Assuming that no custom Dependabot behavior is configured, who has the ability to merge a pull request created via Dependabot security updates?
Assuming that notification settings and Dependabot alert recipients have not been customized, which user account setting should you use to get an alert when a vulnerability is detected in one of your repositories?
What filter or sort settings can be used to prioritize the secret scanning alerts that present the most risk?
Which alerts do you see in the repository's Security tab? (Each answer presents part of the solution. Choose three.)
After investigating a code scanning alert related to injection, you determine that the input is properly sanitized using custom logic. What should be your next step?
As a repository owner, you do not want to run a GitHub Actions workflow when changes are made to any .txt or markdown files. How would you adjust the event trigger for a pull request that targets the main branch? (Each answer presents part of the solution. Choose three.)
on:
pull_request:
branches: [main]
When secret scanning detects a set of credentials on a public repository, what does GitHub do?
How many alerts are created when two instances of the same secret value are in the same repository?
As a developer, you need to configure a code scanning workflow for a repository where GitHub Advanced Security is enabled. What minimum repository permission do you need?
Which of the following Watch settings could you use to get Dependabot alert notifications? (Each answer presents part of the solution. Choose two.)
Assuming that notification and alert recipients are not customized, what does GitHub do when it identifies a vulnerable dependency in a repository where Dependabot alerts are enabled? (Each answer presents part of the solution. Choose two.)
When using the advanced CodeQL code scanning setup, what is the name of the workflow file?