Which of the following is the most complete method for Dependabot to find vulnerabilities in third-party dependencies?
Which of the following benefits do code scanning, secret scanning, and dependency review provide?
You are a maintainer of a repository and Dependabot notifies you of a vulnerability. Where could the vulnerability have been disclosed? (Each answer presents part of the solution. Choose two.)​
If default code security settings have not been changed at the repository, organization, or enterprise level, which repositories receive Dependabot alerts?
Assuming that notification and alert recipients are not customized, what does GitHub do when it identifies a vulnerable dependency in a repository where Dependabot alerts are enabled? (Each answer presents part of the solution. Choose two.)​