exam questions

Exam AWS Certified DevOps Engineer - Professional DOP-C02 All Questions

View all questions & answers for the AWS Certified DevOps Engineer - Professional DOP-C02 exam

Exam AWS Certified DevOps Engineer - Professional DOP-C02 topic 1 question 264 discussion

A company has set up AWS CodeArtifact repositories with public upstream repositories. The company's development team consumes open source dependencies from the repositories in the company's internal network.

The company's security team recently discovered a critical vulnerability in the most recent version of a package that the development team consumes. The security team has produced a patched version to fix the vulnerability. The company needs to prevent the vulnerable version from being downloaded. The company also needs to allow the security team to publish the patched version.

Which combination of steps will meet these requirements? (Choose two.)

  • A. Update the status of the affected CodeArtifact package version to unlisted.
  • B. Update the status of the affected CodeArtifact package version to deleted.
  • C. Update the status of the affected CodeArtifact package version to archived.
  • D. Update the CodeArtifact package origin control settings to allow direct publishing and to block upstream operations.
  • E. Update the CodeArtifact package origin control settings to block direct publishing and to allow upstream operations.
Show Suggested Answer Hide Answer
Suggested Answer: CD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
BvGVAXeAMP
Highly Voted 1 year ago
Selected Answer: CD
A - unlisted does not prevent download B - deleted is not a valid code artifact package version status C- archived will prevent download https://docs.aws.amazon.com/codeartifact/latest/ug/packages-overview.html#package-version-status
upvoted 5 times
...
Weninka
Highly Voted 1 year ago
Selected Answer: CD
I had this question in my exam and checking what was the correct option for the package version led me here. C - archived seems to be the right one. A - unlisted will only remove the package version from the list of versions returned to package managers, but it WILL NOT prevent the download. B - deleted - it's not a valid package version status (https://docs.aws.amazon.com/codeartifact/latest/ug/packages-overview.html#package-version-status) C - archived - will block the package version download. D - Allow direct publishing will give the internal team permissions to upload the new version of the package E - block direct publishing means the package version are updated from external (public) repos More on the packages origin control settings here: https://docs.aws.amazon.com/codeartifact/latest/ug/package-origin-controls.html
upvoted 5 times
...
luisfsm_111
Most Recent 8 months ago
Selected Answer: BD
If there's a critical vulnerability, there's no reason to archive instead of deleting https://docs.aws.amazon.com/codeartifact/latest/ug/delete-package.html
upvoted 1 times
...
aws_god
11 months, 1 week ago
Selected Answer: CD
There is no delete version status - https://docs.aws.amazon.com/codeartifact/latest/ug/packages-overview.html#package-version-status
upvoted 3 times
...
ApacheKafkaAWS
11 months, 3 weeks ago
Selected Answer: BD
you have to delete it not archive it
upvoted 1 times
...
limelight04
11 months, 3 weeks ago
Selected Answer: BD
Option B: Update the status of the affected CodeArtifact package version to deleted. This action will prevent the vulnerable version from being accessible. Option D: Update the CodeArtifact package origin control settings to allow direct publishing and block upstream operations. This ensures that only the security team can publish the patched version directly.
upvoted 1 times
...
jamesf
1 year ago
Selected Answer: CD
C. Update the status of the affected CodeArtifact package version to archived. - Reason: Setting the package version status to Archived will prevent it from being downloaded while still retaining its metadata. This ensures that the vulnerable version cannot be accessed or used but allows you to track or potentially restore it later if needed. D. Update the CodeArtifact package origin control settings to allow direct publishing and to block upstream operations. - Reason: Allowing direct publishing and blocking upstream operations will enable the security team to publish the patched version directly to your repository without being blocked by upstream restrictions. This ensures that the patched version can be made available while preventing any interference from upstream repositories.
upvoted 3 times
jamesf
1 year ago
Why not B as "deleted" is not a valid code artifact package version status https://docs.aws.amazon.com/codeartifact/latest/ug/packages-overview.html#package-version-status
upvoted 1 times
...
...
tgv
1 year, 1 month ago
Selected Answer: BD
---> BD
upvoted 1 times
...
trungtd
1 year, 1 month ago
Selected Answer: BD
By allowing direct publishing, the security team can publish the patched version directly to the CodeArtifact repository. Blocking upstream operations ensures that only the patched version is available and prevents the vulnerable version from being pulled from the upstream repository.
upvoted 1 times
...
inturist
1 year, 1 month ago
Selected Answer: BD
-----> B,D
upvoted 1 times
...
siheom
1 year, 1 month ago
Selected Answer: BD
VOTE B,D
upvoted 1 times
...
getadroit
1 year, 1 month ago
BE https://aws.amazon.com/blogs/devops/tighten-your-package-security-with-codeartifact-package-origin-control-toolkit/
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...