Which of the following is the most complete method for Dependabot to find vulnerabilities in third-party dependencies?
What filter or sort settings can be used to prioritize the secret scanning alerts that present the most risk?
Assuming that notification and alert recipients are not customized, what does GitHub do when it identifies a vulnerable dependency in a repository where Dependabot alerts are enabled? (Each answer presents part of the solution. Choose two.)
What role is required to change a repository's code scanning severity threshold that fails a pull request status check?
Which of the following statements best describes secret scanning push protection?
As a developer with write access, you navigate to a code scanning alert in your repository. When will GitHub close this alert?
Assuming security and analysis features are not configured at the repository, organization, or enterprise level, secret scanning is enabled on:
Which of the following tasks can be performed by a security team as a proactive measure to help address secret scanning alerts? (Each answer presents a complete solution. Choose two.)
Which of the following formats are used to describe a Dependabot alert? (Each answer presents a complete solution. Choose two.)
Which of the following options are code scanning application programming interface (API) endpoints? (Each answer presents part of the solution. Choose two.)
You are managing code scanning alerts for your repository. You receive an alert highlighting a problem with data flow. What do you click for additional context on the alert?
What should you do after receiving an alert about a dependency added in a pull request?
Which of the following information can be found in a repository's Security tab?