Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

312-97 EC-Council Certified DevSecOps Engineer (ECDE) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

312-97 Practice Questions

EC-Council Certified DevSecOps Engineer (ECDE)

Last Update 1 day ago
Total Questions : 100

Dive into our fully updated and stable 312-97 practice test platform, featuring all the latest ECDE exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free ECDE practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 312-97. Use this test to pinpoint which areas you need to focus your study on.

312-97 PDF

312-97 PDF (Printable)
$43.75
$124.99

312-97 Testing Engine

312-97 PDF (Printable)
$50.75
$144.99

312-97 PDF + Testing Engine

312-97 PDF (Printable)
$63.7
$181.99
Question # 11

(William Scott, after completing his graduation in computer science, joined an IT company as a DevSecOps engineer. His team leader has asked him to use GitHub Code Scanning for evaluating the source code in his organization’s GitHub repository to detect security issues and coding errors. How can William set up coding scanning in GitHub repository?)

Options:

A.  

By using Gauntlt.

B.  

By using GitMiner.

C.  

By using OWASP ZAP.

D.  

By using CodeQL.

Discussion 0
Question # 12

(Terry Crews has been working as a DevSecOps engineer at an IT company that develops software products and web applications related to IoT devices. She integrated Sqreen RASP tool with Slack for sending notifications related to security issues to her team. How can Sqreen send notification alerts to Slack?)

Options:

A.  

By creating a cookbook, defining a trigger, security response, and notification.

B.  

By creating a cookbook, defining a trigger, Alert a response, and notification.

C.  

By creating a playbook, defining a trigger, Alert a response, and notification.

D.  

By creating a playbook, defining a trigger, security response, and notification.

Discussion 0
Question # 13

(Charles Rettig has been working as a DevSecOps engineer in an IT company that develops software and web applications for IoT devices. He integrated Burp Suite with Jenkins to detect vulnerabilities and evaluate attack vectors compromising web applications. Which of the following features offered by Burp Suite minimizes false positives and helps detect invisible vulnerabilities?)

Options:

A.  

OAST.

B.  

QAST.

C.  

MAST.

D.  

NAST.

Discussion 0
Question # 14

(Joyce Vincent has been working as a senior DevSecOps engineer at MazeSoft Solution Pvt. Ltd. She would like to integrate Trend Micro Cloud One RASP tool with Microsoft Azure to secure container-based application by inspecting the traffic, detecting vulnerabilities, and preventing threats. In Microsoft Azure PowerShell, Joyce created the Azure container instance in a resource group (ACI) (named “aci-test-closh”) and loaded the container image to it. She then reviewed the deployment of the container instance. Which of the following commands should Joyce use to get the logging information from the container?.)

Options:

A.  

az container logs --resource-group ACI --name aci-test-closh.

B.  

az container logs -resource-group ACI -name aci-test-closh.

C.  

azure container logs --resource-group ACI --name aci-test-closh.

D.  

azure container logs -resource-group ACI -name aci-test-closh.

Discussion 0
Question # 15

(Elizabeth Moss has been working as a DevSecOps engineer in an IT company located in San Diego, California. Due to the robust security and cost-effective service provided by AWS, her organization transferred all the workloads from on-prem to AWS cloud in 2017. Elizabeth would like to prevent committing AWS keys into repositories; therefore, she created a global git-templates directory using command line. Then, she created another directory, named it as hooks, wherein she created a file named pre-commit. In the pre-commit file, Elizabeth pasted the script that would prevent committing AWS keys into the repositories. She would like to ensure that the hook is executable. Which of the following command should Elizabeth run to make sure that the pre-commit hook is executable?)

Options:

A.  

chmod a+x ~/.git-templates/hooks/pre-commit.

B.  

chmod a+e ~/.git-templates/hooks/pre-commit.

C.  

chmod a+x ~/.hooks/git-templates/pre-commit.

D.  

chmod a+e ~/.hooks/git-templates/pre-commit.

Discussion 0
Question # 16

(Sarah Wheeler is an experienced DevSecOps engineer. She recently joined an IT company that develops software products for customers stretched across the globe. Sarah would like to use a security testing tool that protects the application from false positives, network sniffing, tampering with code, etc. The tool should monitor the incoming traffic to the server and APIs for suspicious activities and help her team in remediating them during runtime. Which of the following tools should Sarah select that will help her team in precisely detecting and remediating the security issues in the application code during runtime?.)

Options:

A.  

IAST.

B.  

SAST.

C.  

RASP.

D.  

DAST.

Discussion 0
Question # 17

(Lara Grice has been working as a DevSecOps engineer in an IT company located in Denver, Colorado. Her team leader has told her to save all the container images in the centos repository to centos-all.tar. Which of the following is a STDOUT command that Lara can use to save all the container images in the centos repository to centos-all.tar?.)

Options:

A.  

# docker save centos > centos all.tar.

B.  

# docker save centos > centos-all.tar.

C.  

# docker save centos < centos all.tar.

D.  

# docker save centos < centos-all.tar.

Discussion 0
Question # 18

(Erica Mena has been working as a DevSecOps engineer in an IT company that provides customize software solutions to various clients across United States. To protect serverless and container applications with RASP, she would like to create an Azure container instance using Azure CLI in Microsoft PowerShell. She created the Azure container instance and loaded the container image to it. She then reviewed the deployment of the container instance. Which of the following commands should Erica run to get the logging information from the Azure container instance? (Assume the resource group name as ACI and container name as aci-test-closh.))

Options:

A.  

az get container logs -resource-group ACI --name aci-test-closh.

B.  

az get container logs --resource-group ACI --name aci-test-closh.

C.  

az container logs -resource-group ACI -name aci-test-closh.

D.  

az container logs --resource-group ACI --name aci-test-closh.

Discussion 0
Question # 19

(Kevin Williamson is working as a DevSecOps engineer in an IT company located in Los Angles, California. His team has integrated Jira with Jenkins to view every issue on Jira, including the status of the latest build or successful deployment of the work to an environment. Which of the following can Kevin use to search issues on Jira?)

Options:

A.  

Java query language.

B.  

Structured query language.

C.  

Atlassian query language.

D.  

Jira query language.

Discussion 0
Question # 20

(Kevin Ryan has been working as a DevSecOps engineer in an MNC company that develops various software products and web applications. For easy management of secret credentials in CI/CD pipeline, he would like to integrate Azure Key Vault with Jenkins. Therefore, he created an Azure Key Vault, noted down the credentials displayed on the screen, and created a secret in Azure Key Vault. Then, he used the secret key from the credentials obtained from creating the vault. Kevin went back to Jenkins and installed Azure Key Vault plugin. Then, he navigated to Configure System under Manage Jenkins and added the URL for Azure Key Vault. How can Kevin complete the integration of Azure Key Vault with Jenkins?.)

Options:

A.  

By modifying old credentials in Global Credentials (unrestricted).

B.  

By creating new credentials in Global Credentials (unrestricted).

C.  

By creating new credentials in Global Credentials (restricted).

D.  

By modifying old credentials in Global Credentials (restricted).

Discussion 0
Get 312-97 dumps and pass your exam in 24 hours!

Free Exams Sample Questions