Checkmarx SAST Certified Engineer CxCEPASsLearn Amp
Checkmarx SAST Certified Engineer CxCEPASsLearn Amp
Item 37 of 37
Checkmarx SAST Certified Engineer (CxCE)
(Attempt 2 of 3)
You scored
83% in 0:41:01
Congratulations, you got over the pass score of 80%.
Question 1
Query customization via CxAudit can reduce result review / triage efforts
True
False
Question 2 Incorrect!
As it pertains to incremental scanning, a full scan should be run under all of the following
conditions except
On a regular schedule
Question 3
Security policy alone should govern KPIs and how they are measured.
True
False
Question 4
True
False
Question 5
Teams in Checkmarx are often organized to align with development team structure.
True
False
Question 6
A - DOM
B - DFG
C - AST
A and B
A and C
Question 7 Incorrect!
Question 8
When creating a preset, the synchronize button will select similar queries across all Checkmarx
supported languages by CWE.
True
False
Question 9 Incorrect!
Question 10
Checkmarx best practices recommend no more than _____ concurrent scans on a single engine,
even though the default configuration may be different.
2
3
Question 11
speeding up scans
Question 12 Incorrect!
Custom fields become mandatory fields for every project once created.
Question 13
Source-pulling uses a pre-scan action to move code to a network share for scanning.
True
False
Question 14
True
False
Question 15 Incorrect!
A company has a very small development team, which manages a multi-million LOC application
and has never done static analysis before. They also have no established application security
policy. Which preset should be used to scan the application?
All
Checkmarx Default
They should create their own
Question 16 Incorrect!
application context
Question 17
CxSrc
ExtSrc
UnzippedSrc
Reports
Question 18
A - Preset selection
B - Remediation priority
Question 19
A - SystemManager
C - Engine
A and B
All of the above
Question 20 Incorrect!
Engine
Database
Configuration
ExtSrc
CxSrc
Question 21
Enabling Long Path support on CxManager is the only thing needed to be configured to access files
having long path names.
True
False
Question 22
Pre / post scan actions are limited to sending an email to the project owner.
True
False
Question 23
The Engine log provides details about the composition of a scan including LOC, Scan Accuracy, and
query results.
True
False
Question 24
If a project has some parsing issues, you can resolve them by creating a CxQL query using CxAudit.
True
False
Question 25
True
False
Question 26
Checkmarx supports SSL to the Manager and between the Manager and the Engines.
True
False
Question 27
Application security policy, compliance requirements, and mandates from leadership do not need
to be considered during the application onboarding process.
True
False
Question 28
CxSAST supports all the following Source Control (SCM) system, except
Git
SVN
CVS
TFS
Question 29
Duplicate Project feature copies the following set of properties: Preset, Team and the Last scan
from the source project with all results and remarks.
True
False
Question 30
If a scan is stuck in "Waiting to process" status, what component may not be running?
Engine
SystemManager
JobsManager
ScansManager
Portal
Question 31
One of the simplest way to code slice is to break apart projects by language.
True
False
Question 32 Incorrect!
To prepare Checkmarx for built-in integration with Jira, the Checkmarx administrator must
Question 33
Engine
SystemManager
JobsManager
ScansManager
Portal
Question 34
The Checkmarx portal is capable of integrating with which external Checkmarx services?
Professional services
CxRASP
Codebashing
None of the above
Question 35
No false negatives
Actionable data
Happier developers
Question 36 Incorrect!
The SimilarityID is used to track the status of results across many scans. Which of the following
is not associated with a similarityID?
Result state
Result severity
Assigned User
Result comment
None of the above
Question 37
The 'Executable' folder path is where pre- and post-scan batch files are located on the CxManager
Server.
True
False
Question 38 Incorrect!
The best way to keep a baseline scan of a project from being deleted by data retention is:
Avoid running data retention until the baseline scan is no longer needed
Set the number of scans to retain for the project to some really high number, like a billion.
Run data retention for a date range that does not include the date of the baseline scan
Question 39
CI Plugins can break builds based on Checkmarx scan results with asynchronous scans.
True
False
Question 40
AST
DFG
DOM
Question 41
True
False
Question 42
Checkmarx has full-featured IDE plugins for Eclipse, JetBrains IDEs (e.g., IntelliJ), and Visual
Studio. They may be downloaded at https://www.checkmarx.com/plugins/.
True
False
Question 43
Jenkins pipeline jobs cannot integrate with the Checkmarx Jenkins plugin; it can only integrate
with the Checkmarx CLI.
True
False
Question 44
Engine
SystemManager
JobsManager
ScansManager
Portal
Question 45
Once a query has been overridden, a new scan must be conducted to see the result of the
changes made.
True
False
Question 46
With With the Portal or any IDE Plugin, how can you see more information about a Result?
Question 47
True
False
Question 48
B - Engine server
C - Database
A and B
None of the above
Question 49
Question 50
True
False
Question 51
True
False
Question 52 Incorrect!
Engine
SystemManager
JobsManager
ScansManager
Portal
Question 53
CI/CD
Production
Batch
Question 54 Incorrect!
All of the following are examples of scanning before the build except:
A scan action that occurs after pulling from the source control repository, but before the build
in the build management tool
A nightly scheduled scan that pulls code directly from the source control repository
A post or pre-receive hook that scans code before a merge occurs in the source control
repository
A developer incrementally scanning code from an IDE such as IntelliJ before committing to the
source control repository
A scan triggered from the command prompt using the command line interface after calling
mvn install
Question 55 Incorrect!
Engine
SystemManager
JobsManager
ScansManager
Portal
Question 56
True
False
Question 57
Github
Perforce
TFS
SourceSafe
SVN
Question 58
If custom fields have been defined, they become required fields when creating a project.
True
False
Question 59 Incorrect!
Which of the following steps of the application onboarding process best validates the ability of
Checkmarx to successfully parse and scan the code?
Query customization
Threat modeling
Result review
Question 60
Which of the following details does a CxManager consider before assigning a scan to an Engine?
LOC
Engine state
Question 61
Engine
SystemManager
JobsManager
ScansManager
Portal
Question 62
Application onboarding is a process comprised of threat modeling, scan log review, scan tuning,
result review, and query customization.
True
False
Question 63
True
False
Question 64
True
False
Question 65
Sources
Sinks
Sanitizers
Data flows
Question 66
True
False
Question 67
True
False
Question 68
Scan performed by CxFlow for a new project returned the following results:
File C: One Code Injection vulnerability and two SQL Injection vulnerabilities.
3
5
Question 69
Question 70
True
False
Question 71
True
False
Question 72
When creating a custom integration with a Data Analytics tool, which of the APIs are
recommended to use ?
ODATA
SOAP
GraphQL
REST
Question 73
Files that have been removed before an incremental scan may still show as results.
True
False
Question 74 Incorrect!
The App Sec team wants to append metadata to a Checkmarx project to include app owner, tech
stack, major version, SCM used, line of business, and inventory ID. They should
create a team structure according that incorporates app owner, tech stack, SCM used, and
line of business
create custom fields for each of the metadata to be tracked for each project
create separate Checkmarx instances for each line of business and SCM used
Question 75
Data retention can be scheduled to run at regular intervals via the Checkmarx Portal.
True
False
Question 76
True
False
Question 77
True
False
Question 78 Incorrect!
Perforce
Mercurial
TFS
SourceSafe
SVN
Question 79
True
False
Question 80
All steps of the project configuration must be completed before a project can be scanned.
True
False
Question 81
Checkmarx presets are a good way to assess application code according to compliance
requirements.
True
False
Question 82
An SVN client must be installed prior to using source pulling from a Git source code repository.
True
False
Question 83
If a new executable query is created via CxAudit, it will automatically be added to the All preset.
True
False
Question 84 Incorrect!
C and D
Question 85
True
False
Question 86
Question 87
The number of concurrent scans licensed always matches the number of registered engines.
True
False
Question 88
Query customizations can be applied at the Corp, Team, and Project level.
True
False
Question 89
True
False
Question 90
True
False
Question 91
Sources refer to areas where potentially tainted input or data may be introduced into the
application. Sinks are where that potentially tainted data may manifest itself in the form of an
exploit of the application. Source and sinks represent the beginning and end of data flows within
the application.
True
False
Question 92 Incorrect!
Server URL
Question 93
It can't
By selecting the ps1 file as the command when configuring the action
By creating a separate Executables directory that only contains the PowerShell file
Question 94
True
False
Question 95 Incorrect!
CxManager
CxEngine
CxAudit
None of the above
Question 96
True
False
Question 97
I got an error message when trying to login, which log should I look at first?
WebServices log
Engine log
Question 98
Question 99
Question 100
Both A and B
All of the above
Question 101
Increasing the number of concurrent scans automatically gives a user more scanning capacity.
True
False
Question 102
After result review/triage has been done for a project, each true finding found should be marked
as Confirmed, and any false positives should be marked as Not Exploitable with a comment
describing why it is not exploitable.
True
False
A - Smaller scans
B - Larger scans
A and C
B and C
Question 104
In the IDE plugins, how can you view the best fix location?
You can't
Engine
SystemManager
JobsManager
ScansManager
Portal
Question 106
The Jenkins scripted pipeline DSL is based on the syntax of what programming language?
C#
Python
Perl
Groovy
None of the above
Git
Perforce
TFS
SourceSafe
SVN
Question 108
For HTTP, not HTTPS, it is important to ensure that organizational firewalls allow all of the
following except:
HTTP (TCP port 80) from clients such as IDE plugins to the CxManager host
HTTP (TCP port 80) should also be opened between the CxManager and all CxEngines in a
distributed architecture
SQL Server traffic by default on TCP port 1433 from the CxManager to SQL Server
HTTP (TCP port 80) from clients such as CI/CD plugins or the Command Line Interface to the
CxManager host
HTTP (TCP port 8080) should also be opened between the CxManager and all CxEngines in a
distributed architecture
Question 109
Incremental scanning represents a tradeoff between scan quality and scan speed.
True
False
Question 110
True
False
Question 111
JavaScript
Perl
Python
VB
C#
Reports
UnzippedSrc
ExtSrc
CxSrc
Question 113
True
False
B - Closed tickets in JIRA will change the status of a CxSAST result to not exploitable.
C - CxSAST cannot close tickets. However, this can be done through CxFlow.
D - Closing tickets should be done in JIRA manually, after confirming the vulnerabilities are
fixed correctly
Answers C and D
Question 115
As an User with Admin role, which of the following I have permissions to retrieve from the
Checkmarx Portal?
A - Scan logs
B - System logs
C - IIS Logs
D-A&B
All of the above
Question 116
Only the SAST Auditor can see the query source in the Query Viewer.
True
False
Question 117
Jenkins
Maven
CircleCI
Question 118
True
False
Question 119
This dashboard/table can be helpful when troubleshooting issues with Checkmarx, because it
shows host details, state, and version and hotfix information.
Result Viewer
Scans List
Project State
Installation Information
Question 120
True
False
Question 121
The JIRA ticket created by Checkmarx will provide a link to the vulnerability associated with the
ticket.
True
False
Question 122
Scan frequency and project size are typically combined to determine how many Checkmarx
engines and concurrent scans may be needed.
True
False
Question 123
For project X, the number of scans to keep was specified at 5. When the 6th scan is run,
Checkmarx will automatically delete the oldest scan.
True
False
Question 124
When planning to run the first scan of a project, security policy, a threat model of the application,
and available resources to work with scan results should be considered.
True
False
Question 125
True
False
Question 126
CxSAST can integrate with any other defect tracking system, as long as CxFlow has the corresponding
support implemented
True
False
Question 127
True
False
Question 128
OData provides data access to which of the following main data objects?
Scans
Organization Data
Scanners
Users
License information
Question 129
True
False
Question 130
Developers or Dev Team leads do not need to participate in the application onboarding process;
their sole responsibility is to fix results found by Checkmarx.
True
False
Question 131
True
False
Question 132
C - Changed files
C and D only
Question 133
1
2
Question 134
RTF
CSV
XML
Question 135
A scan successfully completed but is showing no results, where should you look to see if there
were problems with the scan?
JobsManager log
ScansManager log
Scan log
Engine log
WebClient log
Question 136
Ruby slippers
Cx CLI
SOAP SDK
REST API
OData API
Question 137
The parameters specified when launching data retention will always override project settings.
True
False
Question 138
Which of the following is a limitation of metrics obtained from static analysis testing?
Question 139
Engine
SystemManager
JobsManager
ScansManager
Portal
Question 140
To launch a Checkmarx scan from a custom, Linux-based build server, I should use
CxARM
Cx CLI
SOAP SDK
REST API
OData API
Question 141
True
False
Question 142
True
False
Question 143
On the flow graph (best fix location graph), each data flow is represented by a
SingularityID
DataFlowID
BestFixPathID
SimilarityID
None of the above
Question 144
A project can be created in Checkmarx via the Portal, APIs, or the CLI.
True
False
Question 145
A - CxManager
B - CxEngine
C - CxAudit
A and C
All of the above
Question 146
Only out-of-the-box presets should be used, because they were designed by experts
True
False
Question 147
Engine
SystemManager
JobsManager
ScansManager
Portal
Question 148
This user role cannot create projects or run scan, but has read-only access to scan results:
SAST Scanner
SAST Reviewer
SAST Auditor
User Manager
Question 149
True
False
Question 150
Depending on the database environment (DBMS), the Checkmarx database may need to be
manually created before installation.
True
False
Question 151
A Checkmarx engine with 12GB of RAM can scan a code base up to (approximately)
100,000 LOC
120,000 LOC
600,000 LOC
1.2M LOC
Question 152
A - Freestyle
B - Pipeline
C - Inline
A and C
A and B
PathResults Table
NodeResults Table
Scan Logs
CxSRC
Question 154
True
False
Application onboarding is an easy and lightweight process that produces actionable results
very quickly for all projects.
Small organizations with limited resources can still implement application onboarding
processes.
Threat modeling is an optional component of application onboarding, because it does not offer
much value within the onboarding process.
The widest preset should always be used (e.g., All, which includes low and informational
checks) even if the results are unworkable.
Question 156
A user automatically gets access to all other teams at the same level in the hierarchy.
True
False
Question 157
The MS Windows Git client must be installed prior to using source pulling from a Git source code
repository.
True
False