New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 312-97 Practice Exam with Questions & Answers | Set: 3

Questions 21

(Matt LeBlanc has been working as a DevSecOps engineer in an IT company that develops software products and web applications for IoT devices. His team leader has asked him to use GitRob tool to find sensitive data in the organizational public GitHub repository. To install GitRob, Matt ensured that he has correctly configured Go >= 1.8 environment and that $GOPATH/bin is in his $PATH. The GitHub repository URL from which he is supposed to install the tool ishttps://github.com/michenriksen/gitrob . Which of the following command should Matt use to install GitRob?.)

Options:
A.

$ go get github.com/michenriksen/gitrob.

B.

$ go get gitrob github.com/michenriksen/gitrob.

C.

$ go git github.com/michenriksen/gitrob.

D.

$ go git gitrob github.com/michenriksen/gitrob.

ECCouncil 312-97 Premium Access
Questions 22

(Evan Peters has been working as a DevSecOps engineer in an IT company located in Denver, Colorado. His organization has deployed various applications on Docker containers. Evan has been running SSH service inside the containers, and handling of SSH keys and access policies is a major security concern for him. What will be the solution for Evan security concern?)

Options:
A.

Run SSH on the registry and utilize docker exec for interacting with the container.

B.

Run SSH on the docker build and utilize docker exec for interacting with the container.

C.

Run SSH on the client and utilize docker exec for interacting with the container.

D.

Run SSH on the host and utilize docker exec for interacting with the container.

Questions 23

(Steven Gerrard has been working as a DevSecOps engineer at an IT company that develops software products and applications related to the healthcare industry. His organization has been using Azure DevOps services to securely and quickly develop software products. To ensure that the deployed infrastructure is in accordance with the architecture and industrial standards and the security policies are appropriately implemented, she would like to integrate InSpec with Azure. Therefore, after installation and configuration of InSpec, she created InSpec profile file and upgraded it with personal metadata and Azure resource pack information; then she wrote the InSpec tests. Which of the following commands should Steven use to run InSpec tests to check the compliance of Azure infrastructure?)

Options:
A.

inspec exe inspec-tests/integration/ -t azure://.

B.

inspec exec inspec-tests/integration/ -it azure://.

C.

inspec exec inspec-tests/integration/ -t azure://.

D.

inspec exe inspec-tests/integration/ -it azure://.

Questions 24

(Terry Crews has been working as a DevSecOps engineer at an IT company that develops software products and web applications related to IoT devices. She integrated Sqreen RASP tool with Slack for sending notifications related to security issues to her team. How can Sqreen send notification alerts to Slack?)

Options:
A.

By creating a cookbook, defining a trigger, security response, and notification.

B.

By creating a cookbook, defining a trigger, Alert a response, and notification.

C.

By creating a playbook, defining a trigger, Alert a response, and notification.

D.

By creating a playbook, defining a trigger, security response, and notification.

Questions 25

(Robert Wheeler has been working as a DevSecOps engineer in an IT company for the past 5 years. His organization develops software products and web applications related to AutoCAD. Rob would like to integrate Rapid7 tCell Next-Gen Cloud WAF and RASP Tool with AWS CloudFront to protect application by identifying suspicious actors, enforcing content security policies (CSPs), and securing against unvalidated HTTP redirections on web applications. How can Rob deploy the tCell agent as a CloudFormation stack into his organization AWS account?.)

Options:
A.

By plugging into CloudFront through Lambda Function.

B.

By plugging into CloudFormation through Lambda Function.

C.

By plugging into CloudFront through Lambda@Edge.

D.

By plugging into CloudFormation through Lambda@Edge.

Questions 26

(PentaByte is a software product development company located in Austin, Texas. The organization would like to secure communication methods to maintain confidentiality and security. How can PentaByte achieve secure by communication secure coding principle?)

Options:
A.

By preventing cyber security breach.

B.

By maintaining defense by depth and reducing attack surface area.

C.

By balancing the default configuration settings.

D.

By maintaining secure trust relationships.

Questions 27

(David Paymer has been working as a senior DevSecOps engineer in an IT company over the past 5 years. His organization is using Azure DevOps service to produce software products securely and quickly. David’s team leader asked him to publish a NuGet package utilizing a command line. Imagine you are in David’s place; which command would you use to publish NuGet package into the feed?.)

Options:
A.

nuget.exe publish -Source “< YOUR_FEED_NAME >” -ApiKey < ANY_STRING > < PACKAGE_PATH >.

B.

nuget.exe push -Destination “< YOUR_FEED_NAME >” -ApiKey < ANY_STRING > < PACKAGE_PATH >.

C.

nuget.exe publish -Destination “< YOUR_FEED_NAME >” -ApiKey < ANY_STRING > < PACKAGE_PATH >.

D.

nuget.exe push -Source “< YOUR_FEED_NAME >” -ApiKey < ANY_STRING > < PACKAGE_PATH >.

Questions 28

(Joyce Vincent has been working as a senior DevSecOps engineer at MazeSoft Solution Pvt. Ltd. She would like to integrate Trend Micro Cloud One RASP tool with Microsoft Azure to secure container-based application by inspecting the traffic, detecting vulnerabilities, and preventing threats. In Microsoft Azure PowerShell, Joyce created the Azure container instance in a resource group (ACI) (named “aci-test-closh”) and loaded the container image to it. She then reviewed the deployment of the container instance. Which of the following commands should Joyce use to get the logging information from the container?.)

Options:
A.

az container logs --resource-group ACI --name aci-test-closh.

B.

az container logs -resource-group ACI -name aci-test-closh.

C.

azure container logs --resource-group ACI --name aci-test-closh.

D.

azure container logs -resource-group ACI -name aci-test-closh.

Questions 29

(Debra Aniston has recently joined an MNC company as a DevSecOps engineer. Her organization develops various types of software products and web applications. The DevSecOps team leader provided an application code and asked Debra to detect and mitigate security issues. Debra used w3af tool and detected cross-site scripting and SQL injection vulnerability in the source code. Based on this information, which category of security testing tools is represented by w3af?.)

Options:
A.

IAST.

B.

SCA.

C.

DAST.

D.

SAST.

Questions 30

(Alexander Hamilton has been working as a senior DevSecOps engineer in an IT company located in Greenville, South Carolina. In January of 2012, his organization because a victim of a cyber security attack and incurred a tremendous loss. Alexander’s organization immediately adopted AWS cloud-based services after the attack to develop robust software products securely and quickly. To detect security issues in code review, Alexander would like to integrate SonarQube with AWS Pipeline; therefore, he created a pipeline in AWS using CloudFormation pipeline template. Then, he selected SonarQube tool from the tools dropdown, provided the required stack parameters, and also provided email address for receiving email notifications of changes in pipeline status and approvals. He deployed the pipeline after entering the required information. What will happen when changes are committed in the application repository?.)

Options:
A.

Cloud Config event is created.

B.

BinSkim event is created.

C.

CloudWatch event is created.

D.

Security Hub event is created.