Which of the following is the most complete method for Dependabot to find vulnerabilities in third-party dependencies?
When using the advanced CodeQL code scanning setup, what is the name of the workflow file?
A repository's dependency graph includes:
Assuming that notification settings and Dependabot alert recipients have not been customized, which user account setting should you use to get an alert when a vulnerability is detected in one of your repositories?
Which of the following formats are used to describe a Dependabot alert? (Each answer presents a complete solution. Choose two.)
Which of the following steps should you follow to integrate CodeQL into a third-party continuous integration system? (Each answer presents part of the solution. Choose three.)
Which of the following information can be found in a repository's Security tab?
Which alerts do you see in the repository's Security tab? (Each answer presents part of the solution. Choose three.)
Who can fix a code scanning alert on a private repository?
As a developer, you need to configure a code scanning workflow for a repository where GitHub Advanced Security is enabled. What minimum repository permission do you need?
In the pull request, how can developers avoid adding new dependencies with known vulnerabilities?
Where can you find a deleted line of code that contained a secret value?
Where can you use CodeQL analysis for code scanning? (Each answer presents part of the solution. Choose two.)
Assuming there is no custom Dependabot behavior configured, where possible, what does Dependabot do after sending an alert about a vulnerable dependency in a repository?
Secret scanning will scan:
What does code scanning do?
Which syntax in a query suite tells CodeQL to look for one or more specified .ql files?
Assuming that notification and alert recipients are not customized, what does GitHub do when it identifies a vulnerable dependency in a repository where Dependabot alerts are enabled? (Each answer presents part of the solution. Choose two.)
Where can you view code scanning results from CodeQL analysis?
You are managing code scanning alerts for your repository. You receive an alert highlighting a problem with data flow. What do you click for additional context on the alert?
After investigating a code scanning alert related to injection, you determine that the input is properly sanitized using custom logic. What should be your next step?
What are Dependabot security updates?