
Ultimate access to all questions.
Your team utilizes Docker images for application development. There's a critical need to identify and mitigate vulnerabilities in these images before they're deployed, using Cloud Build. As the responsible engineer, what are TWO effective strategies to implement vulnerability detection in this workflow?
A
Activate Vulnerability scanning within Artifact Registry to examine images for vulnerabilities.
B
Implement Vulnerability scanning in Cloud Source Repositories as a means to scan images.
C
Enable Vulnerability scanning in Container Registry to scrutinize images for potential exploits.
D
Utilize Vulnerability scanning in Cloud Private Catalog for image vulnerability detection.
E
Incorporate Vulnerability scanning in Cloud Build to automatically scan images during the build process.