In the pull request, how can developers avoid adding new dependencies with known vulnerabilities?
You have enabled security updates for a repository. When does GitHub mark a Dependabot alert as resolved for that repository?
Assuming there is no custom Dependabot behavior configured, where possible, what does Dependabot do after sending an alert about a vulnerable dependency in a repository?
As a developer, you need to configure a code scanning workflow for a repository where GitHub Advanced Security is enabled. What minimum repository permission do you need?
When using the advanced CodeQL code scanning setup, what is the name of the workflow file?
What do you need to do before you can define a custom pattern for a repository?
Where can you use CodeQL analysis for code scanning? (Each answer presents part of the solution. Choose two.)
What role is required to change a repository's code scanning severity threshold that fails a pull request status check?
Which of the following statements most accurately describes push protection for secret scanning custom patterns?