Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam Professional Cloud Architect topic 1 question 166 discussion

Actual exam question from Google's Professional Cloud Architect
Question #: 166
Topic #: 1
[All Professional Cloud Architect Questions]

Your company places a high value on being responsive and meeting customer needs quickly. Their primary business objectives are release speed and agility. You want to reduce the chance of security errors being accidentally introduced.
Which two actions can you take? (Choose two.)

  • A. Ensure every code check-in is peer reviewed by a security SME
  • B. Use source code security analyzers as part of the CI/CD pipeline
  • C. Ensure you have stubs to unit test all interfaces between components
  • D. Enable code signing and a trusted binary repository integrated with your CI/CD pipeline
  • E. Run a vulnerability security scanner as part of your continuous-integration /continuous-delivery (CI/CD) pipeline
Show Suggested Answer Hide Answer
Suggested Answer: BE 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
PeppaPig
Highly Voted 2 years, 9 months ago
B&E Code signing only verifies the author. In other words it only check who you are, but not what have you done
upvoted 49 times
robotgeek
2 years, 6 months ago
I understand that would be a requirement for security
upvoted 2 times
Ishu_awsguy
1 year, 8 months ago
But when we select E , it might auto include B . SOme VA scanning tools also do SAST. So why choose B and E in that case. D makes more sense with E . Authorised repo will add an additional layer of security with verified images and artifacts in it.
upvoted 2 times
squishy_fishy
5 months, 1 week ago
At work, we do B and E.
upvoted 1 times
...
...
...
...
rishab86
Highly Voted 2 years, 11 months ago
I think answer is D & E.
upvoted 36 times
AK2020
2 years, 11 months ago
Agree with this. https://cloud.google.com/container-registry/docs/container-analysis
upvoted 3 times
ravisar
2 years, 5 months ago
Here the question is to provide solution for "Speed and Agility". The Binary authorization prevent unauthorized deployments in production for GKE, Anthos Servicemesh and Cloud run, however will add delay in deployment process. So D may not be suitable in this scenario. Answer is B&E.
upvoted 9 times
Ishu_awsguy
1 year, 8 months ago
Speed will nit get hampered if the images are verified and attested. Checks need to be there. If you argument would be true than why to introduce VA scanner , as that will also induce delay in deployment. when we select E , it might auto include B . Some VA scanning tools also do SAST. So why choose B and E in that case. D makes more sense with E . Authorised repo will add an additional layer of security with verified images and artifacts in it. Answer - D & E
upvoted 2 times
...
...
...
...
pico
Most Recent 2 weeks ago
Selected Answer: BE
why the other options aren't as ideal: A. Ensure every code check-in is peer reviewed by a security SME: Manual reviews can become a bottleneck in agile environments and are less scalable than automated tools. C. Ensure you have stubs to unit test all interfaces between components: Good practice, but primarily focuses on functional rather than security testing. D. Enable code signing and a trusted binary repository...: Integrity checks are essential but don't directly prevent the introduction of the security errors themselves.
upvoted 1 times
...
phantomsg
2 months ago
Selected Answer: BE
Cyber Sec professional here. Question asks to reduce chance of security errors accidentally introduced. This means to integrate Static Application Security Tests (SAST) and Dynamic Application Security Tests (DAST) as part of CI/CD pipeline. Hence B and E are the right match. D is to ensure only trusted code is deployed to production, not reduce 'security error accidentally introduced'.
upvoted 2 times
...
OrangeTiger
4 months ago
I guess A and C are both time consuming and labor intensive. Also, aren't C stubs supposed to be used for unit tests? What remains is BDE. B is source code inspection. Doing D ensures that the repository is not contaminated. E's vulnerability scan detects whether there are any CVEs. I think all of them are correct. If you had to choose two, what would it be? Isn't it really slow if you do B and E?
upvoted 1 times
...
02fc23a
5 months, 2 weeks ago
Selected Answer: DE
https://cloud.google.com/blog/products/devops-sre/devsecops-and-cicd-using-google-cloud-built-in-services
upvoted 5 times
...
cchiaramelli
6 months, 3 weeks ago
Selected Answer: DE
The thing that makes me think D makes sense is that it ensures that only images that have passed though the configured CI/CD pipeline (with vulnerability checks) will be able to be deployed. This is better explained here: https://cloud.google.com/blog/products/containers-kubernetes/guard-against-security-vulnerabilities-with-container-registry-vulnerability-scanning
upvoted 2 times
...
cchiaramelli
6 months, 3 weeks ago
Selected Answer: DE
https://cloud.google.com/blog/products/containers-kubernetes/guard-against-security-vulnerabilities-with-container-registry-vulnerability-scanning
upvoted 1 times
...
steghe
7 months, 1 week ago
Selected Answer: BE
Code signing only verifies the author not content
upvoted 1 times
...
someone2011
7 months, 3 weeks ago
DE https://cloud.google.com/blog/products/containers-kubernetes/guard-against-security-vulnerabilities-with-container-registry-vulnerability-scanning
upvoted 2 times
...
sampon279
10 months, 3 weeks ago
Selected Answer: BE
trusted binary repository option seems a static thing. For a release if we haven not used any new packages, trusted binary repository would not add any extra value. So B&E which will are needed for every checking/release.
upvoted 1 times
...
red_panda
11 months ago
Selected Answer: BE
B and E is the answer for me also.
upvoted 1 times
...
mateuszma
1 year ago
Selected Answer: DE
here you can find why: https://cloud.google.com/blog/products/devops-sre/devsecops-and-cicd-using-google-cloud-built-in-services
upvoted 4 times
...
JC0926
1 year, 1 month ago
Selected Answer: B
B) Using source code security analyzers as part of the CI/CD pipeline can help identify security vulnerabilities and issues early in the development process. This can help reduce the risk of security errors being accidentally introduced and ensure that security is integrated into the development process from the beginning. E) Running a vulnerability security scanner as part of the CI/CD pipeline can help identify vulnerabilities and issues in the code and infrastructure before they are deployed to production. This can help reduce the risk of security errors being accidentally introduced and ensure that security is integrated into the development process from the beginning.
upvoted 1 times
...
WinSxS
1 year, 2 months ago
Selected Answer: BE
B. Use source code security analyzers as part of the CI/CD pipeline E. Run a vulnerability security scanner as part of your continuous-integration /continuous-delivery (CI/CD) pipeline These actions ensure that security is integrated into the development and deployment processes and helps catch security issues early in the software development lifecycle.
upvoted 1 times
...
PST21
1 year, 2 months ago
ChatGPT says B & E :-)
upvoted 2 times
...
nick_name_1
1 year, 2 months ago
B? There is no category of product called "source code security analyzer"
upvoted 2 times
essadequeiroz
1 year, 2 months ago
Polaris, BlackDuck, etc
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...