🔐 Secret Scanning - GH-SECURITY Practice Questions

Detect and remediate exposed secrets, configure push protection, and manage secret scanning alerts.

3Questions Available
1Exam Domains

Practice Secret Scanning Questions Now

Start a timed practice session focusing on Secret Scanning topics from the GH-SECURITY question bank.

Start GH-SECURITY Practice Quiz →

GH-SECURITY Secret Scanning Question Bank (3 Questions)

Browse all 3 practice questions covering Secret Scanning for the GH-SECURITY certification exam. Each question includes the full answer and a detailed explanation to help you understand the concepts.

  1. Question 1Configure and Use Secret Scanning

    What does GitHub Secret Scanning push protection do?

    AEncrypts all commits before they are pushed to GitHub
    BBlocks a push if it contains a detected secret before it enters the repository
    CSends a webhook when secrets are found after a push
    DScans pull request descriptions for secrets
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    Push protection intercepts pushes containing detected secrets BEFORE they enter the repository, blocking the push and alerting the developer.

  2. Question 2GitHub Security Features

    What is push protection for secret scanning?

    ABlocks all pushes
    BPrevents pushes containing detected secrets from being committed to the repository
    CProtects branches from force push
    DEncrypts pushes
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    Push protection blocks git pushes that contain detected secret patterns before they reach the repository, preventing accidental credential exposure at the source.

  3. Question 3Security Monitoring and Response

    What is secret scanning push protection?

    AA post-push scan
    BA feature that prevents secrets from being pushed to GitHub by scanning commits during 'git push' and blocking the push if a supported secret pattern is detected
    CAn email alert
    DA weekly scan
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    Push protection: scans during push (before code reaches GitHub). If detected: push blocked with message showing: secret type, location, and remediation options. Bypass: developer can mark as false positive, used in tests, or will fix later (requires justification). Audit: all bypass decisions logged. Enable: repo Settings > Code security > Push protection. Works with: 200+ patterns.

Key Secret Scanning Concepts for GH-SECURITY

secret scanningpush protectiontokenapi keycredential leak

GH-SECURITY Secret Scanning Exam Tips

Secret Scanning questions in GH-SECURITY are typically scenario-based. Focus on service-level decision making aligned to official exam objectives. Priority concepts: secret scanning, push protection, token, api key, credential leak.

What GH-SECURITY Expects

  • Anchor your answer in select the most practical, secure, and scalable answer for the stated scenario.
  • Secret Scanning scenarios for GH-SECURITY are frequently mapped to Domain 2 (25%), so read the objective carefully before picking controls or architecture.
  • Expect multi-service scenarios where Secret Scanning interacts with IAM, networking, storage, or observability patterns rather than appearing as an isolated service question.
  • When two options are both technically valid, prefer the choice that best aligns with the exam's operational scope (Advanced) and managed-service best practices.

High-Value Secret Scanning Concepts

  • Know the core Secret Scanning building blocks cold: secret scanning, push protection, token, api key.
  • Review the edge-case features and limits for credential leak; these details are commonly used to differentiate answer choices.
  • Practice service-integration reasoning: how Secret Scanning pairs with Code Scanning, Security Overview in real deployment patterns.
  • For GH-SECURITY, explain why the chosen Secret Scanning design meets reliability, security, and cost expectations better than the alternatives.

Common GH-SECURITY Traps

  • Watch for answers that partially solve the requirement but miss operational constraints.
  • Questions in Configure and Use Code Scanning often include distractors that look correct for Secret Scanning but violate least-privilege, durability, or availability requirements.
  • Avoid picking options purely by feature name; validate data path, failure handling, and governance impact before answering.
  • If the prompt hints at automation or repeatability, eliminate manual-only operational answers first.

Fast Review Checklist

  • Can you compare at least two Secret Scanning implementation paths and justify which one best fits the scenario?
  • Can you map the chosen answer back to Configure and Use Code Scanning (25%) outcomes for GH-SECURITY?
  • Can you explain security and access boundaries for Secret Scanning without relying on default-open assumptions?
  • Can you describe how Secret Scanning integrates with Code Scanning and Security Overview during failure, scaling, and monitoring events?

Exam Domains Covering Secret Scanning

Related Resources

More GH-SECURITY Study Resources