ISC2 Certified Cloud Security Professional (CCSP) Practice Question

Your organization is building a microservice that will run in a Kubernetes cluster and intends to use a popular open-source reverse-proxy image pulled from a public registry. To satisfy the company policy that mandates deployment of only validated open-source software, which action best demonstrates that the image has been properly validated before it is promoted to the production registry?

  • Deploy the image in an isolated namespace first and rely on runtime behavioral monitoring to spot suspicious activity.

  • Fork the image's source code into an internal Git repository and disable automatic updates so the code base remains unchanged.

  • Scan the container image with an SCA tool to create an SBOM and address any reported CVEs before copying it into the enterprise registry.

  • Pull the image only from its official repository on Docker Hub, trusting that the maintainers keep it secure and up to date.

ISC2 Certified Cloud Security Professional (CCSP)
Cloud Application Security
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot