
Ultimate access to all questions.
Your team utilizes Docker images for application development. There's a critical need to identify and mitigate exploits in Docker images created via Cloud Build prior to their deployment. You're assigned to implement a process for detecting vulnerabilities in these images before they go live. Which two actions should you take to fulfill this requirement?
A
Activate Vulnerability scanning in Cloud Source Repositories to inspect images.
B
Activate Vulnerability scanning in Artifact Registry to inspect images.
C
Activate Vulnerability scanning in Cloud Private Catalog to inspect images.
D
Activate Vulnerability scanning in Container Registry to inspect images.
E
Activate Vulnerability scanning in Cloud Build to inspect images.