EC-Council 312-97 Exam Practice Questions (P. 1)
- Full Access (100 questions)
- One Year of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #1
Andrew Gerrard has recently joined an IT company located in Fairmont, California, as a DevSecOps engineer. Due to robust security and cost-effective service provided by AWS, his organization has migrated all the workloads from on-prem to AWS cloud in January of 2020. Andrew’s team leader has asked him to integrate AWS Secret Manager with Jenkins. To do so, Andrew installed the “AWS Secret Manager Credentials provider” plugin in Jenkins and configured an IAM policy in AWS that allows Jenkins to take secrets from AWS Secret manager. Which of the following file should Andrew edit to add access id and secret key parameters along with the region copied from AWS?
- A/etc/filebeat/filebeat.yml
- B/etc/sysconfig/Jenkins
- C/etc/file/Jenkins
- D/etc/sysconfig file/Jenkins
send
light_mode
delete
Question #2
Gabriel Bateman has been working as a DevSecOps engineer in an IT company that develops virtual classroom software for online teaching. He would like to clone the BDD security framework on his local machine using the following URL, https://github.com/continuumsecurity/bdd-security.git. Which of the following command should Gabriel use to clone the BBD security framework?
- Agit clone https://github.com/continuumsecurity/bdd-security.git
- Bgit clone https://github.com/continumsecurity/bdd-security.git
- Cgithub clone https://github.com/continumsecurity/bdd-security.git
- Dgithub clone https://github.com/continuumsecurity/bdd-security.git
send
light_mode
delete
Question #3
William Edwards is working as a DevSecOps engineer at SVR Software Solution Pvt. Ltd. His organization develops software products and applications related to digital marketing. William integrated Prisma Cloud with Jenkins to detect threat-intelligence based threat detection. This integration will allow him to scan container images and serverless functions for security issues in the CI/CD pipeline. Which of the following is employed by Prisma Cloud to understand the normal network behavior of each customer’s cloud environment to detect network anomalies and zero-day attacks effectively with minimal false positives?
- AAdvanced unsupervised machine learning
- BAdvanced supervised data mining
- CAdvanced supervised machine learning
- DAdvanced unsupervised data mining
send
light_mode
delete
Question #4
Terry Crews has been working as a DevSecOps engineer at an IT company that develops software products and web applications related to IoT devices. She integrated Sqreen RASP tool with Slack for sending notifications related to security issues to her team. How can Sqreen send notification alerts to Slack?
- ABy creating a cookbook, defining a trigger, Alert a response, and notification
- BBy creating a playbook, defining a trigger, security response, and notification
- CBy creating a cookbook, defining a trigger, security response, and notification
- DBy creating a playbook, defining a trigger, Alert a response, and notification
send
light_mode
delete
Question #5
Richard Branson has been working as a DevSecOps engineer in an IT company that develops apps for Android mobiles. To manage the secret information of an application in various phases of development lifecycle and to provide fine-grained access to each secret, he would like to integrate HashiCorp Vault with Jenkins. To access the vault from Jenkins, Richard installed hashicorp-vault-plugin and ran a vault instance; he then selected the AppRole authentication method, which allows apps to access vault with a predefined role. Which of the following commands should Richard use to enable AppRole authentication?
- Aenable auth vault approle
- Bvault auth enable approle
- Cenable vault auth approle
- Dauth vault enable approle
send
light_mode
delete
All Pages
