🔒 Security Administration - GH-ADMIN Practice Questions

Configure SSO/SAML, 2FA enforcement, audit logs, IP allow lists, and security features for organizations.

3Questions Available
1Exam Domains

Practice Security Questions Now

Start a timed practice session focusing on Security Administration topics from the GH-ADMIN question bank.

Start GH-ADMIN Practice Quiz →

GH-ADMIN Security Question Bank (3 Questions)

Browse all 3 practice questions covering Security Administration for the GH-ADMIN certification exam. Each question includes the full answer and a detailed explanation to help you understand the concepts.

  1. Question 1Manage User Identities and Authentication

    What does SAML SSO integration with GitHub allow?

    AUsers to sign in to GitHub using their corporate identity provider credentials
    BAutomated deployment of code from GitHub to corporate servers
    CSyncing GitHub repositories with on-premises Git servers
    DEnforcing two-factor authentication through GitHub directly
    Show Answer & Explanation
    Correct Answer: A
    Explanation:

    SAML SSO lets organization members authenticate using their IdP (Okta, Azure AD) credentials. GitHub verifies the SAML assertion.

  2. Question 2Manage User Identities and Access

    What is SAML SSO for GitHub organizations?

    AA password manager
    BAn authentication standard that allows organizations to authenticate GitHub users through their identity provider (Okta, Azure AD, etc.), requiring SAML login for org access
    CA two-factor method
    DAn API protocol
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    SAML SSO: configure in org Settings > Authentication security. IdPs: Okta, Azure AD, OneLogin, PingOne. Flow: user accesses org → redirected to IdP → authenticates → token returned to GitHub. Enforcement: require SAML (members must authenticate via IdP). PATs and SSH keys: must be SSO-authorized after SAML enablement. Sessions: configurable timeout.

  3. Question 3Manage User Identities and Access

    What are SAML SSO enforcement and recovery?

    AOptional for all
    BOrganizations can require SAML SSO: members must authenticate via IdP, with recovery options including recovery codes, SSH key identification, and enterprise owner bypass for locked-out scenarios
    CCannot enforce SAML
    DNo recovery from SSO lockout
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    SAML enforcement: org Settings > Authentication security > Require SAML SSO. Effect: all members must authenticate via IdP (unauthenticated → redirected to IdP). Recovery: recovery codes (generated during SAML setup — store securely), enterprise owner bypass (enterprise owners can access even if SAML fails), and IdP admin (fix SAML configuration at IdP level). Lockout prevention: keep recovery codes, ensure multiple IdP admins, and test SAML configuration in non-enforced mode first. PATs and SSH keys: must be authorized for SSO (one-time per token/key).

Key Security Concepts for GH-ADMIN

ssosaml2faaudit logsecurityip allow listdependabot

GH-ADMIN Security Exam Tips

Security Administration questions in GH-ADMIN are typically scenario-based. Focus on service-level decision making aligned to official exam objectives. Priority concepts: sso, saml, 2fa, audit log, security, ip allow list.

What GH-ADMIN Expects

  • Anchor your answer in select the most practical, secure, and scalable answer for the stated scenario.
  • Security scenarios for GH-ADMIN are frequently mapped to Domain 3 (15%), so read the objective carefully before picking controls or architecture.
  • Expect multi-service scenarios where Security interacts with IAM, networking, storage, or observability patterns rather than appearing as an isolated service question.
  • When two options are both technically valid, prefer the choice that best aligns with the exam's operational scope (Intermediate) and managed-service best practices.

High-Value Security Concepts

  • Know the core Security building blocks cold: sso, saml, 2fa, audit log.
  • Review the edge-case features and limits for security, ip allow list; these details are commonly used to differentiate answer choices.
  • Practice service-integration reasoning: how Security pairs with Organization Management, Policies in real deployment patterns.
  • For GH-ADMIN, explain why the chosen Security design meets reliability, security, and cost expectations better than the alternatives.

Common GH-ADMIN Traps

  • Watch for answers that partially solve the requirement but miss operational constraints.
  • Questions in Manage Repository Activity often include distractors that look correct for Security but violate least-privilege, durability, or availability requirements.
  • Avoid picking options purely by feature name; validate data path, failure handling, and governance impact before answering.
  • If the prompt hints at automation or repeatability, eliminate manual-only operational answers first.

Fast Review Checklist

  • Can you compare at least two Security implementation paths and justify which one best fits the scenario?
  • Can you map the chosen answer back to Manage Repository Activity (15%) outcomes for GH-ADMIN?
  • Can you explain security and access boundaries for Security without relying on default-open assumptions?
  • Can you describe how Security integrates with Organization Management and Policies during failure, scaling, and monitoring events?

Exam Domains Covering Security

Related Resources

More GH-ADMIN Study Resources