ECCouncil 312-97 - Certified DevSecOps Engineer (ECDE) Exam
Page: 1 / 20
Total 100 questions
Question #1 (Topic: Exam A)
Andrew Gerrard has recently joined an IT company located in Fairmont, California, as a DevSecOps engineer. Due to robust security and cost-effective service provided by AWS, his organization has migrated all the workloads from on-prem to AWS cloud in January of 2020. Andrew’s team leader has asked him to integrate AWS Secret Manager with Jenkins. To do so, Andrew installed the “AWS Secret Manager Credentials provider” plugin in Jenkins and configured an IAM policy in AWS that allows Jenkins to take secrets from AWS Secret manager. Which of the following file should Andrew edit to add access id and secret key parameters along with the region copied from AWS?
A. /etc/filebeat/filebeat.yml
B. /etc/sysconfig/Jenkins
C. /etc/file/Jenkins
D. /etc/sysconfig file/Jenkins
Answer: B
Question #2 (Topic: Exam A)
Gabriel Bateman has been working as a DevSecOps engineer in an IT company that develops virtual classroom software for online teaching. He would like to clone the BDD security framework on his local machine using the following URL, https://github.com/continuumsecurity/bdd-security.git. Which of the following command should Gabriel use to clone the BBD security framework?
A. git clone https://github.com/continuumsecurity/bdd-security.git
B. git clone https://github.com/continumsecurity/bdd-security.git
C. github clone https://github.com/continumsecurity/bdd-security.git
D. github clone https://github.com/continuumsecurity/bdd-security.git
Answer: A
Question #3 (Topic: Exam A)
William Edwards is working as a DevSecOps engineer at SVR Software Solution Pvt. Ltd. His organization develops software products and applications related to digital marketing. William integrated Prisma Cloud with Jenkins to detect threat-intelligence based threat detection. This integration will allow him to scan container images and serverless functions for security issues in the CI/CD pipeline. Which of the following is employed by Prisma Cloud to understand the normal network behavior of each customer’s cloud environment to detect network anomalies and zero-day attacks effectively with minimal false positives?
A. Advanced unsupervised machine learning
B. Advanced supervised data mining
C. Advanced supervised machine learning
D. Advanced unsupervised data mining
Answer: A
Question #4 (Topic: Exam A)
Terry Crews has been working as a DevSecOps engineer at an IT company that develops software products and web applications related to IoT devices. She integrated Sqreen RASP tool with Slack for sending notifications related to security issues to her team. How can Sqreen send notification alerts to Slack?
A. By creating a cookbook, defining a trigger, Alert a response, and notification
B. By creating a playbook, defining a trigger, security response, and notification
C. By creating a cookbook, defining a trigger, security response, and notification
D. By creating a playbook, defining a trigger, Alert a response, and notification
Answer: C
Question #5 (Topic: Exam A)
Richard Branson has been working as a DevSecOps engineer in an IT company that develops apps for Android mobiles. To manage the secret information of an application in various phases of development lifecycle and to provide fine-grained access to each secret, he would like to integrate HashiCorp Vault with Jenkins. To access the vault from Jenkins, Richard installed hashicorp-vault-plugin and ran a vault instance; he then selected the AppRole authentication method, which allows apps to access vault with a predefined role. Which of the following commands should Richard use to enable AppRole authentication?
A. enable auth vault approle
B. vault auth enable approle
C. enable vault auth approle
D. auth vault enable approle
Answer: B