Which of the following secret scanning features can verify whether a secret is still active?
How many alerts are created when two instances of the same secret value are in the same repository?
Which Dependabot configuration fields are required? (Each answer presents part of the solution. Choose three.)
Which of the following benefits do code scanning, secret scanning, and dependency review provide?
Assuming that no custom Dependabot behavior is configured, who has the ability to merge a pull request created via Dependabot security updates?
Which key is required in the update settings of the Dependabot configuration file?
If default code security settings have not been changed at the repository, organization, or enterprise level, which repositories receive Dependabot alerts?
What step is required to run a SARIF-compatible (Static Analysis Results Interchange Format) tool on GitHub Actions?
As a developer with write access, you navigate to a code scanning alert in your repository. When will GitHub close this alert?
You are managing code scanning alerts for your repository. You receive an alert highlighting a problem with data flow. What do you click for additional context on the alert?
As a developer, you need to configure a code scanning workflow for a repository where GitHub Advanced Security is enabled. What minimum repository permission do you need?
If notification and alert recipients are not customized, which users receive notifications about new Dependabot alerts in an affected repository?
What do you need to do before you can define a custom pattern for a repository?