Assuming security and analysis features are not configured at the repository, organization, or enterprise level, secret scanning is enabled on:
What do you need to do before you can define a custom pattern for a repository?
What role is required to change a repository's code scanning severity threshold that fails a pull request status check?
Which of the following information can be found in a repository's Security tab?
Where in the repository can you give additional users access to secret scanning alerts?
Assuming that no custom Dependabot behavior is configured, who has the ability to merge a pull request created via Dependabot security updates?
What step is required to run a SARIF-compatible (Static Analysis Results Interchange Format) tool on GitHub Actions?
What kind of repository permissions do you need to request a Common Vulnerabilities and Exposures (CVE) identification number for a security advisory?
Which details do you have to provide to create a custom pattern for secret scanning? (Each answer presents part of the solution. Choose two.)
When using the advanced CodeQL code scanning setup, what is the name of the workflow file?
Which Dependabot configuration fields are required? (Each answer presents part of the solution. Choose three.)
If default code security settings have not been changed at the repository, organization, or enterprise level, which repositories receive Dependabot alerts?
Which of the following options are code scanning application programming interface (API) endpoints? (Each answer presents part of the solution. Choose two.)