GCP Professional Cloud Security Engineer Practice Question

Your organization builds container images with Cloud Build and stores them in Artifact Registry where automatic vulnerability scanning is already enabled. During a recent audit you discovered that several images containing HIGH and CRITICAL CVEs were still deployed to multiple Google Kubernetes Engine (GKE) clusters through the CI/CD pipeline. You must ensure that any future deployment to these clusters is automatically rejected unless the image contains no vulnerabilities above MEDIUM severity, and you want to rely only on Google-managed controls rather than custom admission webhooks. Which approach meets the requirement?

  • Enable Binary Authorization enforcement on all GKE clusters and in the policy add a vulnerability requirement that allows deployment only when the image's maximum detected CVE severity is MEDIUM or lower.

  • Install the OPA Gatekeeper admission controller on each GKE cluster and write a custom constraint template that rejects images with HIGH or CRITICAL CVEs.

  • Add Cloud Build's built-in vulnerability scanning step and configure the build to fail when HIGH or CRITICAL findings are reported.

  • Create an Eventarc trigger that listens for new HIGH or CRITICAL vulnerability findings and automatically deletes the affected image from Artifact Registry before it can be pulled by GKE.

GCP Professional Cloud Security Engineer
Managing operations
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot