New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the ECCouncil ECDE 312-97 Questions and answers with Dumpstech

Exam 312-97 Premium Access

View all detail and faqs for the 312-97 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

(Jordon Garrett has recently joined a startup IT company located in Chicago, Illinois, as a DevSecOps engineer. His team leader asked him to find a SAST tool that can secure the organization Azure environment. Which of the following is a SAST tool that Jordon can select to secure his organization’s Azure environment?.)

Options:

A.

Coverity.

B.

Accurics.

C.

Tenable.io.

D.

DevSkim.

Questions # 2:

(Rachel McAdams has been working as a senior DevSecOps engineer in an IT company for the past 5 years. Her organization embraced AWS cloud service due to robust security and cost-effective features offered by it. To take proactive decisions related to the security issues and to minimize the overall security risk, Rachel integrated ThreatModeler with AWS. ThreatModeler utilizes various services in AWS to produce a robust threat model. How can Rachel automatically generate the threat model of her organization’s current AWS environment in ThreatModeler?.)

Options:

A.

By using YAML spec–based orchestration tools.

B.

By using Architect.

C.

By using STRIDE per Element.

D.

By using Accelerator.

Questions # 3:

(Judi Dench has recently joined an IT company as a DevSecOps engineer. Her organization develops software products and web applications related to electrical engineering. Judi would like to use Anchore tool for container vulnerability scanning and Software Bill of Materials (SBOM) generation. Using Anchore grype, she would like to scan the container images and file systems for known vulnerabilities, and would like to find vulnerabilities in major operating system packages such as Alpine, CentOS, Ubuntu, etc. as well as language specific packages such as Ruby, Java, etc. Which of the following commands should Judi run to scan for vulnerabilities in the image using grype?)

Options:

A.

grype < image > --scope all-layers.

B.

grype packages < image > --scope all-layers.

C.

grype packages < image >.

D.

grype < image >.

Questions # 4:

(Sofia Coppola has been working as a senior DevSecOps engineer in an MNC company located in Denver, Colorado. In January of 2020, her organization migrated all the workloads from on-prem to AWS cloud environment due to the robust security feature and cost-effective services offered by AWS. Which of the following is an Amazon Web Services-hosted version control tool that Sofia can use to manage and store assets in the AWS cloud?.)

Options:

A.

AWS CodeCommit.

B.

AWS CodePipeline.

C.

AWS CodeBuilt.

D.

AWS CodeDeploy.

Questions # 5:

(Brett Ryan has been working as a senior DevSecOps engineer in a multinational company that develops web applications. The team leader of the software development team requested Brett to detect insecure JavaScript libraries in the web application code. Brett would like to perform the vulnerability scanning on web application with grunt-retire. Which of the following commands would enable grunt plugin?)

Options:

A.

grunt-loadNpmTasks('grunt-retire');.

B.

grunt-loadNpmTask('grunt-retire');.

C.

grunt.loadNpmTasks('grunt-retire');.

D.

grunt.loadNpmTask('grunt-retire');.

Questions # 6:

(Elizabeth Moss has been working as a DevSecOps engineer in an IT company located in San Diego, California. Due to the robust security and cost-effective service provided by AWS, her organization transferred all the workloads from on-prem to AWS cloud in 2017. Elizabeth would like to prevent committing AWS keys into repositories; therefore, she created a global git-templates directory using command line. Then, she created another directory, named it as hooks, wherein she created a file named pre-commit. In the pre-commit file, Elizabeth pasted the script that would prevent committing AWS keys into the repositories. She would like to ensure that the hook is executable. Which of the following command should Elizabeth run to make sure that the pre-commit hook is executable?)

Options:

A.

chmod a+x ~/.git-templates/hooks/pre-commit.

B.

chmod a+e ~/.git-templates/hooks/pre-commit.

C.

chmod a+x ~/.hooks/git-templates/pre-commit.

D.

chmod a+e ~/.hooks/git-templates/pre-commit.

Questions # 7:

(Gabriel Bateman has been working as a DevSecOps engineer in an IT company that develops virtual classroom software for online teaching. He would like to clone the BDD security framework on his local machine using the following URL,https://github.com/continuumsecurity/bdd-security.git . Which of the following command should Gabriel use to clone the BBD security framework?)

Options:

A.

github clonehttps://github.com/continumsecurity/bdd-security.git .

B.

git clonehttps://github.com/continuumsecurity/bdd-security.git .

C.

git clonehttps://github.com/continumsecurity/bdd-security.git .

D.

github clonehttps://github.com/continuumsecurity/bdd-security.git .

Questions # 8:

(Nicholas Cascone has recently been recruited by an IT company from his college as a DevSecOps engineer. His team leader asked him to integrate GitHub Webhooks with Jenkins. To integrate GitHub Webhooks with Jenkins, Nicholas logged in to GitHub account; he then selected Settings > Webhooks > Add Webhook. In the Payload URL field, he is supposed to add Jenkins URL. Which of the following is the final Jenkins URL format that Nicholas should add in Payload URL field of GitHub to configure GitHub Webhooks with Jenkins?.)

Options:

A.

http://address:port/GiHhub-webhook/ .

B.

http://address:port/github_webhook/ .

C.

http://address:port/github-webhook/ .

D.

http://address:port/GitHub.webhook/ .

Questions # 9:

(Charles Rettig has been working as a DevSecOps engineer in an IT company that develops software and web applications for IoT devices. He integrated Burp Suite with Jenkins to detect vulnerabilities and evaluate attack vectors compromising web applications. Which of the following features offered by Burp Suite minimizes false positives and helps detect invisible vulnerabilities?)

Options:

A.

OAST.

B.

QAST.

C.

MAST.

D.

NAST.

Questions # 10:

(Richard Branson has been working as a DevSecOps engineer in an IT company that develops apps for Android mobiles. To manage the secret information of an application in various phases of development lifecycle and to provide fine-grained access to each secret, he would like to integrate HashiCorp Vault with Jenkins. To access the vault from Jenkins, Richard installed hashicorp-vault-plugin and ran a vault instance; he then selected the AppRole authentication method, which allows apps to access vault with a predefined role. Which of the following commands should Richard use to enable AppRole authentication?)

Options:

A.

enable vault auth approle.

B.

auth vault enable approle.

C.

vault auth enable approle.

D.

enable auth vault approle.

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions