A token was used to access an organization's resource via API. What fields in the audit log help determine who used it?
Answer : D
What will happen if Dependabot discovers a vulnerable transitive dependency in a repository?
Answer : A
Which GitHub feature is responsible for tracking dependencies and known vulnerabilities in those dependencies from an advisory database?
Answer : B
Which events from the audit log are exposed by the GraphQL API? Each answer presents a complete solution. (Choose three.)
Answer : ABD
When a token is used to perform actions across different GitHub resources, how is this reflected in audit logs?
Answer : A
Which practice helps avoid service disruption when consuming GitHub APIs at scale?
Answer : A
How does GitHub handle secrets found via secret scanning in a public repository?
Answer : A
Our organization is updating its enterprise policies. Which of the following steps should you take to ensure alignment with security requirements?
Answer : AD
Which of the following correctly describes the difference between controlling actions at the enterprise level versus the organization level in GitHub?
Answer : B
What is the potential consequence of enabling multiple rulesets that apply to the same branch in a repository?
Answer : B
In a GitHub repository using Dependabot, which of the following best describes the purpose of the .github/dependabot.yml file?
Answer : A
What is the key benefit of using a GitHub security advisory within a repository?
Answer : B
How does GitHub support compliance requirements for enterprises?
Answer : A
You discover that a secret (e.g., a token or password) was accidentally committed to a GitHub repository. What is the first step you should take to mitigate the risk?
Answer : B
Why would someone choose to configure a security policy?
Answer : B
Have any questions or issues ? Please dont hesitate to contact us