
Answer-first summary for fast verification
Answer: Implement vulnerability scanning in Container Registry to scan images for potential exploits.
The correct approach is to enable vulnerability scanning in either Container Registry or Artifact Registry, as these services are specifically designed to scan images for OS vulnerabilities automatically. The other options are incorrect because they either do not support image scanning or are not the recommended services for this purpose. For more details, refer to the documentation on automatically scanning images for OS vulnerabilities.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
No comments yet.
Your team utilizes Docker images for application development, and there's a critical requirement to detect vulnerabilities in these images before deployment. As part of the Cloud Build process, you're responsible for implementing a solution to identify exploits in Docker images prior to their deployment. Which of the following steps would you take to fulfill this requirement?
A
Activate vulnerability scanning in Artifact Registry to inspect images for vulnerabilities.
B
Turn on vulnerability scanning in Cloud Private Catalog to examine images for security issues.
C
Enable vulnerability scanning in Cloud Source Repositories to check images for vulnerabilities.
D
Implement vulnerability scanning in Container Registry to scan images for potential exploits.
E
Utilize vulnerability scanning in Cloud Build to analyze images for vulnerabilities.