PROFESSIONAL-CLOUD-SECURITY-ENGINEER · Question #331
PROFESSIONAL-CLOUD-SECURITY-ENGINEER Question #331: Real Exam Question with Answer & Explanation
Sign in or unlock PROFESSIONAL-CLOUD-SECURITY-ENGINEER to reveal the answer and full explanation for question #331. The question stem and answer options stay visible for context.
Question
Your organization is worried about recent news headlines regarding application vulnerabilities in production applications that have led to security breaches. You want to automatically scan your deployment pipeline for vulnerabilities and ensure only scanned and verified containers can run in the environment. What should you do?
Options
- AUse Kubernetes role-based access control (RBAC) as the source of truth for cluster access by
- BUse gcloud artifacts docker images describe LOCATION-
- CEnforce the use of Cloud Code for development so users receive real-time security feedback on
- DEnable Binary Authorization and create attestations of scans.
Unlock PROFESSIONAL-CLOUD-SECURITY-ENGINEER to see the answer
You've previewed enough free PROFESSIONAL-CLOUD-SECURITY-ENGINEER questions. Unlock PROFESSIONAL-CLOUD-SECURITY-ENGINEER for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.