New Year Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 3
Total 30 questions
Exam Code: 312-97                Update: Jan 18, 2026
Exam Name: EC-Council Certified DevSecOps Engineer (ECDE)

ECCouncil EC-Council Certified DevSecOps Engineer (ECDE) 312-97 Exam Dumps: Updated Questions & Answers (January 2026)

Question # 1

(PentaByte is a software product development company located in Austin, Texas. The organization would like to secure communication methods to maintain confidentiality and security. How can PentaByte achieve secure by communication secure coding principle?)

A.

By preventing cyber security breach.

B.

By maintaining defense by depth and reducing attack surface area.

C.

By balancing the default configuration settings.

D.

By maintaining secure trust relationships.

Question # 2

(Kevin Williamson has been working as a DevSecOps engineer in an MNC company for the past 5 years. In January of 2017, his organization migrated all the applications and data from on-prem to AWS cloud due to the robust security feature and cost-effective services provided by Amazon. His organization is using Amazon DevOps services to develop software products securely and quickly. To detect errors in the code and to catch bugs in the application code, Kevin integrated PHPStan into the AWS pipeline for static code analysis. What will happen if security issues are detected in the application code?.)

A.

The integrated PHPStan into the AWS pipeline will invoke AWS CloudFormation to parse and send result to the security hub.

B.

The integrated PHPStan into the AWS pipeline will invoke AWS Config to parse and send result to the security hub.

C.

The integrated PHPStan into the AWS pipeline will invoke AWS Elastic BeanStalk to parse and send result to the security hub.

D.

The integrated PHPStan into the AWS pipeline will invoke the AWS Lambda function to parse and send result to the security hub.

Question # 3

(William O’Neil has been working as a senior DevSecOps engineer in an IT company that develops software products related to ecommerce. At this point in time, his team is working on securing a python-based application. Using GitGraber, William would like to detect sensitive information in real-time in his organizational GitHub repository. Therefore, he downloaded GitGraber and installed the dependencies. Which of the following commands should William use to find secrets using a keyword (assume the keyword is yahoo)?.)

A.

python3 gitGraber.py -w wordlist/keywordsfile.txt -q "\yahoo" -s.

B.

python3 gitGraber.py -g wordlist/keywordsfile.txt -q "\yahoo" -s.

C.

python3 gitGraber.py -p wordlist/keywordsfile.txt -q "\yahoo" -s.

D.

python3 gitGraber.py -k wordlist/keywordsfile.txt -q "\yahoo" -s.

Question # 4

(Kevin Williamson is working as a DevSecOps engineer in an IT company located in Los Angles, California. His team has integrated Jira with Jenkins to view every issue on Jira, including the status of the latest build or successful deployment of the work to an environment. Which of the following can Kevin use to search issues on Jira?)

A.

Java query language.

B.

Structured query language.

C.

Atlassian query language.

D.

Jira query language.

Question # 5

(Frances Fisher joined TerraWolt Pvt. Ltd. as a DevSecOps engineer in 2020. On February 1, 2022, his organization became a victim of cyber security attack. The attacker targeted the network and application vulnerabilities and compromised some important functionality of the application. To secure the organization against similar types of attacks, Franches used a flexible, accurate, low maintenance vulnerability management and assessment solution that continuously scans the network and application vulnerabilities and provides daily updates and specialized testing methodologies to catch maximum detectable vulnerabilities. Based on the above-mentioned information, which of the following tools is Frances using?)

A.

SonarQube.

B.

Black Duck.

C.

BeSECURE.

D.

Shadow Daemon.

Question # 6

(DWART is an IT company that develops cyber security software and web applications. The organization ensures that all users should be identified and authorized, enforces proper auditing, secures data at rest, ensures that the attacker cannot bypass the security layers, implements multiple layers of defense, maintains proper data integrity, and performs proper input validation for the application. Based on the above-mentioned information, which of the following secure coding principles is achieved by DWART?.)

A.

Secure by design.

B.

Secure by implementation.

C.

Secure by default.

D.

Secure by communication.

Question # 7

(Teresa Wheeler is a DevSecOps engineer at Altschutz Solution Pvt. Ltd. She would like to test the web applications and API’s from outside without accessing the source code using BDD security framework. The framework is a collection of Cucumber-JVM features that are pre-configured with OWASP ZAP, Nessus scanner, SSLyze, and Selenium. Hence, she downloaded and ran the jar application, and then cloned the BDD security framework. Next, she utilized a command for executing the authentication feature. Which of the following commands allows Teresa to execute all the features of BDD security framework, including the OWASP ZAP?.)

A.

./gardlew.

B.

/gardlev.

C.

/gardlew.

D.

./gardlev.

Question # 8

(Brady Coleman is a senior DevSecOps engineer at CloudVac Security Private Ltd. He has created a new container named “eccbrad” from the centos:7 image using the command docker run -i -t --name geeklab centos:7 /bin/bash. Now, Brady wants to install the httpd package inside the eccbrad container. Which of the following commands should Brady use to install the httpd package inside the container?)

A.

sudo install-httpd.

B.

sudo install httpd.

C.

yum install-httpd.

D.

yum install httpd.

Question # 9

(Helena Luke has been working as a DevSecOps engineer in an IT company located in Denver, Colorado. To seamlessly secure source code during build time and enhance the runtime protection functionalities to the source code, she would like to integrate Jscrambler with GitLab. Therefore, she selected a predefined template and successfully downloaded the Jscrambler configuration file. She then placed the file in the project's root folder and renamed it as .jscramblerrc. To prevent the exposure of sensitive information, she opened the Jscrambler configuration file and removed the access and secret keys from it. In which of the following formats does the Jscrambler configuration file exist?.)

A.

JSON.

B.

XML.

C.

YAML.

D.

HTML.

Question # 10

(Sarah Wheeler is an experienced DevSecOps engineer. She recently joined an IT company that develops software products for customers stretched across the globe. Sarah would like to use a security testing tool that protects the application from false positives, network sniffing, tampering with code, etc. The tool should monitor the incoming traffic to the server and APIs for suspicious activities and help her team in remediating them during runtime. Which of the following tools should Sarah select that will help her team in precisely detecting and remediating the security issues in the application code during runtime?.)

A.

IAST.

B.

SAST.

C.

RASP.

D.

DAST.

Page: 1 / 3
Total 30 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 18 Jan 2026