
Ultimate access to all questions.
Your team utilizes Docker images for application development, and there's a critical requirement to detect vulnerabilities in these images before deployment. As part of the Cloud Build process, you're responsible for implementing a solution to identify exploits in Docker images prior to their deployment. Which of the following steps would you take to fulfill this requirement?
A
Activate vulnerability scanning in Artifact Registry to inspect images for vulnerabilities.
B
Turn on vulnerability scanning in Cloud Private Catalog to examine images for security issues.
C
Enable vulnerability scanning in Cloud Source Repositories to check images for vulnerabilities.
D
Implement vulnerability scanning in Container Registry to scan images for potential exploits.
E
Utilize vulnerability scanning in Cloud Build to analyze images for vulnerabilities.