Secret Scanning]
.c
Where can you find a deleted line of code that contained a secret value?
ps
m
A. Insights
du
B. Issues
am
C. Commits
ex
D. Dependency graph
id
al
Answer: C
.v
w
w
Explanation:
// w
s:
Secrets committed and then deleted are still accessible in the repository’s Git history. To locate them,
tp
navigate to the Commits tab. GitHub's secret scanning can detect secrets in both current and
historical commits, which is why remediation should also include revoking the secret, not just
ht
Question: 55
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 52/69
If default code security settings have not been changed at the repository, organization, or enterprise
level, which repositories receive Dependabot alerts?
B. Private repositories
C. None
om
.c
Answer: C
ps
m
Explanation:
du
am
By default, no repositories receive Dependabot alerts unless configuration is explicitly enabled.
GitHub does not enable Dependabot alerts automatically for any repositories unless:
ex
This includes public, private, and enterprise-owned repositories — manual activation is required.
w
w
Question: 56
tp
ht
Which of the following secret scanning features can verify whether a secret is still active?
A. Push protection
B. Validity checks
C. Branch protection
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 53/69
D. Custom patterns
Answer: B
Explanation:
Validity checks, also called secret validation, allow GitHub to check if a detected secret is still active.
om
If verified as live, the alert is marked as "valid", allowing security teams to prioritize the most critical
leaks.
.c
Push protection blocks secrets but does not check their validity. Custom patterns are user-defined
ps
and do not include live checks.
m
Reference: GitHub Docs – Secret Scanning Validity
du
am
Question: 57
ex
id
Which of the following is the best way to prevent developers from adding secrets to the repository?
.v
w
w
Answer: D
Explanation:
The best proactive control is push protection. It scans for secrets during a git push and blocks the
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 54/69
Other options (like CODEOWNERS or security managers) help with oversight but do not prevent
secret leaks.
Making a repo public would increase the risk, not reduce it.
Question: 58
om
.c
– [Configure GitHub Actions Workflows]
ps
As a repository owner, you do not want to run a GitHub Actions workflow when changes are made to
any .txt or markdown files. How would you adjust the event trigger for a pull request that targets the
m
main branch? (Each answer presents part of the solution. Choose three.)
on:
du
am
pull_request:
ex
branches: [main]
id
al
.v
A. - '/*.md'
w
B. - '/*.txt'
w
C. paths:
// w
D. paths-ignore:
s:
tp
E. - 'docs/*.md'
ht
Answer: A, B, D
Explanation:
To exclude .txt and .md files from triggering workflows on pull requests to the main branch:
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 55/69
Example YAML:
yaml
CopyEdit
on:
pull_request:
om
branches:
.c
ps
- main
m
paths-ignore:
du
- '*.md'
am
- '*.txt'
Using paths: would include only specific files instead — not exclude. paths-ignore: is correct here.
ex
id
Question: 59
w
w
w
D. It scans your entire Git history on branches present in your GitHub repository for any secrets
Answer: C
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 56/69
Explanation:
Code scanning is a static analysis feature that examines your source code to identify security
vulnerabilities and coding errors. It runs either on every push, pull request, or a scheduled time
depending on the workflow configuration.
It does not automatically contact maintainers, scan full Git history, or block pushes unless explicitly
configured to do so.
om
.c
Question: 60
ps
m
– [Configure GitHub Advanced Security Tools in GitHub Enterprise]
du
As a developer, you need to configure a code scanning workflow for a repository where GitHub
am
Advanced Security is enabled. What minimum repository permission do you need?
ex
id
A. Write
al
B. None
.v
C. Admin
w
w
D. Read
// w
s:
Answer: A
tp
ht
Explanation:
Write permission allows you to commit the workflow file, which is required to run or configure code
scanning using GitHub Actions.
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 57/69
Question: 61
Which alerts do you see in the repository's Security tab? (Each answer presents part of the solution.
Choose three.)
om
A. Repository permissions
.c
B. Secret scanning alerts
ps
C. Dependabot alerts
m
D. Security status alerts
du
E. Code scanning alerts
am
ex
Answer: B, C, E
id
al
Explanation:
.v
w
w
Code scanning alerts: Vulnerabilities in code detected via static analysis (e.g., CodeQL)
ht
You won’t see general "security status alerts" (not a formal category) or permission-related alerts
here.
Question: 62
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 58/69
Which CodeQL query suite provides queries of lower severity than the default query suite?
A. github/codeql-go/ql/src@main
B. github/codeql/cpp/ql/src@main
C. security-extended
om
Answer: C
.c
Explanation:
ps
m
du
The security-extended query suite includes additional CodeQL queries that detect lower severity
issues than those in the default security-and-quality suite.
am
It’s often used when projects want broader visibility into code hygiene and potential weak spots
beyond critical vulnerabilities.
ex
The other options listed are paths to language packs, not query suites themselves.
id
al
Question: 63
// w
A. Creating a pull request to resolve the vulnerability that will be approved and merged
B. Viewing the Dependabot alert on the Dependabot alerts tab of your repository
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 59/69
Answer: A
Explanation:
A Dependabot alert is only marked as resolved when the related vulnerability is no longer present in
your code — specifically after you merge a pull request that updates the vulnerable dependency.
Simply viewing alerts or graphs does not affect their status. Ignoring the alert by leaving the repo
unchanged keeps the vulnerability active and unresolved.
om
Reference: GitHub Docs – Managing Dependabot Security Updates
.c
ps
m
Question: 64
A. Automated pull requests that help you update dependencies that have known vulnerabilities
al
.v
B. Automated pull requests that keep your dependencies updated, even when they don’t have any
w
vulnerabilities
w
C. Automated pull requests to update the manifest to the latest version of the dependency
w
D. Compatibility scores to let you know whether updating a dependency could cause breaking
//
s:
Answer: A
Explanation:
Dependabot security updates are automated pull requests triggered when GitHub detects a
vulnerability in a dependency listed in your manifest or lockfile. These PRs upgrade the dependency
to the minimum safe version that fixes the vulnerability.
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 60/69
This is separate from regular updates (which keep versions current even if not vulnerable).
Question: 65
Which of the following steps should you follow to integrate CodeQL into a third-party continuous
om
integration system? (Each answer presents part of the solution. Choose three.)
.c
ps
A. Process alerts
m
B. Analyze code
du
C. Upload scan results
am
D. Install the CLI
ex
E. Write queries
id
al
Answer: B, C, D
.v
w
w
Explanation:
// w
s:
Analyze code: Perform the CodeQL analysis on your project with the CLI.
Upload scan results: Export the results in SARIF format and use GitHub’s API to upload them to your
repo’s security tab.
You don’t need to write custom queries unless extending functionality. “Processing alerts” happens
after GitHub receives the results.
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 61/69
Question: 66
Which syntax in a query suite tells CodeQL to look for one or more specified .ql files?
A. query
B. qlpack
om
C. qls
.c
ps
Answer: A
m
Explanation:
du
am
ex
In a query suite (a .qls file), the **query** key is used to specify the paths to one or more .ql files
id
Example:
.v
w
w
- query: path/to/query.ql
w
Question: 67
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 62/69
A. Dependency graph
B. Dependency review
C. Dependabot alert
Answer: B
om
Explanation:
.c
ps
Dependency review runs as part of a pull request and shows which dependencies are being added,
m
removed, or changed — and highlights vulnerabilities associated with any added packages.
du
It works in real-time and is specifically designed for use during pull request workflows.
am
The dependency graph is an overview, Dependabot alerts notify post-merge, and the Security tab
shows the aggregated alert list.
ex
Question: 68
w
w
w
A secret scanning alert should be closed as "used in tests" when a secret is:
s:
tp
ht
B. In a test file.
Answer: C
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 63/69
Explanation:
If a secret is intentionally used in a test environment and poses no real-world security risk, you may
close the alert with the reason "used in tests". This helps reduce noise and clarify that the alert was
reviewed and accepted as non-critical.
Just being in a test file isn't enough unless its purpose is purely for testing.
om
Question: 69
.c
ps
– [Use Code Scanning with CodeQL]
m
du
The autobuild step in the CodeQL workflow has failed. What should you do?
am
A. Remove specific build steps.
ex
C. Remove the autobuild step from your code scanning workflow and add specific build steps.
.v
D. Use CodeQL, which implicitly detects the supported languages in your code base.
w
w
w
Answer: C
//
s:
tp
Explanation:
ht
If autobuild fails (which attempts to automatically detect how to build your project), you should
disable it in your workflow and replace it with explicit build commands, using steps like run: make or
run: ./gradlew build.
This ensures CodeQL can still extract and analyze the code correctly.
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 64/69
Question: 70
In the pull request, how can developers avoid adding new dependencies with known vulnerabilities?
om
C. Add a workflow with the dependency review action.
.c
D. Enable Dependabot security updates.
ps
m
du
am Answer: C
Explanation:
ex
id
To detect and block vulnerable dependencies before merge, developers should use the Dependency
al
Review GitHub Action in their pull request workflows. It scans all proposed dependency changes and
.v
This is a preventative measure during development, unlike Dependabot, which reacts after the fact.
w
w
Question: 71
ht
Where in the repository can you give additional users access to secret scanning alerts?
A. Security
B. Settings
C. Secrets
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 65/69
D. Insights
Answer: B
Explanation:
To grant specific users access to view and manage secret scanning alerts, you do this via the Settings
om
tab of the repository. From there, under the "Code security and analysis" section, you can add
individuals or teams with roles such as security manager.
.c
ps
The Security tab only displays alerts; access control is handled in Settings.
m
Reference: GitHub Docs – Granting Access to Secret Scanning Alerts
du
am
Question: 72
ex
id
If notification and alert recipients are not customized, which users receive notifications about new
.v
Answer: A
Explanation:
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 66/69
By default, users with Write, Maintain, or Admin permissions will receive notifications for new
Dependabot alerts. However, Write permission is the minimum level needed to be automatically
notified. Users with only Read access do not receive alerts unless added explicitly.
Question: 73
om
Which patterns are secret scanning validity checks available to?
.c
ps
A. High entropy strings
m
du
B. Custom patterns
am
C. Partner patterns
Answer: C
.v
w
Explanation:
w
// w
Validity checks — where GitHub verifies if a secret is still active — are available for partner patterns
s:
only. These are secrets issued by GitHub's trusted partners (like AWS, Slack, etc.) and have APIs for
tp
Custom patterns and high entropy patterns do not support automated validity checks.
Question: 74
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 67/69
om
Answer: A
.c
ps
Explanation:
m
du
The dependency graph in a repository is built by parsing manifest and lock files (like package.json,
am
pom.xml, requirements.txt). It helps GitHub detect dependencies and cross-reference them with
known vulnerability databases for alerting.
ex
It is specific to each repository and does not show org-wide or cross-repo summaries.
id
al
Question: 75
// w
What filter or sort settings can be used to prioritize the secret scanning alerts that present the most
risk?
ht
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 68/69
Answer: C
Explanation:
The best way to prioritize secret scanning alerts is to filter by active secrets — these are secrets
GitHub has confirmed are still valid and could be exploited. This allows security teams to focus on
high-risk exposures that require immediate attention.
Sorting by time or filtering by custom patterns won’t help with risk prioritization directly.
om
Reference: GitHub Docs – Filtering Secret Scanning Alerts
.c
ps
m
du
am
ex
id
al
.v
w
w
// w
s:
tp
ht
https://www.validexamdumps.com/GitHub-Advanced-Security.html
Questions and Answers PDF 69/69
om
.c
ps
m
du
am
ex
id
al
.v
w
w
// w
s:
tp
ht
https://www.validexamdumps.com/GitHub-Advanced-Security.html