Q: 1
– [Configure and Use Dependency Management]
Which security feature shows a vulnerable dependency in a pull request?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
– [Configure and Use Dependency Management]
Which Dependabot configuration fields are required? (Each answer presents part of the solution.
Choose three.)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
– [Configure and Use Dependency Management]
Which key is required in the update settings of the Dependabot configuration file?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
– [Configure and Use Dependency Management]
Assuming that no custom Dependabot behavior is configured, who has the ability to merge a pull
request created via Dependabot security updates?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
– [Configure GitHub Actions Workflows]
As a repository owner, you do not want to run a GitHub Actions workflow when changes are made to
any .txt or markdown files. How would you adjust the event trigger for a pull request that targets the
main branch? (Each answer presents part of the solution. Choose three.)
on:
pull_request:
branches: [main]
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
– [Configure GitHub Advanced Security Tools in GitHub Enterprise]
As a repository owner, you want to receive specific notifications, including security alerts, for an
individual repository. Which repository notification setting should you use?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
– [Configure and Use Dependency Management]
When does Dependabot alert you of a vulnerability in your software development process?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
– [Use Code Scanning with CodeQL]
Which of the following options are code scanning application programming interface (API)
endpoints? (Each answer presents part of the solution. Choose two.)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
– [Configure and Use Dependency Management]
In the pull request, how can developers avoid adding new dependencies with known vulnerabilities?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2