Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

GH-500 GitHub Advanced Security Exam Questions and Answers

Questions 4

Which of the following is the most complete method for Dependabot to find vulnerabilities in third-party dependencies?

Options:

A.

Dependabot reviews manifest files in the repository

B.

CodeQL analyzes the code and raises vulnerabilities in third-party dependencies

C.

A dependency graph is created, and Dependabot compares the graph to the GitHub Advisory database

D.

The build tool finds the vulnerable dependencies and calls the Dependabot API

Buy Now
Questions 5

Which of the following options would close a Dependabot alert?

Options:

A.

Creating a pull request to resolve the vulnerability that will be approved and merged

B.

Viewing the Dependabot alert on the Dependabot alerts tab of your repository

C.

Viewing the dependency graph

D.

Leaving the repository in its current state

Buy Now
Questions 6

How many alerts are created when two instances of the same secret value are in the same repository?

Options:

A.

1

B.

2

C.

3

D.

4

Buy Now
Questions 7

What role is required to change a repository's code scanning severity threshold that fails a pull request status check?

Options:

A.

Maintain

B.

Write

C.

Triage

D.

Admin

Buy Now
Questions 8

What step is required to run a SARIF-compatible (Static Analysis Results Interchange Format) tool on GitHub Actions?​

Options:

A.

Update the workflow to include a final step that uploads the results.

B.

By default, the CodeQL runner automatically uploads results to GitHub on completion.

C.

The CodeQL action uploads the SARIF file automatically when it completes analysis.

D.

Use the CLI to upload results to GitHub.​

Buy Now
Questions 9

Which details do you have to provide to create a custom pattern for secret scanning? (Each answer presents part of the solution. Choose two.)

Options:

A.

The secret format

B.

The name of the pattern

C.

A list of repositories to scan

D.

Additional match requirements for the secret format

Buy Now
Questions 10

You are a maintainer of a repository and Dependabot notifies you of a vulnerability. Where could the vulnerability have been disclosed? (Each answer presents part of the solution. Choose two.)​

Options:

A.

In the National Vulnerability Database

B.

In the dependency graph

C.

In security advisories reported on GitHub

D.

In manifest and lock files

Buy Now
Questions 11

Which patterns are secret scanning validity checks available to?

Options:

A.

High entropy strings

B.

Custom patterns

C.

Partner patterns

D.

Push protection patterns

Buy Now
Questions 12

If default code security settings have not been changed at the repository, organization, or enterprise level, which repositories receive Dependabot alerts?

Options:

A.

Repositories owned by an enterprise account

B.

Private repositories

C.

None

D.

Repositories owned by an organization

Buy Now
Questions 13

As a contributor, you discovered a vulnerability in a repository. Where should you look for the instructions on how to report the vulnerability?

Options:

A.

support.md

B.

readme.md

C.

contributing.md

D.

security.md

Buy Now
Questions 14

If notification and alert recipients are not customized, which users receive notifications about new Dependabot alerts in an affected repository?

Options:

A.

Users with Write permissions to the repository

B.

Users with Admin privileges to the repository

C.

Users with Maintain privileges to the repository

D.

Users with Read permissions to the repository

Buy Now
Questions 15

What YAML syntax do you use to exclude certain files from secret scanning?

Options:

A.

decrypt_secret.sh

B.

paths-ignore:

C.

branches-ignore:

D.

secret scanning.yml

Buy Now
Questions 16

In the pull request, how can developers avoid adding new dependencies with known vulnerabilities?

Options:

A.

Enable Dependabot alerts.

B.

Add Dependabot rules.

C.

Add a workflow with the dependency review action.

D.

Enable Dependabot security updates.

Buy Now
Questions 17

What is a prerequisite to define a custom pattern for a repository?

Options:

A.

Change the repository visibility to Internal

B.

Close other secret scanning alerts

C.

Specify additional match criteria

D.

Enable secret scanning

Buy Now
Questions 18

After investigating a code scanning alert related to injection, you determine that the input is properly sanitized using custom logic. What should be your next step?

Options:

A.

Draft a pull request to update the open-source query.

B.

Ignore the alert.

C.

Open an issue in the CodeQL repository.

D.

Dismiss the alert with the reason "false positive."

Buy Now
Questions 19

Which of the following is the best way to prevent developers from adding secrets to the repository?

Options:

A.

Create a CODEOWNERS file

B.

Make the repository public

C.

Configure a security manager

D.

Enable push protection

Buy Now
Questions 20

When using CodeQL, what extension stores query suite definitions?

Options:

A.

.yml

B.

.ql

C.

.qll

D.

.qls

Buy Now
Questions 21

Where in the repository can you give additional users access to secret scanning alerts?

Options:

A.

Security

B.

Settings

C.

Secrets

D.

Insights

Buy Now
Questions 22

Which Dependabot configuration fields are required? (Each answer presents part of the solution. Choose three.)

Options:

A.

directory

B.

package-ecosystem

C.

milestone

D.

schedule.interval

E.

allow

Buy Now
Exam Code: GH-500
Exam Name: GitHub Advanced Security Exam
Last Update: Aug 12, 2025
Questions: 75
GH-500 pdf

GH-500 PDF

$33.25  $94.99
GH-500 Engine

GH-500 Testing Engine

$38.5  $109.99
GH-500 PDF + Engine

GH-500 PDF + Testing Engine

$50.75  $144.99