New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

312-97 Exam Dumps - ECCouncil ECDE Questions and Answers

Question # 24

(Rachel McAdams has been working as a senior DevSecOps engineer in an IT company for the past 5 years. Her organization embraced AWS cloud service due to robust security and cost-effective features offered by it. To take proactive decisions related to the security issues and to minimize the overall security risk, Rachel integrated ThreatModeler with AWS. ThreatModeler utilizes various services in AWS to produce a robust threat model. How can Rachel automatically generate the threat model of her organization’s current AWS environment in ThreatModeler?.)

Options:

A.

By using YAML spec–based orchestration tools.

B.

By using Architect.

C.

By using STRIDE per Element.

D.

By using Accelerator.

Buy Now
Question # 25

(Amy Ryan is a DevSecOps engineer in an IT company that develops software products and web applications related to cyber security. She is using Anchore tool for container vulnerability scanning and Software Bill of Materials (SBOM) generation. It helped her to perform quick scanning and generating a list of known vulnerabilities from an SBOM, container image, or project directory. Which of the following commands should Amy run to include software from all the image layers in the SBOM?.)

Options:

A.

syft packages < image > scope all_layers SBOM.

B.

syft packages < image > --scope all-layers Anchore.

C.

syft packages < image > scope all_layers.

D.

syft packages < image > --scope all-layers.

Buy Now
Question # 26

(William Scott, after completing his graduation in computer science, joined an IT company as a DevSecOps engineer. His team leader has asked him to use GitHub Code Scanning for evaluating the source code in his organization’s GitHub repository to detect security issues and coding errors. How can William set up coding scanning in GitHub repository?)

Options:

A.

By using Gauntlt.

B.

By using GitMiner.

C.

By using OWASP ZAP.

D.

By using CodeQL.

Buy Now
Question # 27

(Victor Garber is a DevSecOps team leader in SanSec Pvt. Ltd. His organization develops various types of software products and web applications. Currently, his team is working on security of Java-based web application product. How can Victor identify vulnerabilities that are missed in pre-production testing activities?.)

Options:

A.

By performing deploy-time checks.

B.

By performing test-time checks.

C.

By performing commit-time checks.

D.

By performing build-time checks.

Buy Now
Question # 28

(Brett Ryan has been working as a senior DevSecOps engineer in an IT company in Charleston, South Carolina. He is using git-mutimail tool to send email notification for every push to git repository. By default, the tool will send one output email providing details about the reference change and one output email for every new commit due to a reference change. How can Brett ensure that git-multimail is set up appropriately?)

Options:

A.

Running the environmental variable GITHUB_MULTIMAIL_CHECK_SETUP by setting it to non-empty string.

B.

Running the environmental variable GIT_MULTIMAIL_CHECK_SETUP by setting it to empty string.

C.

Running the environmental variable GIT_MULTIMAIL_CHECK_SETUP by setting it to non-empty string.

D.

Running the environmental variable GITHUB_MULTIMAIL_CHECK_SETUP by setting it to empty string.

Buy Now
Question # 29

(Gabriel Bateman has been working as a DevSecOps engineer in an IT company that develops virtual classroom software for online teaching. He would like to clone the BDD security framework on his local machine using the following URL,https://github.com/continuumsecurity/bdd-security.git . Which of the following command should Gabriel use to clone the BBD security framework?)

Options:

A.

github clonehttps://github.com/continumsecurity/bdd-security.git .

B.

git clonehttps://github.com/continuumsecurity/bdd-security.git .

C.

git clonehttps://github.com/continumsecurity/bdd-security.git .

D.

github clonehttps://github.com/continuumsecurity/bdd-security.git .

Buy Now
Question # 30

(William Scott has been working as a senior DevSecOps engineer at GlobalSec Pvt. Ltd. His organization develops software products related to mobile apps. William would like to exploit Jenkins using Metasploit framework; therefore, he downloaded Metasploit. He would like to initiate an Nmap scan by specifying the target IP to find the version of Jenkins running on the machine. Which of the following commands should William use to find the version of Jenkins running on his machine using Nmap?.)

Options:

A.

Nmap -sN -sJ “Target IP”.

B.

Nmap -sJ -sN “Target IP”.

C.

Nmap -sS -sV “Target IP”.

D.

Nmap -sV -sS “Target IP”.

Buy Now
Question # 31

(Sarah Wright has recently joined a multinational company as a DevSecOps engineer. She has created a container and deployed a web application in it. Sarah would like to stop this container. Which of the following commands stop the running container created by Sarah Wright?)

Options:

A.

[root@574bac18f89d /]# kill.

B.

[root@574bac18f89d /]# exit.

C.

[root@574bac18f89d /]# clear.

D.

[root@574bac18f89d /]# stop.

Buy Now
Question # 32

(Nicholas Cascone has recently been recruited by an IT company from his college as a DevSecOps engineer. His team leader asked him to integrate GitHub Webhooks with Jenkins. To integrate GitHub Webhooks with Jenkins, Nicholas logged in to GitHub account; he then selected Settings > Webhooks > Add Webhook. In the Payload URL field, he is supposed to add Jenkins URL. Which of the following is the final Jenkins URL format that Nicholas should add in Payload URL field of GitHub to configure GitHub Webhooks with Jenkins?.)

Options:

A.

http://address:port/GiHhub-webhook/ .

B.

http://address:port/github_webhook/ .

C.

http://address:port/github-webhook/ .

D.

http://address:port/GitHub.webhook/ .

Buy Now
Question # 33

(Richard Branson has been working as a DevSecOps engineer in an IT company that develops apps for Android mobiles. To manage the secret information of an application in various phases of development lifecycle and to provide fine-grained access to each secret, he would like to integrate HashiCorp Vault with Jenkins. To access the vault from Jenkins, Richard installed hashicorp-vault-plugin and ran a vault instance; he then selected the AppRole authentication method, which allows apps to access vault with a predefined role. Which of the following commands should Richard use to enable AppRole authentication?)

Options:

A.

enable vault auth approle.

B.

auth vault enable approle.

C.

vault auth enable approle.

D.

enable auth vault approle.

Buy Now
Exam Code: 312-97
Exam Name: EC-Council Certified DevSecOps Engineer (ECDE)
Last Update: Jan 18, 2026
Questions: 100
312-97 pdf

312-97 PDF

$25.5  $84.99
312-97 Engine

312-97 Testing Engine

$28.5  $94.99
312-97 PDF + Engine

312-97 PDF + Testing Engine

$40.5  $134.99