GCP Professional Cloud Security Engineer Practice Question
Your development teams build container images with Cloud Build and push them to Artifact Registry, where automatic vulnerability scanning is already enabled. Compliance requires that any image containing HIGH or CRITICAL CVEs must be prevented from running in the production Google Kubernetes Engine (GKE) cluster, but builds themselves must still finish so engineers can review scan results and remediate issues. You want to implement this control with the fewest moving parts and no changes to application code. Which solution should you implement?
Enable Binary Authorization on the production GKE cluster and set a vulnerability-based admission rule that blocks images whose maximum vulnerability severity exceeds MEDIUM, using the scan results automatically generated by Artifact Registry.
Attach a Cloud Armor security policy to the production load balancer that drops traffic from any pod whose container image includes HIGH or CRITICAL CVEs.
Create an organization policy that denies the artifactregistry.repositories.upload permission when pushed images contain vulnerabilities with severity above HIGH.
Add a Cloud Build post-build step that fails the pipeline whenever Artifact Registry reports any HIGH or CRITICAL vulnerabilities, preventing the image from being pushed.
Artifact Registry's native scanning will continue to generate vulnerability metadata for every image. By enabling Binary Authorization on the production GKE cluster and configuring its vulnerability-based admission policy, you can specify a maximum allowed CVE severity (for example, MEDIUM). At deploy time, Binary Authorization consults Container Analysis for the scan results that Artifact Registry produced. If any HIGH or CRITICAL findings exist, the admission controller denies the image pull, blocking the deployment, while the original Cloud Build still completes successfully so developers can inspect and fix issues. The other options are incorrect because:
Adding a build-failure step would stop the build instead of allowing developers to examine images, and it adds custom scripting rather than using managed enforcement.
Organization Policy cannot evaluate image vulnerability data; it controls IAM and resource configurations, not CVE severities in container images.
Cloud Armor cannot inspect container image metadata and therefore cannot block deployments based on CVE severity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does Binary Authorization integrate with Google Kubernetes Engine?
Open an interactive chat with Bash
What is a CVE and how does Artifact Registry identify vulnerabilities?
Open an interactive chat with Bash
What are the benefits of using Artifact Registry with vulnerability scanning over custom scripts?
Open an interactive chat with Bash
What is Binary Authorization in GCP?
Open an interactive chat with Bash
How does Artifact Registry's vulnerability scanning work?
Open an interactive chat with Bash
What is the role of an admission controller in GKE?
Open an interactive chat with Bash
GCP Professional Cloud Security Engineer
Managing operations
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .