ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 193 - Professional Cloud Security Engineer discussion

Report
Export

You run applications on Cloud Run. You already enabled container analysis for vulnerability scanning. However, you are concerned about the lack of control on the applications that are deployed. You must ensure that only trusted container images are deployed on Cloud Run.

What should you do?

Choose 2 answers

A.
Enable Binary Authorization on the existing Kubernetes cluster.
Answers
A.
Enable Binary Authorization on the existing Kubernetes cluster.
B.
Set the organization policy constraint constraints/run. allowedBinaryAuthorizationPolicie to the list of allowed Binary Authorization policy names.
Answers
B.
Set the organization policy constraint constraints/run. allowedBinaryAuthorizationPolicie to the list of allowed Binary Authorization policy names.
C.
Set the organization policy constraint constraints/compute.trustedimageProjects to the list of protects that contain the trusted container images.
Answers
C.
Set the organization policy constraint constraints/compute.trustedimageProjects to the list of protects that contain the trusted container images.
D.
Enable Binary Authorization on the existing Cloud Run service.
Answers
D.
Enable Binary Authorization on the existing Cloud Run service.
E.
Use Cloud Run breakglass to deploy an image that meets the Binary Authorization policy by default.
Answers
E.
Use Cloud Run breakglass to deploy an image that meets the Binary Authorization policy by default.
Suggested answer: B, D
asked 18/09/2024
Gary Corley
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first