New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 312-97 Practice Exam with Questions & Answers | Set: 2

Questions 11

(Rockmond Dunbar is a senior DevSecOps engineer in a software development company. His organization develops customized software for retail industries. Rockmond would like to avoid setting mount propagation mode to share until it is required because when a volume is mounted in shared mode, it does not limit other containers to mount and modify that volume. If mounted volume is sensitive to changes, then it would be a serious security concern. Which of the following commands should Rockmond run to list out the propagation mode for mounted volumes?.)

Options:
A.

docker ps -quiet -all | xargs docker inspect -format ': Propagation='.

B.

docker ps --quiet --all | xargs docker inspect --format ': Propagation'.

C.

docker ps --quiet --all | xargs docker inspect --format ': Propagation='.

D.

docker ps -quiet -all | xargs docker inspect -format ': Propagation'.

ECCouncil 312-97 Premium Access
Questions 12

(Elizabeth Moss has been working as a DevSecOps engineer in an IT company located in San Diego, California. Due to the robust security and cost-effective service provided by AWS, her organization transferred all the workloads from on-prem to AWS cloud in 2017. Elizabeth would like to prevent committing AWS keys into repositories; therefore, she created a global git-templates directory using command line. Then, she created another directory, named it as hooks, wherein she created a file named pre-commit. In the pre-commit file, Elizabeth pasted the script that would prevent committing AWS keys into the repositories. She would like to ensure that the hook is executable. Which of the following command should Elizabeth run to make sure that the pre-commit hook is executable?)

Options:
A.

chmod a+x ~/.git-templates/hooks/pre-commit.

B.

chmod a+e ~/.git-templates/hooks/pre-commit.

C.

chmod a+x ~/.hooks/git-templates/pre-commit.

D.

chmod a+e ~/.hooks/git-templates/pre-commit.

Questions 13

(Matt LeBlanc has been working as a DevSecOps engineer in an IT company that develops software products and web applications for IoT devices. His team leader has asked him to use GitRob tool to find sensitive data in the organizational public GitHub repository. To install GitRob, Matt ensured that he has correctly configured Go >= 1.8 environment and that $GOPATH/bin is in his $PATH. The GitHub repository URL from which he is supposed to install the tool ishttps://github.com/michenriksen/gitrob . Which of the following command should Matt use to install GitRob?.)

Options:
A.

$ go get github.com/michenriksen/gitrob.

B.

$ go get gitrob github.com/michenriksen/gitrob.

C.

$ go git github.com/michenriksen/gitrob.

D.

$ go git gitrob github.com/michenriksen/gitrob.

Questions 14

(Jeremy Renner has been working as a senior DevSecOps engineer at an IT company that develops customized software to various customers stretched across the globe. His organization is using Microsoft Azure DevOps Services. Using an IaC tool, Jeremey deployed the infrastructure in Azure. He would like to integrate Chef InSpec with Azure to ensure that the deployed infrastructure is in accordance with the architecture and industrial standards and the security policies are appropriately implemented. Therefore, he downloaded and installed Chef InSpec. He used Azure CLI command for creating an Azure Service Principal with reader permission to the Azure resources, then he exported the generated credentials. After installation and configuration of Chef InSpec, he would like to create the structure and profile. Which of the following commands should Jeremy use to create a new folder jyren-azureTests with all the required artifacts for InSpec tests?)

Options:
A.

inspec init prof jyren-azureTests.

B.

inspec init profile jyren-azureTests.

C.

chef inspec init profile jyren-azureTests.

D.

chef inspec init profile jyren-azureTests.

Questions 15

(Brett Ryan has been working as a senior DevSecOps engineer in an IT company in Charleston, South Carolina. He is using git-mutimail tool to send email notification for every push to git repository. By default, the tool will send one output email providing details about the reference change and one output email for every new commit due to a reference change. How can Brett ensure that git-multimail is set up appropriately?)

Options:
A.

Running the environmental variable GITHUB_MULTIMAIL_CHECK_SETUP by setting it to non-empty string.

B.

Running the environmental variable GIT_MULTIMAIL_CHECK_SETUP by setting it to empty string.

C.

Running the environmental variable GIT_MULTIMAIL_CHECK_SETUP by setting it to non-empty string.

D.

Running the environmental variable GITHUB_MULTIMAIL_CHECK_SETUP by setting it to empty string.

Questions 16

(Cheryl Hines has been working as a senior DevSecOps engineer over the past 5 years in an IT company. Due to the robust features offered by Keywhiz secret management tool such as compatibility with all software, untraceable secrets, no impact of power cut or server outage, etc., Cheryl’s organization is using it for managing and distributing secrets. To add a secret using Keywhiz CLI, which of the following commands should Cheryl use?)

Options:
A.

$ keywhiz.cli --devTrustStore --user keywhizAdmin login

$ keywhiz.cli add secret --name mySecretName < mySecretFile.

B.

$ keywhiz.cli --devsecTrustStore --admin keywhizAdmin login

$ keywhiz.cli add secret --name mySecretName < mySecretFile.

C.

$ keywhiz.cli --devTrustStore --admin keywhizAdmin login

$ keywhiz.cli add secret --name mySecretName < mySecretFile.

D.

$ keywhiz.cli --DevSecTrustStore --user keywhizAdmin login

$ keywhiz.cli add secret --name mySecretName < mySecretFile.

Questions 17

(Steven Smith has been working as a DevSecOps engineer in an IT company that develops software products related to the financial sector. His team leader asked him to integrate Conjur with Jenkins to secure the secret credentials. Therefore, Steven downloaded Conjur.hpi file and uploaded it in the Upload Plugin section of Jenkins. He declared host and layers, and declared the variables. Which of the following commands should Steven use to set the value of variables?)

Options:
A.

$ conjur variable set -i < policy-path-of-variable-name > -v < secret-value >.

B.

$ conjur variable set -p < policy-path-of-variable-name > -s < secret-value >.

C.

$ conjur variable set -s < policy-path-of-variable-name > -p < secret-value >.

D.

$ conjur variable set -v < policy-path-of-variable-name > -i < secret-value >.

Questions 18

(Sarah Wheeler is an experienced DevSecOps engineer. She recently joined an IT company that develops software products for customers stretched across the globe. Sarah would like to use a security testing tool that protects the application from false positives, network sniffing, tampering with code, etc. The tool should monitor the incoming traffic to the server and APIs for suspicious activities and help her team in remediating them during runtime. Which of the following tools should Sarah select that will help her team in precisely detecting and remediating the security issues in the application code during runtime?.)

Options:
A.

IAST.

B.

SAST.

C.

RASP.

D.

DAST.

Questions 19

(Teresa Wheeler is a DevSecOps engineer at Altschutz Solution Pvt. Ltd. She would like to test the web applications and API’s from outside without accessing the source code using BDD security framework. The framework is a collection of Cucumber-JVM features that are pre-configured with OWASP ZAP, Nessus scanner, SSLyze, and Selenium. Hence, she downloaded and ran the jar application, and then cloned the BDD security framework. Next, she utilized a command for executing the authentication feature. Which of the following commands allows Teresa to execute all the features of BDD security framework, including the OWASP ZAP?.)

Options:
A.

./gardlew.

B.

/gardlev.

C.

/gardlew.

D.

./gardlev.

Questions 20

(Peter Dinklage has been working as a senior DevSecOps engineer at SacramentSoft Solution Pvt. Ltd. He has deployed applications in docker containers. His team leader asked him to check the exposure of unnecessary ports. Which of the following commands should Peter use to check all the containers and the exposed ports?)

Options:
A.

docker ps --quiet | xargs docker inspect --all --format : Ports=.

B.

docker ps --quiet | xargs docker inspect --format ': Ports='.

C.

docker ps --quiet | xargs docker inspect --format : Ports.

D.

docker ps --quiet | xargs docker inspect --all --format ': Ports='.