New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft AZ-400 Exam - Topic 6 Question 10 Discussion

Actual exam question for Microsoft's AZ-400 exam
Question #: 10
Topic #: 6
[All AZ-400 Questions]

You have an existing project in Azure DevOps.

You plan to integrate GitHub as the repository for the project

You need to ensure that Azure Pipelines runs under the Azure Pipelines identity

Which authentication mechanism should you use?

Show Suggested Answer Hide Answer
Suggested Answer: A

GitHub App uses the Azure Pipelines identity.


https://docs.microsoft.com/en-us/azure/devops/pipelines/repos/github

Contribute your Thoughts:

0/2000 characters
Pamella
4 months ago
Azure AD might be overkill for just a repo integration.
upvoted 0 times
...
Benedict
4 months ago
Personal access token (PAT) could work too, but not ideal.
upvoted 0 times
...
Earlean
4 months ago
Wait, can you really use GitHubApp for this? Seems odd.
upvoted 0 times
...
Bonita
5 months ago
Definitely agree with that, OAuth is pretty standard.
upvoted 0 times
...
Mireya
5 months ago
I think OAuth is the way to go for this!
upvoted 0 times
...
Rima
5 months ago
I feel like personal access tokens were discussed in the context of authentication, but I don't know if they apply here since we want the Azure Pipelines identity.
upvoted 0 times
...
Emilio
5 months ago
I think I practiced a similar question where OAuth was mentioned as a common method, but I can't recall if it was the best option for this scenario.
upvoted 0 times
...
Gwen
5 months ago
I remember reading about GitHub integration, but I'm not sure if it's OAuth or the GitHub App that I should choose for Azure Pipelines.
upvoted 0 times
...
Christiane
5 months ago
I vaguely remember Azure AD being a secure option for authentication, but I'm not confident if it's the right choice for integrating with GitHub in this case.
upvoted 0 times
...
Solange
5 months ago
Guardband, guardband... I'm drawing a blank here. I'll have to guess and go with option A, since that sounds somewhat related to the concept.
upvoted 0 times
...
Hannah
5 months ago
Uplink sounds familiar, but I can't quite recall if it's the right answer for VLAN configurations specifically.
upvoted 0 times
...
Nelida
5 months ago
Hmm, isolating the server and doing a forensic analysis seems like the most thorough approach to me. I'd want to really understand what that PE file is and how it got there.
upvoted 0 times
...
Rocco
5 months ago
I remember practicing a similar question, and I think D is definitely correct since Title VII is meant to protect all employees regardless of their background.
upvoted 0 times
...

Save Cancel