Which of the following is the most complete method for Dependabot to find vulnerabilities in third-party dependencies?
Which patterns are secret scanning validity checks available to?
Who can fix a code scanning alert on a private repository?
A secret scanning alert should be closed as "used in tests" when a secret is:
When using CodeQL, what extension stores query suite definitions?
As a contributor, you discovered a vulnerability in a repository. Where should you look for the instructions on how to report the vulnerability?
If notification and alert recipients are not customized, which users receive notifications about new Dependabot alerts in an affected repository?
Which alerts do you see in the repository's Security tab? (Each answer presents part of the solution. Choose three.)
As a repository owner, you do not want to run a GitHub Actions workflow when changes are made to any .txt or markdown files. How would you adjust the event trigger for a pull request that targets the main branch? (Each answer presents part of the solution. Choose three.)
on:
pull_request:
branches: [main]
How many alerts are created when two instances of the same secret value are in the same repository?
A dependency has a known vulnerability. What does the warning message include?
Which key is required in the update settings of the Dependabot configuration file?
Which of the following statements best describes secret scanning push protection?
Assuming that no custom Dependabot behavior is configured, who has the ability to merge a pull request created via Dependabot security updates?
Where can you view code scanning results from CodeQL analysis?
If default code security settings have not been changed at the repository, organization, or enterprise level, which repositories receive Dependabot alerts?
As a developer, you need to configure a code scanning workflow for a repository where GitHub Advanced Security is enabled. What minimum repository permission do you need?
Which of the following tasks can be performed by a security team as a proactive measure to help address secret scanning alerts? (Each answer presents a complete solution. Choose two.)
What kind of repository permissions do you need to request a Common Vulnerabilities and Exposures (CVE) identification number for a security advisory?
When does Dependabot alert you of a vulnerability in your software development process?
Which of the following information can be found in a repository's Security tab?
A repository's dependency graph includes: