Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

GH-500 Microsoft GitHub Advanced Security Exam Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Microsoft GH-500 GitHub Advanced Security Exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 75 questions

You are managing code scanning alerts for your repository. You receive an alert highlighting a problem with data flow. What do you click for additional context on the alert?​

A.

Show paths

B.

Security

C.

Code scanning alerts​

Why should you dismiss a code scanning alert?

A.

If you fix the code that triggered the alert

B.

To prevent developers from introducing new problems

C.

If it includes an error in code that is used only for testing

D.

If there is a production error in your code

Which syntax in a query suite tells CodeQL to look for one or more specified .ql files?

A.

query

B.

qlpack

C.

qls

Which of the following workflow events would trigger a dependency review? (Each answer presents a complete solution. Choose two.)​

A.

pull_request

B.

workflow_dispatch

C.

trigger

D.

commit

Which of the following Watch settings could you use to get Dependabot alert notifications? (Each answer presents part of the solution. Choose two.)

A.

The Custom setting

B.

The Participating and @mentions setting

C.

The All Activity setting

D.

The Ignore setting

Which of the following statements most accurately describes push protection for secret scanning custom patterns?​

A.

Push protection must be enabled for all, or none, of a repository's custom patterns.

B.

Push protection is an opt-in experience for each custom pattern.

C.

Push protection is not available for custom patterns.

D.

Push protection is enabled by default for new custom patterns.​

After investigating a code scanning alert related to injection, you determine that the input is properly sanitized using custom logic. What should be your next step?

A.

Draft a pull request to update the open-source query.

B.

Ignore the alert.

C.

Open an issue in the CodeQL repository.

D.

Dismiss the alert with the reason "false positive."

Where can you use CodeQL analysis for code scanning? (Each answer presents part of the solution. Choose two.)

A.

In a third-party Git repository

B.

In a workflow

C.

In an external continuous integration (CI) system

D.

In the Files changed tab of the pull request

When configuring code scanning with CodeQL, what are your options for specifying additional queries? (Each answer presents part of the solution. Choose two.)

A.

Packs

B.

github/codeql

C.

Scope

D.

Queries

How would you build your code within the CodeQL analysis workflow? (Each answer presents a complete solution. Choose two.)​

A.

Upload compiled binaries.

B.

Use CodeQL's init action.

C.

Ignore paths.

D.

Implement custom build steps.

E.

Use jobs.analyze.runs-on.

F.

Use CodeQL's autobuild action.

Assuming there is no custom Dependabot behavior configured, where possible, what does Dependabot do after sending an alert about a vulnerable dependency in a repository?

A.

Creates a pull request to upgrade the vulnerable dependency to the minimum possible secure version

B.

Scans repositories for vulnerable dependencies on a schedule and adds those files to a manifest

C.

Constructs a graph of all the repository's dependencies and public dependents for the default branch

D.

Scans any push to all branches and generates an alert for each vulnerable repository

Which of the following secret scanning features can verify whether a secret is still active?

A.

Push protection

B.

Validity checks

C.

Branch protection

D.

Custom patterns

Which of the following options are code scanning application programming interface (API) endpoints? (Each answer presents part of the solution. Choose two.)

A.

List all open code scanning alerts for the default branch

B.

Modify the severity of an open code scanning alert

C.

Get a single code scanning alert

D.

Delete all open code scanning alerts

Secret scanning will scan:​

A.

A continuous integration system.

B.

Any Git repository.

C.

The GitHub repository.

D.

External services.​

You have enabled security updates for a repository. When does GitHub mark a Dependabot alert as resolved for that repository?

A.

When Dependabot creates a pull request to update dependencies

B.

When you dismiss the Dependabot alert

C.

When the pull request checks are successful

D.

When you merge a pull request that contains a security update

Which of the following is the best way to prevent developers from adding secrets to the repository?

A.

Create a CODEOWNERS file

B.

Make the repository public

C.

Configure a security manager

D.

Enable push protection

Which of the following formats are used to describe a Dependabot alert? (Each answer presents a complete solution. Choose two.)​

A.

Common Weakness Enumeration (CWE)

B.

Exploit Prediction Scoring System (EPSS)

C.

Common Vulnerabilities and Exposures (CVE)

D.

Vulnerability Exploitability exchange (VEX)​

When does Dependabot alert you of a vulnerability in your software development process?

A.

When a pull request adding a vulnerable dependency is opened

B.

As soon as a vulnerable dependency is detected

C.

As soon as a pull request is opened by a contributor

D.

When Dependabot opens a pull request to update a vulnerable dependency

Which of the following information can be found in a repository's Security tab?

A.

Number of alerts per GHAS feature

B.

Two-factor authentication (2FA) options

C.

Access management

D.

GHAS settings

As a contributor, you discovered a vulnerability in a repository. Where should you look for the instructions on how to report the vulnerability?

A.

support.md

B.

readme.md

C.

contributing.md

D.

security.md

Page: 1 / 2
Total 75 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved