New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

ECCouncil ECDE 312-97 New Questions

Page: 3 / 8
Total 100 questions

EC-Council Certified DevSecOps Engineer (ECDE) Questions and Answers

Question 9

(Evan Peters has been working as a DevSecOps engineer in an IT company located in Denver, Colorado. His organization has deployed various applications on Docker containers. Evan has been running SSH service inside the containers, and handling of SSH keys and access policies is a major security concern for him. What will be the solution for Evan security concern?)

Options:

A.

Run SSH on the registry and utilize docker exec for interacting with the container.

B.

Run SSH on the docker build and utilize docker exec for interacting with the container.

C.

Run SSH on the client and utilize docker exec for interacting with the container.

D.

Run SSH on the host and utilize docker exec for interacting with the container.

Question 10

(Richard Harris carries an experience of 5 years as a DevSecOps engineer. On February 1, 2022, he got the job of senior DevSecOps engineer in an IT company located Raleigh, North Carolina. He would like to trigger scan on each build in Jenkins, run customize scans for some specific vulnerabilities, fail the build process if a particular threat-level is reached, and generate reports automatically by integrating Acunetix DAST Tool with Jenkins. Richard installed Acunetix plugin successfully in Jenkins, after which he restarted Jenkins. He would like to find the path and install the certificate in Linux. Which of the following commands should Richard execute to find out the currently running Java binary in the Jenkins service?.)

Options:

A.

pc - aux | grep Jenkins.

B.

as - aux | grep Jenkins.

C.

ac - aux | grep Jenkins.

D.

ps - aux | grep Jenkins.

Question 11

(Rahul Mehta is working as a DevSecOps engineer in an IT company that develops cloud-native web applications. His organization follows a strict DevSecOps practice and wants to ensure that third-party open-source dependencies used in the application do not introduce known security vulnerabilities. Rahul decided to integrate a Software Composition Analysis (SCA) tool into the CI pipeline so that every build is automatically scanned. During one of the builds, the SCA tool detects a critical vulnerability in a transitive dependency. What should ideally happen in a mature DevSecOps pipeline when such a critical vulnerability is detected at build time?.)

Options:

A.

The pipeline should log the vulnerability details and continue the build to avoid delivery delays.

B.

The pipeline should notify the security team and continue with deploy-time checks.

C.

The pipeline should fail the build and prevent the artifact from progressing further.

D.

The pipeline should ignore transitive dependencies and only scan direct dependencies.

Question 12

(Thomas McInerney has been working as a senior DevSecOps engineer in an IT company that develops software products and web applications related to the healthcare sector. His organization deployed various applications in Docker containers. Thomas’ team leader would like to prevent a container from gaining new privileges. Therefore, he asked Thomas to set no_new_priv bit, which functions across clone, execve, and fork to prevent a container from gaining new privileges. Which of the following commands should Thomas use to list out security options for all the containers?)

Options:

A.

docker ps --quiet --all | xargs docker inspect --format ': SecurityOpt'.

B.

docker ps -quiet -all | xargs docker inspect --format ': SecurityOpt='.

C.

docker ps -quiet -all | xargs docker inspect --format ': SecurityOpt'.

D.

docker ps --quiet --all | xargs docker inspect --format ': SecurityOpt='.

Page: 3 / 8
Total 100 questions