시험덤프
매달, 우리는 1000명 이상의 사람들이 시험 준비를 잘하고 시험을 잘 통과할 수 있도록 도와줍니다.
  / 312-97 덤프  / 312-97 문제 연습

EC-Council 312-97 시험

EC-Council Certified DevSecOps Engineer (ECDE) 온라인 연습

최종 업데이트 시간: 2025년10월10일

당신은 온라인 연습 문제를 통해 EC-Council 312-97 시험지식에 대해 자신이 어떻게 알고 있는지 파악한 후 시험 참가 신청 여부를 결정할 수 있다.

시험을 100% 합격하고 시험 준비 시간을 35% 절약하기를 바라며 312-97 덤프 (최신 실제 시험 문제)를 사용 선택하여 현재 최신 500개의 시험 문제와 답을 포함하십시오.

 / 8

Question No : 1


A security team is tasked with improving password management across an organization. They need to implement a policy that forces users to reset their passwords every 90 days while ensuring that old passwords cannot be reused.
What steps should they take to configure the password management system?

정답:
Explanation:
Enforcing password rotation every 90 days ensures that compromised passwords are replaced regularly, reducing the risk of long-term credential abuse. Requiring that old passwords cannot be reused ensures that users create new, strong passwords each time, enhancing overall security.

Question No : 2


During the deployment of an application that stores sensitive data, which configuration should be used to enable encryption at rest using AWS S3 bucket encryption?

정답:
Explanation:
Server-side encryption with AES-256 managed by AWS Key Management Service (KMS) ensures that data at rest in the S3 bucket is protected by strong encryption standards. AWS KMS automates the encryption and key management process, ensuring that sensitive data remains secure without manual intervention.

Question No : 3


A security team is tasked with enhancing API security.
What command correctly implements an HMAC-based authorization header for API requests?

정답:
Explanation:
HMAC (Hash-based Message Authentication Code) provides a secure way to authenticate API requests. The command shown creates an authorization header using HMAC, where the signature is generated through a secure hash algorithm, ensuring that the API request is from a verified user.

Question No : 4


In mobile DevSecOps, what command should be used to encrypt sensitive data before storing it in a shared preferences file on Android?

정답:
Explanation:
Using OpenSSL to encrypt sensitive data with AES-256-CBC before storing it in shared preferences provides a high level of security by ensuring that data cannot be read if accessed unauthorized. This method encrypts files securely using a robust algorithm, which is crucial for protecting sensitive information in mobile applications.

Question No : 5


Fill in the blank: To mitigate cross-site scripting (XSS) through input validation, it is essential to sanitize user inputs, especially in fields that accept HTML content. One effective method is to use _____ to encode input before it is rendered in the browser.

정답:
Explanation:
HTML character entity encoding converts potentially harmful characters into their respective HTML entities, which browsers interpret as display text rather than executable HTML or JavaScript, thus preventing XSS attacks.

Question No : 6


In a Jenkins pipeline, how should you securely handle API keys to avoid hardcoding them into the Jenkinsfile?

정답:
Explanation:
Using the withCredentials step in Jenkins securely injects the API key into the build environment, exposing it only where necessary and preventing it from being logged or stored in a way that is accessible after the process completes, thus adhering to best practices for sensitive data handling.

Question No : 7


What command would you use in Docker to securely pass secrets to a running container without leaving traces on the filesystem?

정답:
Explanation:
The --secret option in Docker securely provides access to a secret within a container without writing it to disk, thereby ensuring that sensitive data is not exposed on the host filesystem or within the containerâ??s writable layers, significantly enhancing the security of containerized applications.

Question No : 8


A DevOps team needs to update their CI/CD pipeline to integrate with Vault for secrets management.
What is a crucial first step they should take to secure API keys?

정답:
Explanation:
Configuring Vault with strict access policies before integrating it into the CI/CD pipeline ensures that the security of secrets is controlled and that only authorized entities have access based on defined roles, significantly reducing the risk of unauthorized access to sensitive data.

Question No : 9


In a simulated environment, an application developer implemented an input validation function. However, they reported unexpected crashes when certain inputs were processed. Analyze the scenario and identify the potential cause.

정답:
Explanation:
Lack of error handling and boundary checks in input validation can lead to buffer overflows, especially if input exceeds expected limits or contains unexpected characters, leading to application crashes.

Question No : 10


A DevSecOps engineer plans to integrate OWASP ZAP with their CI/CD pipeline.
Which setup would ensure that ZAP properly scans pull requests before merging?

정답:
Explanation:
Incorporating OWASP ZAP into the CI/CD pipeline using its Docker container allows for automated and consistent security testing. This setup ensures that every pull request is automatically scanned for vulnerabilities before it is merged, significantly improving the security audit process and maintaining code quality throughout the development lifecycle.

Question No : 11


Fill in the blank: To prevent unauthorized access to data in transit, the best practice is to use ____ to encrypt data transmitted between applications over a network.

정답:
Explanation:
Transport Layer Security (TLS) version 1.3 is recommended for encrypting data in transit. It provides strong encryption and enhanced security features compared to older protocols, protecting data from eavesdropping and tampering during transmission.

Question No : 12


Fill in the blank: To comply with data privacy regulations such as GDPR, personal data in transit must be encrypted using secure protocols like ____ to prevent unauthorized access.

정답:
Explanation:
Transport Layer Security (TLS) version 1.3 is a widely recognized protocol for encrypting data in transit. It offers improved security features over earlier versions, ensuring that personal data is protected during transmission between client and server.

Question No : 13


When configuring rate limits on API endpoints to mitigate DoS attacks, which of the following strategies ensures optimal performance while preventing misuse?

정답:
Explanation:
User-specific and IP-specific caps adjust based on behavior and provide flexible control, which balances usability and security by adapting to real usage patterns. This prevents abuse while maintaining accessibility for legitimate users.

Question No : 14


In a serverless architecture, what is the primary security benefit of segregating sensitive operations into dedicated Lambda functions?

정답:
Explanation:
By isolating sensitive operations in dedicated Lambda functions, any compromise only affects that limited part of the system, significantly reducing the breachâ??s impact by containing any potential damage to a confined area, enhancing overall security.

Question No : 15


Fill in the blank: In an IAST configuration, the security team must ensure that the __________ is capable
of handling real-time analysis and reporting.

정답:
Explanation:
A central monitoring dashboard is fundamental in an IAST setup to handle real-time data analysis and report on vulnerabilities efficiently. It centralizes security data, making it easier for teams to quickly assess and address security issues across applications.

 / 8
EC-Council