New Year Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

312-97 EC-Council Certified DevSecOps Engineer (ECDE) is now Stable and With Pass Result | Test Your Knowledge for Free

312-97 Practice Questions

EC-Council Certified DevSecOps Engineer (ECDE)

Last Update 3 days ago
Total Questions : 100

Dive into our fully updated and stable 312-97 practice test platform, featuring all the latest ECDE exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our ECDE practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 312-97. Use this test to pinpoint which areas you need to focus your study on.

312-97 PDF

312-97 PDF (Printable)
$43.75
$124.99

312-97 Testing Engine

312-97 PDF (Printable)
$50.75
$144.99

312-97 PDF + Testing Engine

312-97 PDF (Printable)
$63.7
$181.99
Question # 1

(Matt LeBlanc has been working as a DevSecOps engineer in an IT company that develops software products and web applications for IoT devices. His team leader has asked him to use GitRob tool to find sensitive data in the organizational public GitHub repository. To install GitRob, Matt ensured that he has correctly configured Go >= 1.8 environment and that $GOPATH/bin is in his $PATH. The GitHub repository URL from which he is supposed to install the tool ishttps://github.com/michenriksen/gitrob . Which of the following command should Matt use to install GitRob?.)

Options:

A.  

$ go get github.com/michenriksen/gitrob.

B.  

$ go get gitrob github.com/michenriksen/gitrob.

C.  

$ go git github.com/michenriksen/gitrob.

D.  

$ go git gitrob github.com/michenriksen/gitrob.

Discussion 0
Question # 2

(Michael Rady recently joined an IT company as a DevSecOps engineer. His organization develops software products and web applications related to online marketing. Michael deployed a web application on Apache server. He would like to safeguard the deployed application from diverse types of web attacks by deploying ModSecurity WAF on Apache server. Which of the following command should Michael run to install ModSecurity WAF?)

Options:

A.  

sudo apt install libapache2-mod-security2 –y.

B.  

sudo apt install libapache2-mod-security2 –x.

C.  

sudo apt install libapache2-mod-security2 –w.

D.  

sudo apt install libapache2-mod-security2 –z.

Discussion 0
Question # 3

(Jason Barry has been working as a DevSecOps engineer in an IT company that develops software products and applications for ecommerce companies. During the build-time check, Jason discovered SQL injection and XXS security issues in the application code. What action does the build-time check perform on the application code?.)

Options:

A.  

It will ignore the security issue and continue the build process.

B.  

It will send a message to issue and project management tool and continue with deploy-time check.

C.  

It will send an alert to SIEM and continue with test-time check.

D.  

It will stop the build process.

Discussion 0
Question # 4

(Craig Kelly has been working as a software development team leader in an IT company over the past 8 years. His team is working on the development of an Android application product. Sandra Oliver, a DevSecOps engineer, used DAST tools and fuzz testing to perform advanced checks on the Android application product and detected critical and high severity issues. She provided the information about the security issues and the recommendations to mitigate them to Craig’s team. Which type of security checks performed by Sandra involve detection of critical and high severity issues using DAST tools and fuzz testing?)

Options:

A.  

Commit-time checks.

B.  

Build-time checks.

C.  

Deploy-time checks.

D.  

Test-time checks.

Discussion 0
Question # 5

(Orange International Pvt. Ltd. is an IT company that develops software products and web applications for Android phones. The organization recognizes the importance of secure coding principles and would like to enforce it. Therefore, Orange International Pvt. Ltd. established access management, avoided reinventing the wheel, secured the weak links, implemented in-depth defense, and reduced third-party involvement in the application. Based on the above-mentioned information, which of the following secure coding principles is achieved by the organization?.)

Options:

A.  

Secure by implementation.

B.  

Secure by default.

C.  

Secure by design.

D.  

Secure by communication.

Discussion 0
Question # 6

(Dustin Hoffman is a DevSecOps engineer at SantSol Pvt. Ltd. His organization develops software products and web applications related to mobile apps. Using Gauntlt, Dustin would like to facilitate testing and communication between teams and create actionable tests that can be hooked in testing and deployment process. Which of the following commands should Dustin use to install Gauntlt?.)

Options:

A.  

$ gems install Gauntlt.

B.  

$ gems install gauntlt.

C.  

$ gem install gauntlt.

D.  

$ gem install Gauntlt.

Discussion 0
Question # 7

(Scott Morrison is working as a senior DevSecOps engineer at SUTRE SOFT Pvt. Ltd. His organization develops software and applications for IoT devices. Scott created a user story; he then created abuser stories under the user story. After that, he created threat scenarios under the abuser story, and then he created test cases for the threat scenarios. After defining the YAML, Scott would like to push the user-story driven threat model to the ThreatPlaybook server. Which of the following command Scott should use?.)

Options:

A.  

playbook apply feature -f < path to the yaml file > -t test-project.

B.  

playbook apply feature -y < path to the yaml file > -p test-project.

C.  

playbook apply feature -f < path to the yaml file > -p test-project.

D.  

playbook apply feature -p < path to the yaml file > -t test-project.

Discussion 0
Question # 8

(Alex Hales has been working as a DevSecOps in an IT company that develops software products and web applications for visualizing scientific data. He would like to trigger a Jenkins build job using Git post commit script or hooks that helps his team in saving time by automating commit. Therefore, before triggering the build job, Alex made changes and saved the code in the respective IDE under Git repository and added the changes in the master branch using git add command and ran the post commit script to check the status of the build. Then, he navigated to the Jenkins project and selected the “Trigger build remotely from Build triggers” radio button. It would automate the trigger every time a change gets committed to the project. Alex navigated back to Bash terminal to trigger the build job. Which of the following commands should Alex use in Bash terminal to trigger the build job?)

Options:

A.  

git commit -m “commit from terminal”.

B.  

github commit -b “commit from terminal”.

C.  

github commit -m “commit from terminal”.

D.  

git commit -b “commit from terminal”.

Discussion 0
Question # 9

(Richard Harris carries an experience of 5 years as a DevSecOps engineer. On February 1, 2022, he got the job of senior DevSecOps engineer in an IT company located Raleigh, North Carolina. He would like to trigger scan on each build in Jenkins, run customize scans for some specific vulnerabilities, fail the build process if a particular threat-level is reached, and generate reports automatically by integrating Acunetix DAST Tool with Jenkins. Richard installed Acunetix plugin successfully in Jenkins, after which he restarted Jenkins. He would like to find the path and install the certificate in Linux. Which of the following commands should Richard execute to find out the currently running Java binary in the Jenkins service?.)

Options:

A.  

pc - aux | grep Jenkins.

B.  

as - aux | grep Jenkins.

C.  

ac - aux | grep Jenkins.

D.  

ps - aux | grep Jenkins.

Discussion 0
Question # 10

(Charlotte Flair is a DevSecOps engineer at Egma Soft Solution Pvt. Ltd. Her organization develops software and applications related to supply chain management. Charlotte would like to integrate Sqreen RASP tool with Slack to monitor the application at runtime for malicious activities and block them before they can damage the application. Therefore, she created a Sqreen account and installed Sqreen Microagent. Now, she would like to install the PHP microagent. To do so, she reviewed the PHP microagent’s compatibility, then she signed in to Sqreen account and noted the token in Notepad. Which of the following commands should Charlotte run in the terminal to install the PHP extension and the Sqreen daemon?.)

Options:

A.  

curl -shttps://download.sqreen.com/php/install.sh > sqreen-install.sh \ && bash sqreen-install.sh [CHARLOTTE’S ORG TOKEN HERE] “[ CHARLOTTE’S APP NAME HERE]”.

B.  

curl -shttps://download.sqreen.com/php/install.sh < sqreen-install.sh \ && bash sqreen-install.sh [CHARLOTTE’S ORG TOKEN HERE] “[ CHARLOTTE’S APP NAME HERE]”.

C.  

curl -ihttps://download.sqreen.com/php/install.sh > sqreen-install.sh \ && bash sqreen-install.sh [CHARLOTTE’S ORG TOKEN HERE] “[ CHARLOTTE’S APP NAME HERE]”.

D.  

curl -ihttps://download.sqreen.com/php/install.sh < sqreen-install.sh \ && bash sqreen-install.sh [CHARLOTTE’S ORG TOKEN HERE] “[ CHARLOTTE’S APP NAME HERE]”.

Discussion 0
Get 312-97 dumps and pass your exam in 24 hours!

Free Exams Sample Questions