Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

312-97 ECCouncil EC-Council Certified DevSecOps Engineer (ECDE) Free Practice Exam Questions (2026 Updated)

Prepare effectively for your ECCouncil 312-97 EC-Council Certified DevSecOps Engineer (ECDE) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 100 questions

(Rachel McAdams applied for the position of DevSecOps engineer at TetraSoft Pvt. Ltd. She gave her interview on February 23, 2022, and was selected as a DevSecOps engineer. Her team is working on securing Ruby on Rails application. Rachel’s team leader asked her to integrate Brakeman SAST tool with Jenkins. To perform the integration, she navigated to Jenkins Plugin Manager and installed Warnings Next Generation Plugin. To run the tool in Jenkins, she invoked Brakeman as part of an Execute shell build step. In the Execute shell column, she wrote the following commands with brakeman options

bash -l -c ‘

rvm install 3.0.0 && \

rvm use 3.0.0@brakeman –create && \

gem install brakeman && \

brakeman –no-progress –no-pager –no-exit-on-warn -o brakeman-output.json

What is the function of the –no-exit-on-warn option in the above-mentioned command?)

A.

It tells Brakeman to return a 1 exit code even if warnings are found.

B.

It tells Brakeman to return a 3 exit code even if warnings are found.

C.

It tells Brakeman to return a 0 exit code even if warnings are found.

D.

It tells Brakeman to return a 2 exit code even if warnings are found.

(Joe Adler has recently been offered a job as a DevSecOps engineer in an IT company that develops software products and web applications for the healthcare industry. He would like to implement DevSec Hardening Framework to add a layer into the automation framework that configures operating systems and services and takes care of difficult settings, compliance guidelines, cryptography recommendations, and secure defaults. To apply DevSec Hardening Framework to the machine, he scanned the machine using Nessus scanning tool; he then checked the compliance results before using DevSec Hardening Framework. Which of the following commands should Joe use to run DevSec Hardening Framework?.)

A.

Chef-solo -c solo.rb -j solo.json.

B.

Chef-solo -m solo.rb -h solo.json.

C.

Chef-solo -j solo.rb -c solo.json.

D.

Chef-solo -h solo.rb -m solo.json.

(BVR Pvt. Ltd. is an IT company that develops software products and applications related to IoT devices. The software development team of the organization is using Bitbucket repository to plan projects, collaborate on code, test, and deploy. The repository provides teams a single place for projects planning and collaboration on coding, testing, and deploying the software application. Which of the following is offered by Bitbucket to BVR Pvt. Ltd.?)

A.

Free limited public repositories.

B.

Free unlimited private repositories.

C.

Free limited private repositories.

D.

Free unlimited public repositories.

(Brett Ryan has been working as a senior DevSecOps engineer in an IT company in Charleston, South Carolina. He is using git-mutimail tool to send email notification for every push to git repository. By default, the tool will send one output email providing details about the reference change and one output email for every new commit due to a reference change. How can Brett ensure that git-multimail is set up appropriately?)

A.

Running the environmental variable GITHUB_MULTIMAIL_CHECK_SETUP by setting it to non-empty string.

B.

Running the environmental variable GIT_MULTIMAIL_CHECK_SETUP by setting it to empty string.

C.

Running the environmental variable GIT_MULTIMAIL_CHECK_SETUP by setting it to non-empty string.

D.

Running the environmental variable GITHUB_MULTIMAIL_CHECK_SETUP by setting it to empty string.

(Elizabeth Moss has been working as a DevSecOps engineer in an IT company located in San Diego, California. Due to the robust security and cost-effective service provided by AWS, her organization transferred all the workloads from on-prem to AWS cloud in 2017. Elizabeth would like to prevent committing AWS keys into repositories; therefore, she created a global git-templates directory using command line. Then, she created another directory, named it as hooks, wherein she created a file named pre-commit. In the pre-commit file, Elizabeth pasted the script that would prevent committing AWS keys into the repositories. She would like to ensure that the hook is executable. Which of the following command should Elizabeth run to make sure that the pre-commit hook is executable?)

A.

chmod a+x ~/.git-templates/hooks/pre-commit.

B.

chmod a+e ~/.git-templates/hooks/pre-commit.

C.

chmod a+x ~/.hooks/git-templates/pre-commit.

D.

chmod a+e ~/.hooks/git-templates/pre-commit.

(Peter Dinklage has been working as a senior DevSecOps engineer at SacramentSoft Solution Pvt. Ltd. He has deployed applications in docker containers. His team leader asked him to check the exposure of unnecessary ports. Which of the following commands should Peter use to check all the containers and the exposed ports?)

A.

docker ps --quiet | xargs docker inspect --all --format : Ports=.

B.

docker ps --quiet | xargs docker inspect --format ': Ports='.

C.

docker ps --quiet | xargs docker inspect --format : Ports.

D.

docker ps --quiet | xargs docker inspect --all --format ': Ports='.

(Jayson Smith is working as a DevSecOps engineer in an MNC company located in Tampa, Florida. The senior software developer of his company, Sandra Oliver, has uploaded an application in her GitHub repository that might contain security vulnerabilities and has provided the URL to the DevSecOps team. Jayson would like to analyze the application developed by Sandra to detect and mitigate the security issues in the application code; therefore, he would like to clone Sandra’s GitHub repository to his computer. Which of the following commands should Jayson use to clone the repository of another user to his computer?)

A.

$ git clonehttps://github.com/REPOSITORY/USERNAME.git .

B.

$ git clonehttps://github.com/USERNAME/REPOSITORY.git .

C.

$ github clonehttps://github.com/USERNAME/REPOSITORY.git .

D.

$ github clonehttps://github.com/ REPOSITORY/USERNAME.git.

(Robert Wheeler has been working as a DevSecOps engineer in an IT company for the past 5 years. His organization develops software products and web applications related to AutoCAD. Rob would like to integrate Rapid7 tCell Next-Gen Cloud WAF and RASP Tool with AWS CloudFront to protect application by identifying suspicious actors, enforcing content security policies (CSPs), and securing against unvalidated HTTP redirections on web applications. How can Rob deploy the tCell agent as a CloudFormation stack into his organization AWS account?.)

A.

By plugging into CloudFront through Lambda Function.

B.

By plugging into CloudFormation through Lambda Function.

C.

By plugging into CloudFront through Lambda@Edge.

D.

By plugging into CloudFormation through Lambda@Edge.

(Charles Rettig has been working as a DevSecOps engineer in an IT company that develops software and web applications for IoT devices. He integrated Burp Suite with Jenkins to detect vulnerabilities and evaluate attack vectors compromising web applications. Which of the following features offered by Burp Suite minimizes false positives and helps detect invisible vulnerabilities?)

A.

OAST.

B.

QAST.

C.

MAST.

D.

NAST.

(Kenneth Danziger is a certified DevSecOps engineer, and he recently got a job in an IT company that develops software products related to the healthcare industry. To identify security and compliance issues in the source code and quickly fix them before they impact the source code, Kenneth would like to integrate WhiteSource SCA tool with AWS. Therefore, to integrate WhiteSource SCA Tool in AWS CodeBuild for initiating scanning in the code repository, he built a buildspec.yml file to the source code root directory and added the following command to pre-build phase curl -LJOhttps://github.com/whitesource/unified-agent-distribution/raw/master/standAlone/wss_agent.sh . Which of the following script files will the above step download in Kenneth organization’s CodeBuild server?.)

A.

wss_agent.sh.

B.

ssw_agent.sh.

C.

cbs_agent.sh.

D.

aws_agent.sh.

(Joyce Vincent has been working as a senior DevSecOps engineer at MazeSoft Solution Pvt. Ltd. She would like to integrate Trend Micro Cloud One RASP tool with Microsoft Azure to secure container-based application by inspecting the traffic, detecting vulnerabilities, and preventing threats. In Microsoft Azure PowerShell, Joyce created the Azure container instance in a resource group (ACI) (named “aci-test-closh”) and loaded the container image to it. She then reviewed the deployment of the container instance. Which of the following commands should Joyce use to get the logging information from the container?.)

A.

az container logs --resource-group ACI --name aci-test-closh.

B.

az container logs -resource-group ACI -name aci-test-closh.

C.

azure container logs --resource-group ACI --name aci-test-closh.

D.

azure container logs -resource-group ACI -name aci-test-closh.

(William Friedkin has been working as a DevSecOps engineer in an IT company for the past 3 years. His team leader has asked him to validate the host configuration that runs the Docker containers and perform security checks at the container level by implementing Docker’s CIS Benchmark Recommendations. Therefore, William would like to integrate Docker Bench with Jenkins to incorporate security testing in DevOps workflow and secure the Docker Container. Before starting the procedure, he would like to install openssh on Ubuntu. Which of the following command should William run to install openssh on Ubuntu?)

A.

sudo apt-get -s install openssh-server.

B.

sudo apt.get install openssh-server.

C.

sudo apt-get install openssh-server.

D.

sudo apt.get -s install openssh-server.

(Katie Holmes is working as a DevSecOps engineer at SeCSafe Anti-virus. The DevOps team of her organization has developed a distributed application with multiple microservices. Katie deployed all the microservices to the Kubernetes nodes successfully. The DevOps team approached Katie and informed her that the application is not working. Katie wants to check whether the Kubernetes cluster is working or not. Which of the following commands should Katie run step by step to verify that the Kubernetes is working?)

A.

kube-etcd version kube-etcd cluster-info.

B.

kubernetes version kubebernetes cluster-info.

C.

kube version kube cluster-info.

D.

kubectl version kubectl cluster-info.

(Alex Hales recently joined TAVR Software Solution Pvt. Ltd. As a DevSecOps engineer. To automatically detect security loopholes in the web applications while building and testing them, he integrated OWASP ZAP DAST Plugin with Jenkins. How can Alex uniquely identify every build in the project?.)

A.

By specifying a file name followed by ${Profile_ID} in Post-build Actions tab.

B.

By specifying a file name followed by ${zap_scan} in Post-build Actions tab.

C.

By specifying a file name followed by ${ZAPROXY_HOME} in Post-build Actions tab.

D.

By specifying a file name followed by ${Build_ID} in Post-build Actions tab.

(Kevin Ryan has been working as a DevSecOps engineer in an MNC company that develops various software products and web applications. For easy management of secret credentials in CI/CD pipeline, he would like to integrate Azure Key Vault with Jenkins. Therefore, he created an Azure Key Vault, noted down the credentials displayed on the screen, and created a secret in Azure Key Vault. Then, he used the secret key from the credentials obtained from creating the vault. Kevin went back to Jenkins and installed Azure Key Vault plugin. Then, he navigated to Configure System under Manage Jenkins and added the URL for Azure Key Vault. How can Kevin complete the integration of Azure Key Vault with Jenkins?.)

A.

By modifying old credentials in Global Credentials (unrestricted).

B.

By creating new credentials in Global Credentials (unrestricted).

C.

By creating new credentials in Global Credentials (restricted).

D.

By modifying old credentials in Global Credentials (restricted).

(Allen Smith has been working as a senior DevSecOps engineer for the past 4 years in an IT company that develops software products and applications for retail companies. To detect common security issues in the source code, he would like to integrate Bandit SAST tool with Jenkins. Allen installed Bandit and created a Jenkins job. In the Source Code Management section, he provided repository URL, credentials, and the branch that he wants to analyze. As Bandit is installed on Jenkins' server, he selected Execute shell for the Build step and configure Bandit script. After successfully integrating Bandit SAST tool with Jenkins, in which of the following can Allen detect security issues?.)

A.

Java code.

B.

Ruby code.

C.

Python code.

D.

C++ code.

(Curtis Morgan is working as a DevSecOps engineer at Orchid Pvt. Ltd. His organization develops online teaching software. Beth McCarthy is working in a software development team, and she requested Curtis to help her in making pre-commit hooks executable on her local machine. Curtis went through the “repo.git\hooks” directory and removed the “.sample” extension from “pre-commit.sample” file by using “chmod +x filename” command and made the pre-commit hook executable on Beth’s local machine. On the next day while developing the code for the software product, Beth accidentally committed the code with sensitive information. What will be the result of this commit?.)

A.

The script will exit with 3.

B.

The script will exit with 0.

C.

The script will exit with 2.

D.

The script will exit with 1.

(William Scott has been working as a senior DevSecOps engineer at GlobalSec Pvt. Ltd. His organization develops software products related to mobile apps. William would like to exploit Jenkins using Metasploit framework; therefore, he downloaded Metasploit. He would like to initiate an Nmap scan by specifying the target IP to find the version of Jenkins running on the machine. Which of the following commands should William use to find the version of Jenkins running on his machine using Nmap?.)

A.

Nmap -sN -sJ “Target IP”.

B.

Nmap -sJ -sN “Target IP”.

C.

Nmap -sS -sV “Target IP”.

D.

Nmap -sV -sS “Target IP”.

(Peter Dinklage has been working as a senior DevSecOps engineer at SacramentSoft Solution Pvt. Ltd. He has deployed applications in docker containers. His team leader asked him to check the exposure of unnecessary ports. Which of the following commands should Peter use to check all the containers and the exposed ports?)

A.

docker ps --quiet | xargs docker inspect --all --format : Ports=.

B.

docker ps --quiet | xargs docker inspect --format ': Ports='.

C.

docker ps --quiet | xargs docker inspect --format : Ports.

D.

docker ps --quiet | xargs docker inspect --all --format ': Ports='.

(Sofia Coppola has been working as a senior DevSecOps engineer in an MNC company located in Denver, Colorado. In January of 2020, her organization migrated all the workloads from on-prem to AWS cloud environment due to the robust security feature and cost-effective services offered by AWS. Which of the following is an Amazon Web Services-hosted version control tool that Sofia can use to manage and store assets in the AWS cloud?.)

A.

AWS CodeCommit.

B.

AWS CodePipeline.

C.

AWS CodeBuilt.

D.

AWS CodeDeploy.

Page: 1 / 2
Total 100 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved