GitHub Advanced Security Exam Valid Questions
GitHub Advanced Security Exam Valid Questions
questions are the best material for you to test all the related GitHub exam topics.
By using the GitHub Advanced Security exam dumps questions and practicing
your skills, you can increase your confidence and chances of passing the GitHub
Advanced Security exam.
Instant Download
Free Update in 3 Months
Money back guarantee
PDF and Software
24/7 Customer Support
Besides, Dumpsinfo also provides unlimited access. You can get all
Dumpsinfo files at lowest price.
3.Which key is required in the update settings of the Dependabot configuration file?
A. rebase-strategy
B. commit-message
C. assignees
D. package-ecosystem
Answer: D
Explanation:
In a dependabot.yml configuration file, package-ecosystem is a required key. It defines the package
manager being used in that update configuration (e.g., npm, pip, maven, etc.).
Without this key, Dependabot cannot determine how to analyze or update dependencies. Other keys
like rebase-strategy or commit-message are optional and used for customizing behavior.
Reference: GitHub Docs C Dependabot Configuration Options
4.Which syntax in a query suite tells CodeQL to look for one or more specified .ql files?
A. query
B. qlpack
C. qls
Answer: A
Explanation:
In a query suite (a .qls file), the **query** key is used to specify the paths to one or more .ql files that
should be included in the suite.
Example:
- query: path/to/query.ql qls is the file format.
qlpack is used for packaging queries, not in suite syntax.
Reference: GitHub Docs C CodeQL Query Suite Syntax
5.If notification and alert recipients are not customized, which users receive notifications about new
Dependabot alerts in an affected repository?
A. Users with Write permissions to the repository
B. Users with Admin privileges to the repository
C. Users with Maintain privileges to the repository
D. Users with Read permissions to the repository
Answer: A
Explanation:
By default, users with Write, Maintain, or Admin permissions will receive notifications for new
Dependabot alerts. However, Write permission is the minimum level needed to be automatically
notified. Users with only Read access do not receive alerts unless added explicitly.
Reference: GitHub Docs C Dependabot Alerts Notification Scope
6.In the pull request, how can developers avoid adding new dependencies with known vulnerabilities?
A. Enable Dependabot alerts.
B. Add Dependabot rules.
C. Add a workflow with the dependency review action.
D. Enable Dependabot security updates.
Answer: C
Explanation:
To detect and block vulnerable dependencies before merge, developers should use the Dependency
Review GitHub Action in their pull request workflows. It scans all proposed dependency changes and
flags any packages with known vulnerabilities.
This is a preventative measure during development, unlike Dependabot, which reacts after the fact.
Reference: GitHub Docs C Dependency Review Action
7.A secret scanning alert should be closed as "used in tests" when a secret is:
A. In the readme.md file.
B. In a test file.
C. Solely used for tests.
D. Not a secret in the production environment.
Answer: C
Explanation:
If a secret is intentionally used in a test environment and poses no real-world security risk, you may
close the alert with the reason "used in tests". This helps reduce noise and clarify that the alert was
reviewed and accepted as non-critical.
Just being in a test file isn't enough unless its purpose is purely for testing.
Reference: GitHub Docs C Managing Secret Scanning Alerts
8.Which of the following features helps to prioritize secret scanning alerts that present an immediate
risk?
A. Non-provider patterns
B. Push protection
C. Custom pattern dry runs
D. Secret validation
Answer: D
Explanation:
Secret validation checks whether a secret found in your repository is still valid and active with the
issuing provider (e.g., AWS, GitHub, Stripe). If a secret is confirmed to be active, the alert is marked
as verified, which means it's considered a high-priority issue because it presents an immediate
security risk.
This helps teams respond faster to valid, exploitable secrets rather than wasting time on expired or
fake tokens.
Reference: GitHub Docs C Secret validation in secret scanning
9.When using CodeQL, how does extraction for compiled languages work?
A. By generating one language at a time
B. By resolving dependencies to give an accurate representation of the codebase
C. By monitoring the normal build process
D. By running directly on the source code
Answer: C
Explanation:
For compiled languages, CodeQL performs extraction by monitoring the normal build process. This
means it watches your usual build commands (like make, javac, or dotnet build) and extracts the
relevant data from the actual build steps being executed. CodeQL uses this information to construct a
semantic database of the application.
This approach ensures that CodeQL captures a precise, real-world representation of the code and its
behavior as it is compiled, including platform-specific configurations or conditional logic used during
build.
Reference: GitHub Docs C CodeQL for compiled languages
10.When secret scanning detects a set of credentials on a public repository, what does GitHub do?
A. It notifies the service provider who issued the secret.
B. It displays a public alert in the Security tab of the repository.
C. It scans the contents of the commits for additional secrets.
D. It sends a notification to repository members.
Answer: A
Explanation:
When a public repository contains credentials that match known secret formats, GitHub will
automatically notify the service provider that issued the secret. This process is known as "secret
scanning partner notification". The provider may then revoke the secret or contact the user directly.
GitHub does not publicly display the alert and does not send internal repository notifications for public
detections.
Reference: GitHub Docs C Secret Scanning for Public Repositories
11.When does Dependabot alert you of a vulnerability in your software development process?
A. When a pull request adding a vulnerable dependency is opened
B. As soon as a vulnerable dependency is detected
C. As soon as a pull request is opened by a contributor
D. When Dependabot opens a pull request to update a vulnerable dependency
Answer: B
Explanation:
Dependabot alerts are generated as soon as GitHub detects a known vulnerability in one of your
dependencies. GitHub does this by analyzing your repository’s dependency graph and matching it
against vulnerabilities listed in the GitHub Advisory Database. Once a match is found, the system
raises an alert automatically without waiting for a PR or manual action.
This allows organizations to proactively mitigate vulnerabilities as early as possible, based on real-
time detection.
Reference: GitHub Docs C About Dependabot alerts; Managing alerts in GitHub Dependabot
12.Which of the following steps should you follow to integrate CodeQL into a third-party continuous
integration system? (Each answer presents part of the solution. Choose three.)
A. Process alerts
B. Analyze code
C. Upload scan results
D. Install the CLI
E. Write queries
Answer: B, C, D
Explanation:
When integrating CodeQL outside of GitHub Actions (e.g., in Jenkins, CircleCI):
Install the CLI: Needed to run CodeQL commands.
Analyze code: Perform the CodeQL analysis on your project with the CLI.
Upload scan results: Export the results in SARIF format and use GitHub’s API to upload them to your
repo’s security tab.
You don’t need to write custom queries unless extending functionality. “Processing alerts” happens
after GitHub receives the results.
Reference: GitHub Docs C Using CodeQL with 3rd Party CI Systems