ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 128 - Professional Cloud Developer discussion

Report
Export

You are running a containerized application on Google Kubernetes Engine. Your container images are stored in Container Registry. Your team uses CI/CD practices. You need to prevent the deployment of containers with known critical vulnerabilities. What should you do?

A.
* Use Web Security Scanner to automatically crawl your application * Review your application logs for scan results, and provide an attestation that the container is free of known critical vulnerabilities * Use Binary Authorization to implement a policy that forces the attestation to be provided before the container is deployed
Answers
A.
* Use Web Security Scanner to automatically crawl your application * Review your application logs for scan results, and provide an attestation that the container is free of known critical vulnerabilities * Use Binary Authorization to implement a policy that forces the attestation to be provided before the container is deployed
B.
* Use Web Security Scanner to automatically crawl your application * Review the scan results in the scan details page in the Cloud Console, and provide an attestation that the container is free of known critical vulnerabilities * Use Binary Authorization to implement a policy that forces the attestation to be provided before the container is deployed
Answers
B.
* Use Web Security Scanner to automatically crawl your application * Review the scan results in the scan details page in the Cloud Console, and provide an attestation that the container is free of known critical vulnerabilities * Use Binary Authorization to implement a policy that forces the attestation to be provided before the container is deployed
C.
* Enable the Container Scanning API to perform vulnerability scanning * Review vulnerability reporting in Container Registry in the Cloud Console, and provide an attestation that the container is free of known critical vulnerabilities * Use Binary Authorization to implement a policy that forces the attestation to be provided before the container is deployed
Answers
C.
* Enable the Container Scanning API to perform vulnerability scanning * Review vulnerability reporting in Container Registry in the Cloud Console, and provide an attestation that the container is free of known critical vulnerabilities * Use Binary Authorization to implement a policy that forces the attestation to be provided before the container is deployed
D.
* Enable the Container Scanning API to perform vulnerability scanning * Programmatically review vulnerability reporting through the Container Scanning API, and provide an attestation that the container is free of known critical vulnerabilities * Use Binary Authorization to implement a policy that forces the attestation to be provided before the container is deployed
Answers
D.
* Enable the Container Scanning API to perform vulnerability scanning * Programmatically review vulnerability reporting through the Container Scanning API, and provide an attestation that the container is free of known critical vulnerabilities * Use Binary Authorization to implement a policy that forces the attestation to be provided before the container is deployed
Suggested answer: D

Explanation:

https://cloud.google.com/binary-authorization/docs/creating-attestations-kritis

https://cloud.google.com/container-analysis/docs/os-overview

asked 18/09/2024
Bashar Deeb
47 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first