GCP Professional Cloud Security Engineer Practice Question

Your company builds container images with Cloud Build and stores them in Artifact Registry. Security Command Center (SCC) Premium is already enabled at the organization level. Compliance policy states that no image containing HIGH- or CRITICAL-severity CVEs may be deployed to any environment. DevOps teams need immediate pipeline feedback if an image violates the policy, while security analysts must review every vulnerability finding centrally in SCC. Which approach best meets these requirements with minimal custom code and ongoing maintenance?

  • Schedule OS Config patch jobs for GKE node pools so base images stay updated, then configure SCC to display patch compliance status as a proxy for vulnerability exposure.

  • Enable Artifact Registry vulnerability scanning, have Cloud Build poll Container Analysis for the scan result and fail the build if HIGH or CRITICAL findings are present; rely on SCC's automatic import of Container Analysis findings for centralized review.

  • Enable VPC Flow Logs and Cloud IDS during the build process; configure a log-based alert that rejects deployment if malicious traffic appears, and let SCC surface the IDS findings.

  • Add a custom Trivy scan step in Cloud Build, export the HTML report to Cloud Storage, and write a Cloud Function that pulls the report into SCC on a daily schedule.

GCP Professional Cloud Security Engineer
Managing operations
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot