View all detail and faqs for the GitHub-Advanced-Security exam
Where in the repository can you give additional users access to secret scanning alerts?
A secret scanning alert should be closed as "used in tests" when a secret is:
Why should you dismiss a code scanning alert?
What role is required to change a repository's code scanning severity threshold that fails a pull request status check?
Which Dependabot configuration fields are required? (Each answer presents part of the solution. Choose three.)
If notification and alert recipients are not customized, which users receive notifications about new Dependabot alerts in an affected repository?
As a developer with write access, you navigate to a code scanning alert in your repository. When will GitHub close this alert?
Which of the following is the most complete method for Dependabot to find vulnerabilities in third-party dependencies?
If default code security settings have not been changed at the repository, organization, or enterprise level, which repositories receive Dependabot alerts?
What step is required to run a SARIF-compatible (Static Analysis Results Interchange Format) tool on GitHub Actions?