GCP Professional Cloud Security Engineer Practice Question

Your company uses Cloud Build to build and push container images from multiple microservice repositories. Security policy states that production GKE clusters must never run images that contain any High or Critical CVEs. The enforcement must occur automatically during both image build and cluster deployment, and security administrators need an immutable audit trail for any blocked deployments. Which solution most effectively satisfies these requirements while minimizing custom code?

  • Enable vulnerability scanning on an Artifact Registry repository and create a Binary Authorization policy that rejects images with High or Critical vulnerabilities; enforce the policy on the production GKE cluster so denied deploy attempts are logged in Cloud Audit Logs.

  • Add a custom Cloud Build step that parses apt package lists for known CVEs and fails the build; deploy resulting images to GKE with default settings and review Cloud Build logs for problems.

  • Use Cloud Armor security policies on the ingress to production clusters to block traffic to any pod that reports High or Critical vulnerabilities through Security Health Analytics.

  • Enable Event Threat Detection to continuously scan running containers for CVEs and configure a GKE admission controller to automatically delete any vulnerable workloads it identifies.

GCP Professional Cloud Security Engineer
Managing operations
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot