Microsoft Related Exams
GH-500 Exam

After investigating a code scanning alert related to injection, you determine that the input is properly sanitized using custom logic. What should be your next step?
A dependency has a known vulnerability. What does the warning message include?
What filter or sort settings can be used to prioritize the secret scanning alerts that present the most risk?