Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam Professional Cloud DevOps Engineer topic 1 question 16 discussion

Actual exam question from Google's Professional Cloud DevOps Engineer
Question #: 16
Topic #: 1
[All Professional Cloud DevOps Engineer Questions]

You are managing the production deployment to a set of Google Kubernetes Engine (GKE) clusters. You want to make sure only images which are successfully built by your trusted CI/CD pipeline are deployed to production. What should you do?

  • A. Enable Cloud Security Scanner on the clusters.
  • B. Enable Vulnerability Analysis on the Container Registry.
  • C. Set up the Kubernetes Engine clusters as private clusters.
  • D. Set up the Kubernetes Engine clusters with Binary Authorization.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️
Reference:
https://codelabs.developers.google.com/codelabs/cloud-builder-gke-continuous-deploy/index.html#1

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
devopsbatch
Highly Voted 2 years, 11 months ago
D because binary authorization is deploy time security tool and it will allow only trusted and attested containers into GKE
upvoted 28 times
AzureDP900
1 year, 6 months ago
Agreed with D.
upvoted 2 times
...
...
Charun
Highly Voted 2 years, 10 months ago
D 100%
upvoted 9 times
...
trashbox
Most Recent 2 weeks, 5 days ago
Selected Answer: D
Exam on 2024-04-26
upvoted 2 times
...
desertlotus1211
1 month ago
Answer is D: The question states: 'only images which are successfully built..' which means Vulnerability Scanns have been completed...
upvoted 1 times
...
jomonkp
5 months, 2 weeks ago
option D
upvoted 2 times
...
carloscorreia
8 months, 1 week ago
Selected Answer: D
To ensure that only images successfully built by your trusted CI/CD pipeline are deployed to production on Google Kubernetes Engine (GKE) clusters, you should set up the Kubernetes Engine clusters with Binary Authorization. Therefore, the correct answer is: D. Set up the Kubernetes Engine clusters with Binary Authorization.
upvoted 2 times
...
carloscorreia
8 months, 1 week ago
Selected Answer: B
B The question approach is about a trusted image generated, Is possible to create an image binary authorized with vulnerabilities?
upvoted 1 times
kagami2
5 months, 2 weeks ago
yes it is possible, as long as it is attested by an attestor.
upvoted 1 times
...
...
SarumanMX
9 months, 1 week ago
In another mock test I took this was a select-2 answers, and those were B & D
upvoted 1 times
...
samuelmorher
10 months, 3 weeks ago
Who is the one that selects the correct answers?, because it matches 1/9999, looks more like a random.
upvoted 1 times
...
JonathanSJ
1 year, 4 months ago
Selected Answer: D
D. Set up the Kubernetes Engine clusters with Binary Authorization. Binary Authorization is a feature of Google Kubernetes Engine that allows you to ensure that only containers that are verified to be from a trusted source are deployed to your clusters. It works by using a policy that checks the signatures of container images before they are deployed. You can configure Binary Authorization to require that all images are signed by a trusted certificate authority (CA) or that they are signed by a trusted key that you manage. This ensures that only images that have been successfully built by your trusted CI/CD pipeline are deployed to your production clusters.
upvoted 5 times
...
floppino
1 year, 4 months ago
Selected Answer: D
Ans: D Exam passed and taken on 19/12/2022, 50/50 from this dump without buying the full access and looking for 'devops' word here: https://www.examtopics.com/discussions/google/1/
upvoted 1 times
...
shivanisarthi
1 year, 5 months ago
D is the right answer. The dump is valid, got all questions from here and cleared the exam
upvoted 2 times
...
hanweiCN
1 year, 5 months ago
i will go with D, as there is no vulnerability analysis , it is vulnerability scan in container analysis service. and the binary authorization use metadata store to secure trusted repository.
upvoted 2 times
...
zellck
1 year, 6 months ago
Selected Answer: D
D is the answer. https://cloud.google.com/binary-authorization Binary Authorization is a deploy-time security control that ensures only trusted container images are deployed on Google Kubernetes Engine (GKE) or Cloud Run. With Binary Authorization, you can require images to be signed by trusted authorities during the development process and then enforce signature validation when deploying. By enforcing validation, you can gain tighter control over your container environment by ensuring only verified images are integrated into the build-and-release process.
upvoted 1 times
...
GCP72
1 year, 9 months ago
Selected Answer: D
answer is D
upvoted 1 times
...
Halimb
1 year, 10 months ago
Selected Answer: D
Must be D.
upvoted 1 times
...
xtxrtx
1 year, 11 months ago
Selected Answer: D
answer is D
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...