GCP Professional Cloud Security Engineer Practice Question

Your development teams build container images with Cloud Build and push them to Artifact Registry, where automatic vulnerability scanning is already enabled. Compliance requires that any image containing HIGH or CRITICAL CVEs must be prevented from running in the production Google Kubernetes Engine (GKE) cluster, but builds themselves must still finish so engineers can review scan results and remediate issues. You want to implement this control with the fewest moving parts and no changes to application code. Which solution should you implement?

  • Enable Binary Authorization on the production GKE cluster and set a vulnerability-based admission rule that blocks images whose maximum vulnerability severity exceeds MEDIUM, using the scan results automatically generated by Artifact Registry.

  • Attach a Cloud Armor security policy to the production load balancer that drops traffic from any pod whose container image includes HIGH or CRITICAL CVEs.

  • Create an organization policy that denies the artifactregistry.repositories.upload permission when pushed images contain vulnerabilities with severity above HIGH.

  • Add a Cloud Build post-build step that fails the pipeline whenever Artifact Registry reports any HIGH or CRITICAL vulnerabilities, preventing the image from being pushed.

GCP Professional Cloud Security Engineer
Managing operations
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot