Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Microsoft GH-100 - GitHub Administration

Page: 2 / 2
Total 65 questions

A token was used to access an organization's resource via API. What fields in the audit log help determine who used it?

A.

The token's permissions and the geographic region of access

B.

The token expiration date

C.

The GitHub Actions runner name

D.

The token ID, requesting IP address, and associated user

You need GitHub to automatically notify a third-party service any time a new repository is created. You want to avoid writing custom code. The vendor has told you that they have a tool in the GitHub Marketplace. Which type of tool do you need?

A.

GitHub App

B.

GitHub Copilot Extension

C.

GitHub Models

D.

GitHub Action

You have subscribed to GitHub Premium Support, and you need to submit a support ticket. GitHub Premium Support can help you with:

A.

writing scripts.

B.

installing GitHub Enterprise Server.

C.

setting up hardware.

D.

integrating with third-party applications.

Which product's usage is not included in GitHub Enterprise Cloud's monthly metered billing report?

A.

Git LFS bandwidth

B.

GitHub Actions minutes

C.

GitHub Discussions engagement

D.

GitHub Packages storage

How does Dependabot determine which security update PRs to open?

A.

It waits for manual triage of all CVEs.

B.

It uses the dependency graph and Dependabot alerts to open PRs for patched versions.

C.

It reads the GitHub Issues and automatically suggests fixes.

D.

It compares your codebase to the GitHub Trending list.

What benefit does GitHub Advanced Security provide?

A.

helps organization administrators analyze and configure permissions to the least privilege required

B.

helps developers improve and maintain the security and quality of code

C.

helps enterprise administrators improve and maintain network security for their GitHub Enterprise Server instances

D.

helps organization administrators manage security tokens

What will happen if Dependabot discovers a vulnerable transitive dependency in a repository?

A.

It creates a pull request to update the direct dependency to a version that resolves the vulnerability.

B.

It opens a pull request to update the affected package directly, regardless of version compatibility.

C.

It automatically removes the package from the repository.

D.

It sends an email to the repository owner but does not alter code.

Why would someone choose to configure a security policy?

A.

To communicate corporate security and compliance policies for end users on a private repository.

B.

To provide information on an open source repository for open source collaborators and researchers that may need to report and disclose sensitive security findings to maintainers securely.

C.

To prevent anyone from pushing to the repository without approval.

D.

To define which open source packages are permitted for use as part of that repository.

Which practice helps avoid service disruption when consuming GitHub APIs at scale?

A.

Designingyour application to work within GitHub's rate limits

B.

Using multiple tokens to bypass limits

C.

Caching all API responses permanently

D.

Ignoring secondary rate limits