
Answer-first summary for fast verification
Answer: Enable Vulnerability scanning in Container Registry to scrutinize images for potential exploits., Incorporate Vulnerability scanning in Cloud Build to automatically scan images during the build process.
To effectively detect vulnerabilities in Docker images before deployment, enabling Vulnerability scanning in Container Registry or Artifact Registry is recommended. These services are specifically designed for storing and scanning container images. Options suggesting Cloud Source Repositories, Cloud Private Catalog, or Cloud Build for direct vulnerability scanning are incorrect, as these services do not natively support image vulnerability scanning in the context described. For more details, refer to the Google Cloud documentation on container analysis and image vulnerabilities.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
No comments yet.
Your team utilizes Docker images for application development. There's a critical need to identify and mitigate vulnerabilities in these images before they're deployed, using Cloud Build. As the responsible engineer, what are TWO effective strategies to implement vulnerability detection in this workflow?
A
Activate Vulnerability scanning within Artifact Registry to examine images for vulnerabilities.
B
Implement Vulnerability scanning in Cloud Source Repositories as a means to scan images.
C
Enable Vulnerability scanning in Container Registry to scrutinize images for potential exploits.
D
Utilize Vulnerability scanning in Cloud Private Catalog for image vulnerability detection.
E
Incorporate Vulnerability scanning in Cloud Build to automatically scan images during the build process.