Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

GitHub-Advanced-Security GitHub Advanced Security GHAS Exam Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GitHub GitHub-Advanced-Security GitHub Advanced Security GHAS Exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 75 questions

What is a security policy?

A.

An automatic detection of security vulnerabilities and coding errors in new or modified code

B.

A security alert issued to a community in response to a vulnerability

C.

A file in a GitHub repository that provides instructions to users about how to report a security vulnerability

D.

An alert about dependencies that are known to contain security vulnerabilities

Which of the following benefits do code scanning, secret scanning, and dependency review provide?

A.

Search for potential security vulnerabilities, detect secrets, and show the full impact of changes to dependencies

B.

Confidentially report security vulnerabilities and privately discuss and fix security vulnerabilities in your repository's code

C.

View alerts about dependencies that are known to contain security vulnerabilities

D.

Automatically raise pull requests, which reduces your exposure to older versions of dependencies

Which Dependabot configuration fields are required? (Each answer presents part of the solution. Choose three.)

A.

directory

B.

package-ecosystem

C.

milestone

D.

schedule.interval

E.

allow

Which of the following features helps to prioritize secret scanning alerts that present an immediate risk?

A.

Non-provider patterns

B.

Push protection

C.

Custom pattern dry runs

D.

Secret validation

Which of the following is the most complete method for Dependabot to find vulnerabilities in third-party dependencies?

A.

Dependabot reviews manifest files in the repository

B.

CodeQL analyzes the code and raises vulnerabilities in third-party dependencies

C.

A dependency graph is created, and Dependabot compares the graph to the GitHub Advisorydatabase

D.

The build tool finds the vulnerable dependencies and calls the Dependabot API

What is a prerequisite to define a custom pattern for a repository?

A.

Change the repository visibility to Internal

B.

Close other secret scanning alerts

C.

Specify additional match criteria

D.

Enable secret scanning

As a developer, you need to configure a code scanning workflow for a repository where GitHub Advanced Security is enabled. What minimum repository permission do you need?

A.

Write

B.

None

C.

Admin

D.

Read

Why should you dismiss a code scanning alert?

A.

If you fix the code that triggered the alert

B.

To prevent developers from introducing new problems

C.

If it includes an error in code that is used only for testing

D.

If there is a production error in your code

What step is required to run a SARIF-compatible (Static Analysis Results Interchange Format) tool on GitHub Actions?​

A.

Update the workflow to include a final step that uploads the results.

B.

By default, the CodeQL runner automatically uploads results to GitHub on completion.

C.

The CodeQL action uploads the SARIF file automatically when it completes analysis.

D.

Use the CLI to upload results to GitHub.​

In the pull request, how can developers avoid adding new dependencies with known vulnerabilities?

A.

Enable Dependabot alerts.

B.

Add Dependabot rules.

C.

Add a workflow with the dependency review action.

D.

Enable Dependabot security updates.

Which key is required in the update settings of the Dependabot configuration file?

A.

rebase-strategy

B.

commit-message

C.

assignees

D.

package-ecosystem

When configuring code scanning with CodeQL, what are your options for specifying additional queries? (Each answer presents part of the solution. Choose two.)

A.

Packs

B.

github/codeql

C.

Scope

D.

Queries

Which of the following options are code scanning application programming interface (API) endpoints? (Each answer presents part of the solution. Choose two.)

A.

List all open code scanning alerts for the default branch

B.

Modify the severity of an open code scanning alert

C.

Get a single code scanning alert

D.

Delete all open code scanning alerts

If default code security settings have not been changed at the repository, organization, or enterprise level, which repositories receive Dependabot alerts?

A.

Repositories owned by an enterprise account

B.

Private repositories

C.

None

D.

Repositories owned by an organization

A dependency has a known vulnerability. What does the warning message include?

A.

The security impact of these changes

B.

An easily understandable visualization of dependency change

C.

How many projects use these components

D.

A brief description of the vulnerability

Secret scanning will scan:​

A.

A continuous integration system.

B.

Any Git repository.

C.

The GitHub repository.

D.

External services.​

After investigating a code scanning alert related to injection, you determine that the input is properly sanitized using custom logic. What should be your next step?

A.

Draft a pull request to update the open-source query.

B.

Ignore the alert.

C.

Open an issue in the CodeQL repository.

D.

Dismiss the alert with the reason "false positive."

Where in the repository can you give additional users access to secret scanning alerts?

A.

Security

B.

Settings

C.

Secrets

D.

Insights

As a developer with write access, you navigate to a code scanning alert in your repository. When will GitHub close this alert?

A.

After you triage the pull request containing the alert

B.

When you use data-flow analysis to find potential security issues in code

C.

After you find the code and click the alert within the pull request

D.

After you fix the code by committing within the pull request

As a contributor, you discovered a vulnerability in a repository. Where should you look for the instructions on how to report the vulnerability?

A.

support.md

B.

readme.md

C.

contributing.md

D.

security.md

Page: 1 / 2
Total 75 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved