Ultimate access to all questions.
Your team utilizes Docker images for application development, and there's a critical requirement to detect vulnerabilities in these images before deployment. As part of the Cloud Build process, you're responsible for implementing a solution to identify exploits in Docker images prior to their deployment. Which of the following steps would you take to fulfill this requirement?