GCP Professional Cloud Architect Practice Question
Your company is standardizing its CI/CD workflows on Cloud Build. Security architects require that every container image pushed to Artifact Registry include verifiable build provenance so that runtime environments can confirm the image's origin before deployment. Which design best meets this requirement while minimizing operational toil?
Use Container-Optimized OS signatures to verify node images; application containers inherit trust from the host so no additional provenance is required.
Configure a Cloud Function trigger that signs each built image with a separately managed KMS key before pushing to Container Registry.
Enable Cloud Build's build provenance feature and push images to Artifact Registry; then configure Binary Authorization to require trusted Cloud Build provenance attestations before allowing deployments.
Export build logs to Cloud Logging and require operations teams to manually verify image digests against the logs prior to deployment.
Cloud Build can automatically generate in-toto build provenance for container images when the Cloud Build provenance feature is enabled. By storing images in Artifact Registry, provenance metadata is published to the linked Container Analysis API as an attestation. Runtime protections such as Binary Authorization can then be configured with an "Build Provenance" policy to admit only images that carry trusted Cloud Build attestations. This approach avoids custom scripting while satisfying the requirement for verifiable artifact integrity. Alternative answers fail because manually signing adds operational overhead, Cloud Functions do not guarantee tamper-proof provenance generation, and COS image signing addresses OS image trust rather than build-time provenance for application containers.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Cloud Build's build provenance feature?
Open an interactive chat with Bash
What is Binary Authorization and how does it enhance runtime security?
Open an interactive chat with Bash
How does Artifact Registry integrate with the Container Analysis API for provenance validation?
Open an interactive chat with Bash
What is Cloud Build's build provenance feature?
Open an interactive chat with Bash
What is the role of Binary Authorization in securing container deployments?
Open an interactive chat with Bash
What is the purpose of Artifact Registry in the CI/CD workflow?
Open an interactive chat with Bash
GCP Professional Cloud Architect
Designing for security and compliance
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99 $11.99
$11.99/mo
Billed monthly, Cancel any time.
$19.99 after promotion ends
3 Month Pass
$44.99 $26.99
$8.99/mo
One time purchase of $26.99, Does not auto-renew.
$44.99 after promotion ends
Save $18!
MOST POPULAR
Annual Pass
$119.99 $71.99
$5.99/mo
One time purchase of $71.99, Does not auto-renew.
$119.99 after promotion ends
Save $48!
BEST DEAL
Lifetime Pass
$189.99 $113.99
One time purchase, Good for life.
Save $76!
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .