Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

312-97 EC-Council Certified DevSecOps Engineer (ECDE) Questions and Answers

Questions 4

(Jordon Garrett has recently joined a startup IT company located in Chicago, Illinois, as a DevSecOps engineer. His team leader asked him to find a SAST tool that can secure the organization Azure environment. Which of the following is a SAST tool that Jordon can select to secure his organization’s Azure environment?.)

Options:

A.

Coverity.

B.

Accurics.

C.

Tenable.io.

D.

DevSkim.

Buy Now
Questions 5

(Gabriel Bateman has been working as a DevSecOps engineer in an IT company that develops virtual classroom software for online teaching. He would like to clone the BDD security framework on his local machine using the following URL,https://github.com/continuumsecurity/bdd-security.git . Which of the following command should Gabriel use to clone the BBD security framework?)

Options:

A.

github clonehttps://github.com/continumsecurity/bdd-security.git .

B.

git clonehttps://github.com/continuumsecurity/bdd-security.git .

C.

git clonehttps://github.com/continumsecurity/bdd-security.git .

D.

github clonehttps://github.com/continuumsecurity/bdd-security.git .

Buy Now
Questions 6

(Rockmond Dunbar is a senior DevSecOps engineer in a software development company. His organization develops customized software for retail industries. Rockmond would like to avoid setting mount propagation mode to share until it is required because when a volume is mounted in shared mode, it does not limit other containers to mount and modify that volume. If mounted volume is sensitive to changes, then it would be a serious security concern. Which of the following commands should Rockmond run to list out the propagation mode for mounted volumes?.)

Options:

A.

docker ps -quiet -all | xargs docker inspect -format ': Propagation='.

B.

docker ps --quiet --all | xargs docker inspect --format ': Propagation'.

C.

docker ps --quiet --all | xargs docker inspect --format ': Propagation='.

D.

docker ps -quiet -all | xargs docker inspect -format ': Propagation'.

Buy Now
Questions 7

(Matt LeBlanc has been working as a DevSecOps engineer in an IT company that develops software products and web applications for IoT devices. His team leader has asked him to use GitRob tool to find sensitive data in the organizational public GitHub repository. To install GitRob, Matt ensured that he has correctly configured Go >= 1.8 environment and that $GOPATH/bin is in his $PATH. The GitHub repository URL from which he is supposed to install the tool ishttps://github.com/michenriksen/gitrob . Which of the following command should Matt use to install GitRob?.)

Options:

A.

$ go get github.com/michenriksen/gitrob.

B.

$ go get gitrob github.com/michenriksen/gitrob.

C.

$ go git github.com/michenriksen/gitrob.

D.

$ go git gitrob github.com/michenriksen/gitrob.

Buy Now
Questions 8

(William Edwards is working as a DevSecOps engineer at SVR Software Solution Pvt. Ltd. His organization develops software products and applications related to digital marketing. William integrated Prisma Cloud with Jenkins to detect threat-intelligence based threat detection. This integration will allow him to scan container images and serverless functions for security issues in the CI/CD pipeline. Which of the following is employed by Prisma Cloud to understand the normal network behavior of each customer’s cloud environment to detect network anomalies and zero-day attacks effectively with minimal false positives?.)

Options:

A.

Advanced unsupervised machine learning.

B.

Advanced unsupervised data mining.

C.

Advanced supervised data mining.

D.

Advanced supervised machine learning.

Buy Now
Questions 9

(Rachel McAdams applied for the position of DevSecOps engineer at TetraSoft Pvt. Ltd. She gave her interview on February 23, 2022, and was selected as a DevSecOps engineer. Her team is working on securing Ruby on Rails application. Rachel’s team leader asked her to integrate Brakeman SAST tool with Jenkins. To perform the integration, she navigated to Jenkins Plugin Manager and installed Warnings Next Generation Plugin. To run the tool in Jenkins, she invoked Brakeman as part of an Execute shell build step. In the Execute shell column, she wrote the following commands with brakeman options

bash -l -c ‘

rvm install 3.0.0 && \

rvm use 3.0.0@brakeman –create && \

gem install brakeman && \

brakeman –no-progress –no-pager –no-exit-on-warn -o brakeman-output.json

What is the function of the –no-exit-on-warn option in the above-mentioned command?)

Options:

A.

It tells Brakeman to return a 1 exit code even if warnings are found.

B.

It tells Brakeman to return a 3 exit code even if warnings are found.

C.

It tells Brakeman to return a 0 exit code even if warnings are found.

D.

It tells Brakeman to return a 2 exit code even if warnings are found.

Buy Now
Questions 10

(Charles Drew has been working as a DevSecOps team leader in an IT company located in Nashville, Tennessee. He would like to look at the applications from an attacker’s perspective and make security a part of the organizations’ culture. Imagine, you are working under Charles as a DevSecOps engineer. Charles has asked you to install ThreatPlaybook, which is a unified DevSecOps Framework that allows you to go from iterative, collaborative threat modeling to application security testing orchestration. After installation, you must configure ThreatPlaybook CLI; therefore, you have created a directory for the project and then you go to the current directory where you would like to configure ThreatPlaybook. Which of the following commands will you use to configure ThreatPlaybook? (Here, < your-email > represents your email id; < host info > represents IP address; and < port > represents the nginx port.))

Options:

A.

playbook configure -e < your-email > -h < host-info > -p < port >.

B.

ThreatPlaybook configure -e < your-email > -u < host-info > -p < port >.

C.

ThreatPlaybook configure -e < your-email > -h < host-info > -p < port >.

D.

playbook configure -e < your-email > -u < host-info > -p < port >.

Buy Now
Questions 11

(Judi Dench has recently joined an IT company as a DevSecOps engineer. Her organization develops software products and web applications related to electrical engineering. Judi would like to use Anchore tool for container vulnerability scanning and Software Bill of Materials (SBOM) generation. Using Anchore grype, she would like to scan the container images and file systems for known vulnerabilities, and would like to find vulnerabilities in major operating system packages such as Alpine, CentOS, Ubuntu, etc. as well as language specific packages such as Ruby, Java, etc. Which of the following commands should Judi run to scan for vulnerabilities in the image using grype?)

Options:

A.

grype < image > --scope all-layers.

B.

grype packages < image > --scope all-layers.

C.

grype packages < image >.

D.

grype < image >.

Buy Now
Questions 12

(Robert Wheeler has been working as a DevSecOps engineer in an IT company for the past 5 years. His organization develops software products and web applications related to AutoCAD. Rob would like to integrate Rapid7 tCell Next-Gen Cloud WAF and RASP Tool with AWS CloudFront to protect application by identifying suspicious actors, enforcing content security policies (CSPs), and securing against unvalidated HTTP redirections on web applications. How can Rob deploy the tCell agent as a CloudFormation stack into his organization AWS account?.)

Options:

A.

By plugging into CloudFront through Lambda Function.

B.

By plugging into CloudFormation through Lambda Function.

C.

By plugging into CloudFront through Lambda@Edge.

D.

By plugging into CloudFormation through Lambda@Edge.

Buy Now
Questions 13

(William Scott, after completing his graduation in computer science, joined an IT company as a DevSecOps engineer. His team leader has asked him to use GitHub Code Scanning for evaluating the source code in his organization’s GitHub repository to detect security issues and coding errors. How can William set up coding scanning in GitHub repository?)

Options:

A.

By using Gauntlt.

B.

By using GitMiner.

C.

By using OWASP ZAP.

D.

By using CodeQL.

Buy Now
Questions 14

(Jason Wylie has been working as a DevSecOps engineer in an IT company located in Sacramento, California. He would like to use Jenkins for CI and Azure Pipelines for CD to deploy a Spring Boot app to an Azure Container Service (AKS) Kubernetes cluster. He created a namespace for deploying the Jenkins in AKS, and then deployed the Jenkins app to the Pod. Which of the following commands should Jason run to see the pods that have been spun up and running?)

Options:

A.

kubectl get pods -k Jenkins.

B.

kubectl get pods -s jenkins.

C.

kubectl get pods -n jenkins.

D.

kubectl get pods -p jenkins.

Buy Now
Questions 15

(Rachel Maddow has been working at RuizSoft Solution Pvt. Ltd. for the past 7 years as a senior DevSecOps engineer. To develop software products quickly and securely, her organization has been using AWS DevOps services. On January 1, 2022, the software development team of her organization developed a spring boot application with microservices and deployed it in AWS EC2 instance. Which of the following AWS services should Rachel use to scan the AWS workloads in EC2 instance for security issues and unintended network exposures?.)

Options:

A.

AWS Inspector.

B.

AWS WAF.

C.

AWS Config.

D.

Amazon CloudWatch.

Buy Now
Questions 16

(Gabriel Jarret has been working as a senior DevSecOps engineer in an IT company located in Houston, Texas. He is using Vault to manage secrets and protect sensitive data. On February 1, 2022, Gabriel wrote the secret using vault kv put secret/wejskt command. On February 10, 2022, his team detected a brute-force attack using Splunk monitoring tool. Gabriel would like to delete the secrets in the vault that he wrote on February 1, 2022. Which of the following commands should Gabriel use to delete a secret in Vault secret management tool?)

Options:

A.

vault kv -delete secret/wejskt.

B.

vault kv del secret/wejskt.

C.

vault kv -del secret/wejskt.

D.

vault kv delete secret/wejskt.

Buy Now
Questions 17

(Thomas Gibson has been working as a DevSecOps engineer in an IT company that develops software products and web applications related to law enforcement. To automatically execute a scan against the web apps, he would like to integrate InsightAppSec plugin with Jenkins. Therefore, Thomas generated a new API Key in the Insight platform. Now, he wants to install the plugin manually. How can Thomas install the InsightAppSec plugin manually in Jenkins?)

Options:

A.

By creating a .conf file and uploading to his Jenkins installation.

B.

By creating a .war file and uploading to his Jenkins installation.

C.

By creating a .zip file and uploading to his Jenkins installation.

D.

By creating a .hpi file and uploading to his Jenkins installation.

Buy Now
Questions 18

(Peter Dinklage has been working as a senior DevSecOps engineer at SacramentSoft Solution Pvt. Ltd. He has deployed applications in docker containers. His team leader asked him to check the exposure of unnecessary ports. Which of the following commands should Peter use to check all the containers and the exposed ports?)

Options:

A.

docker ps --quiet | xargs docker inspect --all --format : Ports=.

B.

docker ps --quiet | xargs docker inspect --format ': Ports='.

C.

docker ps --quiet | xargs docker inspect --format : Ports.

D.

docker ps --quiet | xargs docker inspect --all --format ': Ports='.

Buy Now
Questions 19

(Rahul Mehta is working as a DevSecOps engineer in an IT company that develops cloud-native web applications. His organization follows a strict DevSecOps practice and wants to ensure that third-party open-source dependencies used in the application do not introduce known security vulnerabilities. Rahul decided to integrate a Software Composition Analysis (SCA) tool into the CI pipeline so that every build is automatically scanned. During one of the builds, the SCA tool detects a critical vulnerability in a transitive dependency. What should ideally happen in a mature DevSecOps pipeline when such a critical vulnerability is detected at build time?.)

Options:

A.

The pipeline should log the vulnerability details and continue the build to avoid delivery delays.

B.

The pipeline should notify the security team and continue with deploy-time checks.

C.

The pipeline should fail the build and prevent the artifact from progressing further.

D.

The pipeline should ignore transitive dependencies and only scan direct dependencies.

Buy Now
Questions 20

(Jordon Garrett is working as a DevSecOps engineer in an IT company situated in Chicago, Illinois. His team prefers to use PowerShell for utilizing Git hooks because Bash and Windows are not compatible for advanced executions. For calling PowerShell script from Bash shell, Jordon wrote a PowerShell script using pre-commit logic such as pre-commit.ps1 and then executed the following commands

#!C:/Program\ Files/Git/usr/bin/sh.exe

exec powershell.exe -NoProfile -ExecutionPolicy Bypass -File "..git\hooks\pre-commit.ps1"

How would Jordon know that the commit is successful?.)

Options:

A.

If the code exits with 0, then the commit is successful.

B.

If the code exits with 1, then the commit is successful.

C.

If the code exits with 3, then the commit is successful.

D.

If the code exits with 2, then the commit is successful.

Buy Now
Questions 21

(Charles Rettig has been working as a DevSecOps engineer in an IT company that develops software and web applications for IoT devices. He integrated Burp Suite with Jenkins to detect vulnerabilities and evaluate attack vectors compromising web applications. Which of the following features offered by Burp Suite minimizes false positives and helps detect invisible vulnerabilities?)

Options:

A.

OAST.

B.

QAST.

C.

MAST.

D.

NAST.

Buy Now
Questions 22

(Andrew Gerrard has recently joined an IT company that develops software products and applications as a DevSecOps engineer. His team leader asked him to download a jar application from the organization GitHub repository and run the BDD security framework. Andrew successfully downloaded the jar application from the repository and executed the jar application; then, he cloned the BDD security framework. Which of the following commands should Andrew use to execute the authentication feature?.)

Options:

A.

/gradlev -Dcucumber.options=”–tags @authentication –tags @skip”.

B.

/gradlew -Dcucumber.options=”–tags @authentication –tags @skip”.

C.

./gradlev -Dcucumber.options=”–tags @authentication –tags ~@skip”.

D.

./gradlew -Dcucumber.options=”–tags @authentication –tags ~@skip”.

Buy Now
Questions 23

(Helena Luke has been working as a DevSecOps engineer in an IT company located in Denver, Colorado. To seamlessly secure source code during build time and enhance the runtime protection functionalities to the source code, she would like to integrate Jscrambler with GitLab. Therefore, she selected a predefined template and successfully downloaded the Jscrambler configuration file. She then placed the file in the project's root folder and renamed it as .jscramblerrc. To prevent the exposure of sensitive information, she opened the Jscrambler configuration file and removed the access and secret keys from it. In which of the following formats does the Jscrambler configuration file exist?.)

Options:

A.

JSON.

B.

XML.

C.

YAML.

D.

HTML.

Buy Now
Questions 24

(Richard Harris carries an experience of 5 years as a DevSecOps engineer. On February 1, 2022, he got the job of senior DevSecOps engineer in an IT company located Raleigh, North Carolina. He would like to trigger scan on each build in Jenkins, run customize scans for some specific vulnerabilities, fail the build process if a particular threat-level is reached, and generate reports automatically by integrating Acunetix DAST Tool with Jenkins. Richard installed Acunetix plugin successfully in Jenkins, after which he restarted Jenkins. He would like to find the path and install the certificate in Linux. Which of the following commands should Richard execute to find out the currently running Java binary in the Jenkins service?.)

Options:

A.

pc - aux | grep Jenkins.

B.

as - aux | grep Jenkins.

C.

ac - aux | grep Jenkins.

D.

ps - aux | grep Jenkins.

Buy Now
Questions 25

(Erica Mena has been working as a DevSecOps engineer in an IT company that provides customize software solutions to various clients across United States. To protect serverless and container applications with RASP, she would like to create an Azure container instance using Azure CLI in Microsoft PowerShell. She created the Azure container instance and loaded the container image to it. She then reviewed the deployment of the container instance. Which of the following commands should Erica run to get the logging information from the Azure container instance? (Assume the resource group name as ACI and container name as aci-test-closh.))

Options:

A.

az get container logs -resource-group ACI --name aci-test-closh.

B.

az get container logs --resource-group ACI --name aci-test-closh.

C.

az container logs -resource-group ACI -name aci-test-closh.

D.

az container logs --resource-group ACI --name aci-test-closh.

Buy Now
Questions 26

(Alex Hales has been working as a DevSecOps in an IT company that develops software products and web applications for visualizing scientific data. He would like to trigger a Jenkins build job using Git post commit script or hooks that helps his team in saving time by automating commit. Therefore, before triggering the build job, Alex made changes and saved the code in the respective IDE under Git repository and added the changes in the master branch using git add command and ran the post commit script to check the status of the build. Then, he navigated to the Jenkins project and selected the “Trigger build remotely from Build triggers” radio button. It would automate the trigger every time a change gets committed to the project. Alex navigated back to Bash terminal to trigger the build job. Which of the following commands should Alex use in Bash terminal to trigger the build job?)

Options:

A.

git commit -m “commit from terminal”.

B.

github commit -b “commit from terminal”.

C.

github commit -m “commit from terminal”.

D.

git commit -b “commit from terminal”.

Buy Now
Questions 27

(William Scott has been working as a senior DevSecOps engineer at GlobalSec Pvt. Ltd. His organization develops software products related to mobile apps. William would like to exploit Jenkins using Metasploit framework; therefore, he downloaded Metasploit. He would like to initiate an Nmap scan by specifying the target IP to find the version of Jenkins running on the machine. Which of the following commands should William use to find the version of Jenkins running on his machine using Nmap?.)

Options:

A.

Nmap -sN -sJ “Target IP”.

B.

Nmap -sJ -sN “Target IP”.

C.

Nmap -sS -sV “Target IP”.

D.

Nmap -sV -sS “Target IP”.

Buy Now
Questions 28

(BVR Pvt. Ltd. is an IT company that develops software products and applications related to IoT devices. The software development team of the organization is using Bitbucket repository to plan projects, collaborate on code, test, and deploy. The repository provides teams a single place for projects planning and collaboration on coding, testing, and deploying the software application. Which of the following is offered by Bitbucket to BVR Pvt. Ltd.?)

Options:

A.

Free limited public repositories.

B.

Free unlimited private repositories.

C.

Free limited private repositories.

D.

Free unlimited public repositories.

Buy Now
Questions 29

(Peter McCarthy is working in TetraVerse Soft Solution Pvt. Ltd. as a DevSecOps engineer. His organization develops customized software products and web applications. To develop software products quickly and securely, his organization has been using AWS cloud-based services, including AWS DevOps services. Peter would like to use CloudMapper to examine the AWS cloud environment and perform auditing for security issues. Which of the following privileges should Peter possess in order to collect information about the AWS account?.)

Options:

A.

arn:aws:iam::aws:policy/SecurityAudit arn:aws:iam::aws:policy/job-function/ViewOnlyAccess.

B.

arn:aws:iam::aws:policy/SecurityCheck arn:aws:iam::aws:policy/job-function/ViewOnlyAccess:: EditOnlyAccess.

C.

arn:aws:iam::aws:policy/SecurityAudit::SecurityCheck arn:aws:iam::aws:policy/job-role/ViewOnlyAccess:: EditOnlyAccess.

D.

arn:aws:iam::aws:policy/AWSLambdaFullAccess arn:aws:iam::aws:policy/job-role/ViewOnlyAccess.

Buy Now
Questions 30

(Robin Tunney has been working as a DevSecOps engineer in an IT company located in Charleston, South Carolina. She would like to build a customized docker image using HashiCorp Packer. Therefore, she installed Packer and created a file docker-ubuntu.pkr.hcl; she then added HCL block to it and saved the file. Which of the following commands should Robin execute to build the Docker image using Packer?)

Options:

A.

packer build docker-ubuntu.pkr.hcl.

B.

packer -b docker-ubuntu.pkr.hcl.

C.

packer b docker-ubuntu.pkr.hcl.

D.

packer -build docker-ubuntu.pkr.hcl.

Buy Now
Exam Code: 312-97
Exam Name: EC-Council Certified DevSecOps Engineer (ECDE)
Last Update: Mar 1, 2026
Questions: 100

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99