
|
|||||||||||||||||||||||||||
The GH-500 exam, officially titled GitHub Advanced Security, is a Microsoft
certification that validates an individual's expertise in securing software
development workflows using GitHub's advanced security features. It is designed
for experienced professionals in software development and security who have a
deep understanding of GitHub and its security capabilities.
Key Details:
Focus:
Securing GitHub repositories, managing vulnerabilities, and integrating
security practices throughout the software development lifecycle.
Audience:
System administrators, software developers, application administrators, and
IT professionals with intermediate-level experience in GitHub Enterprise
Administration.
Skills Measured:
Code scanning, secret scanning, dependency review, and security management
practices within GitHub.
Exam Format:
The exam includes a variety of question types, such as case studies, short
answers, multiple choice, and more.
Passing Score:
A score of 700 or greater is required to pass.
Languages:
The exam is available in English, Japanese, Chinese (Simplified), and
Korean.
Cost:
The exam costs USD $165, including taxes.
Exam Design
Audience Profile
This exam is designed for system administrators, software developers,
application administrators, and IT professionals with intermediate-level
experience in GitHub Enterprise Administration.
Skills Measured
NOTE: The bullets that follow each of the skills measured are intended to
illustrate how we are assessing that skill. Related topics may be covered in the
exam.
NOTE: Most questions cover features that are general availability (GA). The exam
may contain questions on Preview features if those features are commonly used.
Domain 1: Describe the GHAS security features and functionality (15%)
Contrast GHAS features and their role in the security ecosystem
Differentiate the security features that come automatically for open source
projects, and what features are available when GHAS is paired with GHEC or GHES
Describe the features and benefits of Security Overview
Describe the differences between secret scanning and code scanning
Describe how secret scanning, code scanning, and Dependabot create a more secure
software development life cycle
Contrast a security scenario with isolated security review and an advanced
scenario, with security integrated into each step of the software development
life cycle
Explain and use specific GHAS features
Describe how vulnerable dependencies are identified (by looking at the manifest
files and comparing with databases of known vulnerabilities)
Choose how to act on alerts from GHAS
Explain the implications of ignoring an alert
Explain the role of a developer when they discover a security alert
Describe the differences in access management to view alerts for different
security features
Identify where to use Dependabot alerts in the software development lifecycle
Domain 2: Configure and use secret scanning (15%)
Configure and use Secret Scanning
Describe secret scanning
Describe push protection
Describe validity checks
Contrast secret scanning availability for public and private repositories
Enable secret scanning for private repositories
Pick an appropriate response to a secret scanning alert
Determine if an alert is generated for a given secret, pattern, or service
provider
Determine if a given user role will see secret scanning alerts and how they will
be notified
Customize default secret scanning behavior
Configure the recipients of a secret scanning alert (also includes how to
provide access to members and teams other than admins)
Exclude certain files from being scanned for secrets
Enable custom secret scanning for a repository
Domain 3: Configure and use Dependabot and Dependency Review (35%)
Describe tools for managing vulnerabilities in dependencies
Define the dependency graph
Describe how the dependency graph is generated
Describe what a Software Bill of Materials (SBOM) is, and the SBOM format used
by GitHub
Define a dependency vulnerability
Describe Dependabot alerts
Describe Dependabot security updates
Describe Dependency Review
Describe how alerts are generated for vulnerable dependencies (driven from the
dependency graph, sourced from the GitHub Advisory Database)
Describe the difference between Dependabot and Dependency Review
Enable and configure tools for managing vulnerable dependencies
Identify the default settings for Dependabot alerts in public and private
repositories
Identify the permissions and roles required to enable Dependabot alerts
Identify the permissions and roles required to view Dependabot alerts
Enable Dependabot alerts for private repositories
Enable Dependabot alerts for organizations
Create a valid Dependabot configuration file to group security updates
Create a Dependabot Rule to auto-dismiss low severity alerts until a patch is
available
Create a Dependency Review GitHub Actions workflow
Configure license checks and custom severity thresholds in a Dependency Review
workflow
Configure notifications for vulnerable dependencies
Identify and remediate vulnerable dependencies
Identify a vulnerable dependency from a Dependabot alert
Identify vulnerable dependencies from a pull request
Enable Dependabot security updates
Remedy a vulnerability from a Dependabot alert in the Security tab (could
include updating or removing the dependency)
Remedy a vulnerability from a Dependabot alert in the context of a pull request
(could include updating or removing the dependency)
Take action on any Dependabot alerts by testing and merging pull requests
Domain 4: Configure and use Code Scanning with CodeQL (25%)
Use code scanning with third-party tools
Enable code scanning for use with a third-party analysis
Contrast the steps for using CodeQL versus third party analysis when enabling
code scanning
Contrast how to implement CodeQL analysis in a GitHub Actions workflow versus a
third-party CI tool
Upload 3rd party SARIF results via the SARIF endpoint
Describe and enable code scanning
Describe how code scanning fits in the software development life cycle
Contrast the frequency of code scanning workflows (scheduled versus triggered by
events)
Choose a triggering event for a given development pattern (for example, in a
pull request and for specific files)
Edit the default template for Actions workflow to fit an active, open source,
production repository
Describe how to view code scanning results from CodeQL analysis
Troubleshoot a failing code scanning workflow using CodeQL, including creating
or changing a custom configuration in the CodeQL workflow
Follow the data flow through code using the show paths experience
Explain the reason for a code scanning alert given documentation linked from the
alert
Determine if and why a code scanning alert needs to be dismissed
Describe potential shortfalls in CodeQL via model of compilation and language
support
Explain the purpose of defining a SARIF category
Domain 5: Describe GitHub Advanced Security best practices, results, and how
to take corrective measures (10%)
GitHub Advanced Security results & best practices
Use a Common Vulnerabilities and Exposures (CVE) and Common Weakness Enumeration
(CWE) to describe a GitHub Advanced Security alert and list potential
remediation
Describe the decision-making process for closing and dismissing security alerts
(documenting the dismissal, making a decision based on data)
Describe the default CodeQL query suites
Describe how CodeQL analyzes code and produces results, including differences
between compiled and interpreted language
Determine the roles and responsibilities of development and security teams on a
software development workflow
Describe how the severity threshold for code scanning pull request status checks
can be changed
Explain how filters and sorting can be used to prioritize secret scanning
remediation (validity:active)
Explain how CodeQL & Dependency Review workflows can be enforced with Repository
Rulesets
Describe how code scanning can be configured to identify and remediate
vulnerabilities earlier (scanning upon pull request)
Describe how secret scanning can be configured to identify and remediate
vulnerabilities earlier (enabling push protection)
Describe how dependency analysis can be configured to identify and remediate
vulnerabilities earlier (enable dependency review to scan upon pull request)
GH-500 Brain Dumps Exam + Online / Offline and Android Testing Engine & 4500+ other exams included
$50 - $25 (you save $25)
Buy Now
QUESTION 1
“ [Configure and Use Code Scanning]
After investigating a code scanning alert related to injection, you determine
that the input is properly
sanitized using custom logic. What should be your next step?
A. Draft a pull request to update the open-source query.
B. Ignore the alert.
C. Open an issue in the CodeQL repository.
D. Dismiss the alert with the reason "false positive."
Answer: D
Explanation:
When you identify that a code scanning alert is a false positive”such as
when your code uses a
custom sanitization method not recognized by the analysis”you should dismiss the
alert with the
reason "false positive." This action helps improve the accuracy of future
analyses and maintains the relevance of your security alerts.
As per GitHub's documentation:
"If you dismiss a CodeQL alert as a false positive result, for example because
the code uses a
sanitization library that isn't supported, consider contributing to the CodeQL
repository and improving the analysis."
By dismissing the alert appropriately, you ensure that your codebase's security
alerts remain actionable and relevant.
QUESTION 2
“ [Configure and Use Dependency Management]
When does Dependabot alert you of a vulnerability in your software development
process?
A. When a pull request adding a vulnerable dependency is opened
B. As soon as a vulnerable dependency is detected
C. As soon as a pull request is opened by a contributor
D. When Dependabot opens a pull request to update a vulnerable dependency
Answer: B
Explanation:
Dependabot alerts are generated as soon as GitHub detects a known vulnerability
in one of your
dependencies. GitHub does this by analyzing your repositorys dependency graph
and matching it
against vulnerabilities listed in the GitHub Advisory Database. Once a match is
found, the system
raises an alert automatically without waiting for a PR or manual action.
This allows organizations to proactively mitigate vulnerabilities as early as
possible, based on realtime detection.
Reference: GitHub Docs “ About Dependabot alerts; Managing alerts in GitHub
Dependabot
QUESTION 3
“ [Configure and Use Dependency Management]
Which of the following is the most complete method for Dependabot to find
vulnerabilities in thirdparty dependencies?
A. Dependabot reviews manifest files in the repository
B. CodeQL analyzes the code and raises vulnerabilities in third-party
dependencies
C. A dependency graph is created, and Dependabot compares the graph to the
GitHub Advisory database
D. The build tool finds the vulnerable dependencies and calls the Dependabot API
Answer: C
Explanation:
Dependabot builds a dependency graph by analyzing package manifests and
lockfiles in your
repository. This graph includes both direct and transitive dependencies. It then
compares this graph
against the GitHub Advisory Database, which includes curated, security-reviewed
advisories.
This method provides a comprehensive and automated way to discover all known
vulnerabilities
across your dependency tree.
Reference: GitHub Docs “ About the dependency graph; About Dependabot alerts
QUESTION 4
“ [Describe the GHAS Security Features and Functionality]
What is a security policy?
A. An automatic detection of security vulnerabilities and coding errors in new
or modified code
B. A security alert issued to a community in response to a vulnerability
C. A file in a GitHub repository that provides instructions to users about how
to report a security vulnerability
D. An alert about dependencies that are known to contain security
vulnerabilities
Answer: C
Explanation:
A security policy is defined by a SECURITY.md file in the root of your
repository or .github/ directory.
This file informs contributors and security researchers about how to responsibly
report
vulnerabilities. It improves your projects transparency and ensures timely
communication and
mitigation of any reported issues.
Adding this file also enables a oeReport a vulnerability button in the
repositorys Security tab.
Reference: GitHub Docs “ Adding a security policy to your repository
QUESTION 5
“ [Configure GitHub Advanced Security Tools in GitHub Enterprise]
As a repository owner, you want to receive specific notifications, including
security alerts, for an individual repository.
Which repository notification setting should you use?
A. Ignore
B. Participating and @mentions
C. All Activity
D. Custom
Answer: D
Explanation:
Using the Custom setting allows you to subscribe to specific event types, such
as Dependabot alerts
or vulnerability notifications, without being overwhelmed by all repository
activity. This is essential
for repository maintainers who need fine-grained control over what kinds of
events trigger notifications.
This setting is configurable per repository and allows users to stay aware of
critical issues while
minimizing notification noise.
Reference: GitHub Docs “ Configuring notifications; Managing security alerts
Students Feedback / Reviews/ Discussion
Mahrous Mostafa Adel Amin 1 week, 2 days ago - Abuhib- United Arab
Emirates
Passed the exam today, Got 98 questions in total, and 2 of them weren’t from
exam topics. Rest of them was exactly the same!
upvoted 4 times
Mbongiseni Dlongolo - South Africa2 weeks, 5 days ago
Thank you so much, I passed GH-500 today! 41 questions out of 44 are from
Certkingdom
upvoted 2 times
Kenyon Stefanie 1 month, 1 week ago - USA State / Province = Virginia
Thank you so much, huge help! I passed GH-500 Microsoft today! The big majority
of questions were from here.
upvoted 2 times
Danny 1 month, 1 week ago - United States CUSTOMER_STATE_NAME: Costa Mesa =
USA
Passed the exam today, 100% points. Got 44 questions in total, and 3 of them
weren’t from exam topics. Rest of them was exactly the same!
MENESES RAUL 93% 2 week ago - USA = Texas
was from this topic! I did buy the contributor access. Thank you certkingdom!
upvoted 4 times
Zemljaric Rok 1 month, 2 weeks ago - Ljubljana Slovenia
Cleared my exam today - Over 80% questions from here, many thanks certkingdom
and everyone for the meaningful discussions.
upvoted 2 times