Spring Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

312-97 Sample Questions Answers

Questions 4

(GainInsights is an IT company that develops mobile applications software. On February 11, 2022, the organization became a victim of a cyber-attack. The attacker targeted the organization’s application and compromised some important functionality. After the incident, the DevSecOps team of GainInsights identified the cause of the security issue, resolved it, and noted it for future reference. Based on this information, which of the following set of tests was conducted by GainInsights?.)

Options:

A.

Blameless post-mortem.

B.

Security acceptance tests.

C.

Security smoke tests.

D.

White box testing.

Buy Now
Questions 5

(Kevin Williamson has been working as a DevSecOps engineer in an MNC company for the past 5 years. In January of 2017, his organization migrated all the applications and data from on-prem to AWS cloud due to the robust security feature and cost-effective services provided by Amazon. His organization is using Amazon DevOps services to develop software products securely and quickly. To detect errors in the code and to catch bugs in the application code, Kevin integrated PHPStan into the AWS pipeline for static code analysis. What will happen if security issues are detected in the application code?.)

Options:

A.

The integrated PHPStan into the AWS pipeline will invoke AWS CloudFormation to parse and send result to the security hub.

B.

The integrated PHPStan into the AWS pipeline will invoke AWS Config to parse and send result to the security hub.

C.

The integrated PHPStan into the AWS pipeline will invoke AWS Elastic BeanStalk to parse and send result to the security hub.

D.

The integrated PHPStan into the AWS pipeline will invoke the AWS Lambda function to parse and send result to the security hub.

Buy Now
Questions 6

(Matt LeBlanc has been working as a DevSecOps engineer in an IT company that develops software products and web applications for IoT devices. His team leader has asked him to use GitRob tool to find sensitive data in the organizational public GitHub repository. To install GitRob, Matt ensured that he has correctly configured Go >= 1.8 environment and that $GOPATH/bin is in his $PATH. The GitHub repository URL from which he is supposed to install the tool ishttps://github.com/michenriksen/gitrob . Which of the following command should Matt use to install GitRob?.)

Options:

A.

$ go get github.com/michenriksen/gitrob.

B.

$ go get gitrob github.com/michenriksen/gitrob.

C.

$ go git github.com/michenriksen/gitrob.

D.

$ go git gitrob github.com/michenriksen/gitrob.

Buy Now
Questions 7

(Patrick Fisher is a DevSecOps engineer in an IT company that develops software products and web applications. He is using IAST to analyze code for security vulnerabilities and to view real-time reports of the security issues. Patrick is using IAST in development, QA, and production stages to detect the vulnerabilities from the early stage of development, reduce the remediation cost, and keep the application secure. How can IAST perform SAST on every line of code and DAST on every request and response?.)

Options:

A.

Because IAST has access to server and local machine.

B.

Because IAST has access to the code and HTTP traffic.

C.

Because IAST has access to offline and runtime environment.

D.

Because IAST has access to internal and external agents.

Buy Now
Questions 8

(Kevin Williamson is working as a DevSecOps engineer in an IT company located in Los Angles, California. His team has integrated Jira with Jenkins to view every issue on Jira, including the status of the latest build or successful deployment of the work to an environment. Which of the following can Kevin use to search issues on Jira?)

Options:

A.

Java query language.

B.

Structured query language.

C.

Atlassian query language.

D.

Jira query language.

Buy Now
Questions 9

(Debra Aniston has recently joined an MNC company as a DevSecOps engineer. Her organization develops various types of software products and web applications. The DevSecOps team leader provided an application code and asked Debra to detect and mitigate security issues. Debra used w3af tool and detected cross-site scripting and SQL injection vulnerability in the source code. Based on this information, which category of security testing tools is represented by w3af?.)

Options:

A.

IAST.

B.

SCA.

C.

DAST.

D.

SAST.

Buy Now
Questions 10

(Jordon Garrett has recently joined a startup IT company located in Chicago, Illinois, as a DevSecOps engineer. His team leader asked him to find a SAST tool that can secure the organization Azure environment. Which of the following is a SAST tool that Jordon can select to secure his organization’s Azure environment?.)

Options:

A.

Coverity.

B.

Accurics.

C.

Tenable.io.

D.

DevSkim.

Buy Now
Questions 11

(Peter McCarthy is working in TetraVerse Soft Solution Pvt. Ltd. as a DevSecOps engineer. His organization develops customized software products and web applications. To develop software products quickly and securely, his organization has been using AWS cloud-based services, including AWS DevOps services. Peter would like to use CloudMapper to examine the AWS cloud environment and perform auditing for security issues. Which of the following privileges should Peter possess in order to collect information about the AWS account?.)

Options:

A.

arn:aws:iam::aws:policy/SecurityAudit arn:aws:iam::aws:policy/job-function/ViewOnlyAccess.

B.

arn:aws:iam::aws:policy/SecurityCheck arn:aws:iam::aws:policy/job-function/ViewOnlyAccess:: EditOnlyAccess.

C.

arn:aws:iam::aws:policy/SecurityAudit::SecurityCheck arn:aws:iam::aws:policy/job-role/ViewOnlyAccess:: EditOnlyAccess.

D.

arn:aws:iam::aws:policy/AWSLambdaFullAccess arn:aws:iam::aws:policy/job-role/ViewOnlyAccess.

Buy Now
Questions 12

(Richard Branson has been working as a DevSecOps engineer in an IT company that develops apps for Android mobiles. To manage the secret information of an application in various phases of development lifecycle and to provide fine-grained access to each secret, he would like to integrate HashiCorp Vault with Jenkins. To access the vault from Jenkins, Richard installed hashicorp-vault-plugin and ran a vault instance; he then selected the AppRole authentication method, which allows apps to access vault with a predefined role. Which of the following commands should Richard use to enable AppRole authentication?)

Options:

A.

enable vault auth approle.

B.

auth vault enable approle.

C.

vault auth enable approle.

D.

enable auth vault approle.

Buy Now
Questions 13

(Scott Adkins has recently joined an IT company located in New Orleans, Louisiana, as a DevSecOps engineer. He would like to build docker infrastructure using Terraform; therefore, he has created a directory named terraform-docker-container. He then changed into the directory using the command: cd terraform-docker-container. Now, Scott wants to create a file to define the infrastructure. Which of the following commands should Scott use to create a file to define the infrastructure?)

Options:

A.

cat main.tf.

B.

echo main.tf.

C.

touch main.tf.

D.

sudo main.tf.

Buy Now
Questions 14

(Brett Ryan has been working as a senior DevSecOps engineer in an IT company in Charleston, South Carolina. He is using git-mutimail tool to send email notification for every push to git repository. By default, the tool will send one output email providing details about the reference change and one output email for every new commit due to a reference change. How can Brett ensure that git-multimail is set up appropriately?)

Options:

A.

Running the environmental variable GITHUB_MULTIMAIL_CHECK_SETUP by setting it to non-empty string.

B.

Running the environmental variable GIT_MULTIMAIL_CHECK_SETUP by setting it to empty string.

C.

Running the environmental variable GIT_MULTIMAIL_CHECK_SETUP by setting it to non-empty string.

D.

Running the environmental variable GITHUB_MULTIMAIL_CHECK_SETUP by setting it to empty string.

Buy Now
Questions 15

(Andrew Gerrard has recently joined an IT company that develops software products and applications as a DevSecOps engineer. His team leader asked him to download a jar application from the organization GitHub repository and run the BDD security framework. Andrew successfully downloaded the jar application from the repository and executed the jar application; then, he cloned the BDD security framework. Which of the following commands should Andrew use to execute the authentication feature?.)

Options:

A.

/gradlev -Dcucumber.options=”–tags @authentication –tags @skip”.

B.

/gradlew -Dcucumber.options=”–tags @authentication –tags @skip”.

C.

./gradlev -Dcucumber.options=”–tags @authentication –tags ~@skip”.

D.

./gradlew -Dcucumber.options=”–tags @authentication –tags ~@skip”.

Buy Now
Questions 16

(Michael Rady recently joined an IT company as a DevSecOps engineer. His organization develops software products and web applications related to online marketing. Michael deployed a web application on Apache server. He would like to safeguard the deployed application from diverse types of web attacks by deploying ModSecurity WAF on Apache server. Which of the following command should Michael run to install ModSecurity WAF?)

Options:

A.

sudo apt install libapache2-mod-security2 –y.

B.

sudo apt install libapache2-mod-security2 –x.

C.

sudo apt install libapache2-mod-security2 –w.

D.

sudo apt install libapache2-mod-security2 –z.

Buy Now
Questions 17

(Sarah Wheeler is an experienced DevSecOps engineer. She recently joined an IT company that develops software products for customers stretched across the globe. Sarah would like to use a security testing tool that protects the application from false positives, network sniffing, tampering with code, etc. The tool should monitor the incoming traffic to the server and APIs for suspicious activities and help her team in remediating them during runtime. Which of the following tools should Sarah select that will help her team in precisely detecting and remediating the security issues in the application code during runtime?.)

Options:

A.

IAST.

B.

SAST.

C.

RASP.

D.

DAST.

Buy Now
Questions 18

(Steven Gerrard has been working as a DevSecOps engineer at an IT company that develops software products and applications related to the healthcare industry. His organization has been using Azure DevOps services to securely and quickly develop software products. To ensure that the deployed infrastructure is in accordance with the architecture and industrial standards and the security policies are appropriately implemented, she would like to integrate InSpec with Azure. Therefore, after installation and configuration of InSpec, she created InSpec profile file and upgraded it with personal metadata and Azure resource pack information; then she wrote the InSpec tests. Which of the following commands should Steven use to run InSpec tests to check the compliance of Azure infrastructure?)

Options:

A.

inspec exe inspec-tests/integration/ -t azure://.

B.

inspec exec inspec-tests/integration/ -it azure://.

C.

inspec exec inspec-tests/integration/ -t azure://.

D.

inspec exe inspec-tests/integration/ -it azure://.

Buy Now
Questions 19

(Robin Tunney has been working as a DevSecOps engineer in an IT company located in Charleston, South Carolina. She would like to build a customized docker image using HashiCorp Packer. Therefore, she installed Packer and created a file docker-ubuntu.pkr.hcl; she then added HCL block to it and saved the file. Which of the following commands should Robin execute to build the Docker image using Packer?)

Options:

A.

packer build docker-ubuntu.pkr.hcl.

B.

packer -b docker-ubuntu.pkr.hcl.

C.

packer b docker-ubuntu.pkr.hcl.

D.

packer -build docker-ubuntu.pkr.hcl.

Buy Now
Questions 20

(PentaByte is a software product development company located in Austin, Texas. The organization would like to secure communication methods to maintain confidentiality and security. How can PentaByte achieve secure by communication secure coding principle?)

Options:

A.

By preventing cyber security breach.

B.

By maintaining defense by depth and reducing attack surface area.

C.

By balancing the default configuration settings.

D.

By maintaining secure trust relationships.

Buy Now
Questions 21

(Debra Aniston is a DevSecOps engineer in an IT company that develops software products and web applications. Her team has found various coding issues in the application code. Debra would like to fix coding issues before they exist. She recommended a DevSecOps tool to the software developer team that highlights bugs and security vulnerabilities with clear remediation guidance, which helps in fixing security issues before the code is committed. Based on the information given, which of the following tools has Debra recommended to the software development team?)

Options:

A.

SonarLint.

B.

Arachni.

C.

OWASP ZAP.

D.

Tenable.io.

Buy Now
Questions 22

(Lisa Kramer carries an experience of 4 years as a DevSecOps engineer in an IT company. The software development team of her organization has developed a Ruby on Rails web application and would like to find vulnerabilities in Ruby dependencies. Therefore, the team leader of the software development team approached Lisa for help in this regard. Which of the following SCA tool should Lisa use to detect vulnerabilities in Ruby dependencies?)

Options:

A.

Bandit.

B.

Bundler-Audit.

C.

Retire.js.

D.

Tenable.io.

Buy Now
Questions 23

(Scott Morrison is working as a senior DevSecOps engineer at SUTRE SOFT Pvt. Ltd. His organization develops software and applications for IoT devices. Scott created a user story; he then created abuser stories under the user story. After that, he created threat scenarios under the abuser story, and then he created test cases for the threat scenarios. After defining the YAML, Scott would like to push the user-story driven threat model to the ThreatPlaybook server. Which of the following command Scott should use?.)

Options:

A.

playbook apply feature -f < path to the yaml file > -t test-project.

B.

playbook apply feature -y < path to the yaml file > -p test-project.

C.

playbook apply feature -f < path to the yaml file > -p test-project.

D.

playbook apply feature -p < path to the yaml file > -t test-project.

Buy Now
Questions 24

(Dustin Hoffman has been working as a DevSecOps engineer in an IT company located in San Diego, California. For detecting new security vulnerabilities at the beginning of the source code development, he would like to integrate Checkmarx SCA tool with GitLab. The Checkmarx template has all the jobs defined for pipeline. Where should Dustin incorporate the Checkmarx template file ‘https://raw.githubusercontent.com/checkmarx-ltd/cx-flow/develop/templates/gitlab/v3/Checkmarx.gitlab-ci.yml’?)

Options:

A.

gitlab-cd.yml root directory.

B.

gitlab-ci/cd.yml root directory.

C.

gitlab.yml root directory.

D.

gitlab-ci.yml root directory.

Buy Now
Questions 25

(Victor Garber is a DevSecOps team leader in SanSec Pvt. Ltd. His organization develops various types of software products and web applications. Currently, his team is working on security of Java-based web application product. How can Victor identify vulnerabilities that are missed in pre-production testing activities?.)

Options:

A.

By performing deploy-time checks.

B.

By performing test-time checks.

C.

By performing commit-time checks.

D.

By performing build-time checks.

Buy Now
Questions 26

(Richard Branson has been working as a DevSecOps engineer in an IT company since the past 7 years. He has launched an application in a container one month ago. Recently, he modified the container and would like to commit the changes to a new image. Which of the following commands should Branson use to save the current state of the container as a new image?.)

Options:

A.

container commit.

B.

docker push.

C.

container push.

D.

docker commit.

Buy Now
Questions 27

(Allen Smith has been working as a senior DevSecOps engineer for the past 4 years in an IT company that develops software products and applications for retail companies. To detect common security issues in the source code, he would like to integrate Bandit SAST tool with Jenkins. Allen installed Bandit and created a Jenkins job. In the Source Code Management section, he provided repository URL, credentials, and the branch that he wants to analyze. As Bandit is installed on Jenkins' server, he selected Execute shell for the Build step and configure Bandit script. After successfully integrating Bandit SAST tool with Jenkins, in which of the following can Allen detect security issues?.)

Options:

A.

Java code.

B.

Ruby code.

C.

Python code.

D.

C++ code.

Buy Now
Questions 28

(William McDougall has been working as a DevSecOps engineer in an IT company located in Sacramento, California. His organization has been using Microsoft Azure DevOps service to develop software products securely and quickly. To take proactive decisions related to security issues and to reduce the overall security risk, William would like to integrate ThreatModeler with Azure Pipelines. How can ThreatModeler be integrated with Azure Pipelines and made a part of William’s organization DevSecOps pipeline?)

Options:

A.

By using a bidirectional API.

B.

By using a unidirectional API.

C.

By using a unidirectional UI.

D.

By using a bidirectional UI.

Buy Now
Questions 29

(SinCaire is a software development company that develops web applications for various clients. To measure the successful implementation of DevSecOps, the organization enforced U.S. General Service Administrator (GSA) high-value DevSecOps metrics. Which of the following metrics implemented by SinCaire can measure the time between the code commit and production, and tracks the bug fix and new features throughout the development, testing, and production phases?)

Options:

A.

Mean time to recovery (for applications).

B.

Change volume (for application).

C.

Time to value.

D.

Change lead time (for application).

Buy Now
Questions 30

(Brett Ryan has been working as a senior DevSecOps engineer in a multinational company that develops web applications. The team leader of the software development team requested Brett to detect insecure JavaScript libraries in the web application code. Brett would like to perform the vulnerability scanning on web application with grunt-retire. Which of the following commands would enable grunt plugin?)

Options:

A.

grunt-loadNpmTasks('grunt-retire');.

B.

grunt-loadNpmTask('grunt-retire');.

C.

grunt.loadNpmTasks('grunt-retire');.

D.

grunt.loadNpmTask('grunt-retire');.

Buy Now
Exam Code: 312-97
Exam Name: EC-Council Certified DevSecOps Engineer (ECDE)
Last Update: Mar 4, 2026
Questions: 100
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now 312-97