Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam Professional Cloud Architect All Questions

View all questions & answers for the Professional Cloud Architect exam

Exam Professional Cloud Architect topic 1 question 166 discussion

Actual exam question from Google's Professional Cloud Architect
Question #: 166
Topic #: 1
[All Professional Cloud Architect Questions]

Your company places a high value on being responsive and meeting customer needs quickly. Their primary business objectives are release speed and agility. You want to reduce the chance of security errors being accidentally introduced.
Which two actions can you take? (Choose two.)

  • A. Ensure every code check-in is peer reviewed by a security SME
  • B. Use source code security analyzers as part of the CI/CD pipeline
  • C. Ensure you have stubs to unit test all interfaces between components
  • D. Enable code signing and a trusted binary repository integrated with your CI/CD pipeline
  • E. Run a vulnerability security scanner as part of your continuous-integration /continuous-delivery (CI/CD) pipeline
Show Suggested Answer Hide Answer
Suggested Answer: BE 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
PeppaPig
Highly Voted 3 years, 3 months ago
B&E Code signing only verifies the author. In other words it only check who you are, but not what have you done
upvoted 50 times
robotgeek
3 years ago
I understand that would be a requirement for security
upvoted 2 times
Ishu_awsguy
2 years, 2 months ago
But when we select E , it might auto include B . SOme VA scanning tools also do SAST. So why choose B and E in that case. D makes more sense with E . Authorised repo will add an additional layer of security with verified images and artifacts in it.
upvoted 2 times
squishy_fishy
11 months, 2 weeks ago
At work, we do B and E.
upvoted 1 times
...
...
...
...
rishab86
Highly Voted 3 years, 5 months ago
I think answer is D & E.
upvoted 36 times
AK2020
3 years, 5 months ago
Agree with this. https://cloud.google.com/container-registry/docs/container-analysis
upvoted 3 times
ravisar
2 years, 12 months ago
Here the question is to provide solution for "Speed and Agility". The Binary authorization prevent unauthorized deployments in production for GKE, Anthos Servicemesh and Cloud run, however will add delay in deployment process. So D may not be suitable in this scenario. Answer is B&E.
upvoted 10 times
Ishu_awsguy
2 years, 2 months ago
Speed will nit get hampered if the images are verified and attested. Checks need to be there. If you argument would be true than why to introduce VA scanner , as that will also induce delay in deployment. when we select E , it might auto include B . Some VA scanning tools also do SAST. So why choose B and E in that case. D makes more sense with E . Authorised repo will add an additional layer of security with verified images and artifacts in it. Answer - D & E
upvoted 2 times
...
...
...
...
wooyourdaddy
Most Recent 1 month, 3 weeks ago
Selected Answer: BE
Option D does not directly address the primary concern of reducing the chance of security errors being accidentally introduced. Here’s why: Focus on Integrity: Code signing and using a trusted binary repository primarily ensure that the code and binaries have not been tampered with and are from a trusted source. While this is important for security, it doesn’t specifically target the detection and prevention of security vulnerabilities within the code itself. Indirect Impact on Security Errors: While code signing can help prevent the introduction of malicious code, it doesn’t directly scan for or identify security vulnerabilities that might be accidentally introduced by developers.
upvoted 2 times
...
pico
6 months, 3 weeks ago
Selected Answer: BE
why the other options aren't as ideal: A. Ensure every code check-in is peer reviewed by a security SME: Manual reviews can become a bottleneck in agile environments and are less scalable than automated tools. C. Ensure you have stubs to unit test all interfaces between components: Good practice, but primarily focuses on functional rather than security testing. D. Enable code signing and a trusted binary repository...: Integrity checks are essential but don't directly prevent the introduction of the security errors themselves.
upvoted 1 times
...
phantomsg
8 months, 2 weeks ago
Selected Answer: BE
Cyber Sec professional here. Question asks to reduce chance of security errors accidentally introduced. This means to integrate Static Application Security Tests (SAST) and Dynamic Application Security Tests (DAST) as part of CI/CD pipeline. Hence B and E are the right match. D is to ensure only trusted code is deployed to production, not reduce 'security error accidentally introduced'.
upvoted 4 times
...
OrangeTiger
10 months, 1 week ago
I guess A and C are both time consuming and labor intensive. Also, aren't C stubs supposed to be used for unit tests? What remains is BDE. B is source code inspection. Doing D ensures that the repository is not contaminated. E's vulnerability scan detects whether there are any CVEs. I think all of them are correct. If you had to choose two, what would it be? Isn't it really slow if you do B and E?
upvoted 1 times
...
02fc23a
12 months ago
Selected Answer: DE
https://cloud.google.com/blog/products/devops-sre/devsecops-and-cicd-using-google-cloud-built-in-services
upvoted 5 times
...
cchiaramelli
1 year ago
Selected Answer: DE
The thing that makes me think D makes sense is that it ensures that only images that have passed though the configured CI/CD pipeline (with vulnerability checks) will be able to be deployed. This is better explained here: https://cloud.google.com/blog/products/containers-kubernetes/guard-against-security-vulnerabilities-with-container-registry-vulnerability-scanning
upvoted 2 times
...
cchiaramelli
1 year ago
Selected Answer: DE
https://cloud.google.com/blog/products/containers-kubernetes/guard-against-security-vulnerabilities-with-container-registry-vulnerability-scanning
upvoted 1 times
...
steghe
1 year, 1 month ago
Selected Answer: BE
Code signing only verifies the author not content
upvoted 1 times
...
someone2011
1 year, 1 month ago
DE https://cloud.google.com/blog/products/containers-kubernetes/guard-against-security-vulnerabilities-with-container-registry-vulnerability-scanning
upvoted 2 times
...
sampon279
1 year, 5 months ago
Selected Answer: BE
trusted binary repository option seems a static thing. For a release if we haven not used any new packages, trusted binary repository would not add any extra value. So B&E which will are needed for every checking/release.
upvoted 1 times
...
red_panda
1 year, 5 months ago
Selected Answer: BE
B and E is the answer for me also.
upvoted 1 times
...
mateuszma
1 year, 6 months ago
Selected Answer: DE
here you can find why: https://cloud.google.com/blog/products/devops-sre/devsecops-and-cicd-using-google-cloud-built-in-services
upvoted 4 times
...
JC0926
1 year, 8 months ago
Selected Answer: B
B) Using source code security analyzers as part of the CI/CD pipeline can help identify security vulnerabilities and issues early in the development process. This can help reduce the risk of security errors being accidentally introduced and ensure that security is integrated into the development process from the beginning. E) Running a vulnerability security scanner as part of the CI/CD pipeline can help identify vulnerabilities and issues in the code and infrastructure before they are deployed to production. This can help reduce the risk of security errors being accidentally introduced and ensure that security is integrated into the development process from the beginning.
upvoted 1 times
...
WinSxS
1 year, 8 months ago
Selected Answer: BE
B. Use source code security analyzers as part of the CI/CD pipeline E. Run a vulnerability security scanner as part of your continuous-integration /continuous-delivery (CI/CD) pipeline These actions ensure that security is integrated into the development and deployment processes and helps catch security issues early in the software development lifecycle.
upvoted 1 times
...
PST21
1 year, 8 months ago
ChatGPT says B & E :-)
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...