New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

312-97 Exam Dumps - ECCouncil ECDE Questions and Answers

Question # 4

(Robert Wheeler has been working as a DevSecOps engineer in an IT company for the past 5 years. His organization develops software products and web applications related to AutoCAD. Rob would like to integrate Rapid7 tCell Next-Gen Cloud WAF and RASP Tool with AWS CloudFront to protect application by identifying suspicious actors, enforcing content security policies (CSPs), and securing against unvalidated HTTP redirections on web applications. How can Rob deploy the tCell agent as a CloudFormation stack into his organization AWS account?.)

Options:

A.

By plugging into CloudFront through Lambda Function.

B.

By plugging into CloudFormation through Lambda Function.

C.

By plugging into CloudFront through Lambda@Edge.

D.

By plugging into CloudFormation through Lambda@Edge.

Buy Now
Question # 5

(Trevor Noah has been working as a DevSecOps engineer in an IT company located in Detroit, Michigan. His team leader asked him to perform continuous threat modeling using ThreatSpec. To do so, Trevor installed and initialized ThreatSpec in the source code repository; he then started annotating the source code with security issues, actions, or concept. Trevor ran ThreatSpec against the application code and he wants to generate the threat model report. Which of the following command Trevor should use to generate the threat model report using ThreatSpec?.)

Options:

A.

$ ThreatSpec report.

B.

$ ThreatSpec Report.

C.

$ Threatspec Report.

D.

$ threatspec report.

Buy Now
Question # 6

(Sarah Wheeler is an experienced DevSecOps engineer. She recently joined an IT company that develops software products for customers stretched across the globe. Sarah would like to use a security testing tool that protects the application from false positives, network sniffing, tampering with code, etc. The tool should monitor the incoming traffic to the server and APIs for suspicious activities and help her team in remediating them during runtime. Which of the following tools should Sarah select that will help her team in precisely detecting and remediating the security issues in the application code during runtime?.)

Options:

A.

IAST.

B.

SAST.

C.

RASP.

D.

DAST.

Buy Now
Question # 7

(Kevin Ryan has been working as a DevSecOps engineer in an MNC company that develops various software products and web applications. For easy management of secret credentials in CI/CD pipeline, he would like to integrate Azure Key Vault with Jenkins. Therefore, he created an Azure Key Vault, noted down the credentials displayed on the screen, and created a secret in Azure Key Vault. Then, he used the secret key from the credentials obtained from creating the vault. Kevin went back to Jenkins and installed Azure Key Vault plugin. Then, he navigated to Configure System under Manage Jenkins and added the URL for Azure Key Vault. How can Kevin complete the integration of Azure Key Vault with Jenkins?.)

Options:

A.

By modifying old credentials in Global Credentials (unrestricted).

B.

By creating new credentials in Global Credentials (unrestricted).

C.

By creating new credentials in Global Credentials (restricted).

D.

By modifying old credentials in Global Credentials (restricted).

Buy Now
Question # 8

(Sandra Oliver joined SinClare Soft Pvt. Ltd. as a DevSecOps engineer in January of 2010. Her organization develops software and web applications related to the healthcare industry. Using IAST runtime security testing technology, she is detecting and diagnosing security issues in applications and APIs. The IAST solution used by Sandra encompasses a web scanner with an agent that works inside the server that hosts the application to provide additional analysis details such as the location of the vulnerability in the application code. Based on the given information, which of the following IAST solutions is Sandra using?)

Options:

A.

Active IAST.

B.

Semi-passive IAST.

C.

Semi-active IAST.

D.

Passive IAST.

Buy Now
Question # 9

(Thomas McInerney has been working as a senior DevSecOps engineer in an IT company that develops software products and web applications related to the healthcare sector. His organization deployed various applications in Docker containers. Thomas’ team leader would like to prevent a container from gaining new privileges. Therefore, he asked Thomas to set no_new_priv bit, which functions across clone, execve, and fork to prevent a container from gaining new privileges. Which of the following commands should Thomas use to list out security options for all the containers?)

Options:

A.

docker ps --quiet --all | xargs docker inspect --format ': SecurityOpt'.

B.

docker ps -quiet -all | xargs docker inspect --format ': SecurityOpt='.

C.

docker ps -quiet -all | xargs docker inspect --format ': SecurityOpt'.

D.

docker ps --quiet --all | xargs docker inspect --format ': SecurityOpt='.

Buy Now
Question # 10

(James Harden has been working as a senior DevSecOps engineer in an IT company located in Oakland, California. To detect vulnerabilities and to evaluate attack vectors compromising web applications, he would like to integrate Burp Suite with Jenkins. He downloaded the Burp Suite Jenkins plugins and then uploaded the plugin and successfully integrated Burp Suite with Jenkins. After integration, he would like to scan web application using Burp Suite; therefore, he navigated to Jenkins’ dashboard, opened an existing project, and clicked on Configure. Then, he navigated to the Build tab and selected Execute shell from Add build step. Which of the following commands should James enter under the Execute shell?.)

Options:

A.

sudo BURP_SCAN_URL =http://target-website.com .

B.

grep BURP_SCAN_URL =http://target-website.com .

C.

cat BURP_SCAN_URL =http://target-website.com .

D.

echo BURP_SCAN_URL =http://target-website.com .

Buy Now
Question # 11

(Jason Barry has been working as a DevSecOps engineer in an IT company that develops software products and applications for ecommerce companies. During the build-time check, Jason discovered SQL injection and XXS security issues in the application code. What action does the build-time check perform on the application code?.)

Options:

A.

It will ignore the security issue and continue the build process.

B.

It will send a message to issue and project management tool and continue with deploy-time check.

C.

It will send an alert to SIEM and continue with test-time check.

D.

It will stop the build process.

Buy Now
Question # 12

(William O’Neil has been working as a senior DevSecOps engineer in an IT company that develops software products related to ecommerce. At this point in time, his team is working on securing a python-based application. Using GitGraber, William would like to detect sensitive information in real-time in his organizational GitHub repository. Therefore, he downloaded GitGraber and installed the dependencies. Which of the following commands should William use to find secrets using a keyword (assume the keyword is yahoo)?.)

Options:

A.

python3 gitGraber.py -w wordlist/keywordsfile.txt -q "\yahoo" -s.

B.

python3 gitGraber.py -g wordlist/keywordsfile.txt -q "\yahoo" -s.

C.

python3 gitGraber.py -p wordlist/keywordsfile.txt -q "\yahoo" -s.

D.

python3 gitGraber.py -k wordlist/keywordsfile.txt -q "\yahoo" -s.

Buy Now
Question # 13

(Peter McCarthy is working in TetraVerse Soft Solution Pvt. Ltd. as a DevSecOps engineer. His organization develops customized software products and web applications. To develop software products quickly and securely, his organization has been using AWS cloud-based services, including AWS DevOps services. Peter would like to use CloudMapper to examine the AWS cloud environment and perform auditing for security issues. Which of the following privileges should Peter possess in order to collect information about the AWS account?.)

Options:

A.

arn:aws:iam::aws:policy/SecurityAudit arn:aws:iam::aws:policy/job-function/ViewOnlyAccess.

B.

arn:aws:iam::aws:policy/SecurityCheck arn:aws:iam::aws:policy/job-function/ViewOnlyAccess:: EditOnlyAccess.

C.

arn:aws:iam::aws:policy/SecurityAudit::SecurityCheck arn:aws:iam::aws:policy/job-role/ViewOnlyAccess:: EditOnlyAccess.

D.

arn:aws:iam::aws:policy/AWSLambdaFullAccess arn:aws:iam::aws:policy/job-role/ViewOnlyAccess.

Buy Now
Exam Code: 312-97
Exam Name: EC-Council Certified DevSecOps Engineer (ECDE)
Last Update: Jan 17, 2026
Questions: 100
312-97 pdf

312-97 PDF

$25.5  $84.99
312-97 Engine

312-97 Testing Engine

$28.5  $94.99
312-97 PDF + Engine

312-97 PDF + Testing Engine

$40.5  $134.99