You are a maintainer of a repository and Dependabot notifies you of a vulnerability. Where could the vulnerability have been disclosed? (Each answer presents part of the solution. Choose two.)
When configuring code scanning with CodeQL, what are your options for specifying additional queries? (Each answer presents part of the solution. Choose two.)
What filter or sort settings can be used to prioritize the secret scanning alerts that present the most risk?
Assuming security and analysis features are not configured at the repository, organization, or enterprise level, secret scanning is enabled on:
What kind of repository permissions do you need to request a Common Vulnerabilities and Exposures (CVE) identification number for a security advisory?
If notification and alert recipients are not customized, which users receive notifications about new Dependabot alerts in an affected repository?
Where can you use CodeQL analysis for code scanning? (Each answer presents part of the solution. Choose two.)
Which alerts do you see in the repository ' s Security tab? (Each answer presents part of the solution. Choose three.)
Which of the following statements best describes secret scanning push protection?
Assuming that no custom Dependabot behavior is configured, who has the ability to merge a pull request created via Dependabot security updates?
Which of the following formats are used to describe a Dependabot alert? (Each answer presents a complete solution. Choose two.)
You have enabled security updates for a repository. When does GitHub mark a Dependabot alert as resolved for that repository?
Assuming that notification settings and Dependabot alert recipients have not been customized, which user account setting should you use to get an alert when a vulnerability is detected in one of your repositories?
Which of the following options are code scanning application programming interface (API) endpoints? (Each answer presents part of the solution. Choose two.)