Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam Professional Cloud Architect All Questions

View all questions & answers for the Professional Cloud Architect exam

Exam Professional Cloud Architect topic 4 question 2 discussion

Actual exam question from Google's Professional Cloud Architect
Question #: 2
Topic #: 4
[All Professional Cloud Architect Questions]

For this question, refer to the EHR Healthcare case study. You need to define the technical architecture for securely deploying workloads to Google Cloud. You also need to ensure that only verified containers are deployed using Google Cloud services. What should you do? (Choose two.)

  • A. Enable Binary Authorization on GKE, and sign containers as part of a CI/CD pipeline.
  • B. Configure Jenkins to utilize Kritis to cryptographically sign a container as part of a CI/CD pipeline.
  • C. Configure Container Registry to only allow trusted service accounts to create and deploy containers from the registry.
  • D. Configure Container Registry to use vulnerability scanning to confirm that there are no vulnerabilities before deploying the workload.
Show Suggested Answer Hide Answer
Suggested Answer: AD 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
raf2121
Highly Voted 3 years, 3 months ago
A & D Binary Authorization to ensure only verified containers are deployed To ensure deployment are secure and and consistent, automatically scan images for vulnerabilities with container analysis (https://cloud.google.com/docs/ci-cd/overview?hl=en&skip_cache=true)
upvoted 49 times
cloudmon
2 years, 7 months ago
Also see references to the combination of using binary authorization and vulnerability scanning here: https://cloud.google.com/binary-authorization/docs/overview
upvoted 12 times
...
...
KillerGoogle
Highly Voted 3 years, 3 months ago
IMHO its A&C
upvoted 32 times
mgm7
2 years, 11 months ago
I see a lot of people answered D but I don't see how it answers the question. I can securely deploy complete junk code. There is no contradiction in this phrase even if one obviously should avoid doing this.
upvoted 6 times
BeCalm
1 year, 8 months ago
Dude the same applies to C. Trusted service accounts can deploy junk too.
upvoted 8 times
medi01
1 year, 7 months ago
But that's the goal: secure the deployment process.
upvoted 4 times
...
...
...
...
dfizban
Most Recent 1 month, 1 week ago
Selected Answer: AD
A&D I'm sure
upvoted 1 times
...
pcamaster
1 month, 3 weeks ago
Selected Answer: AC
AC Question is about: - Securing the deployment process - Make sure only verified containers can run on the cluster A: Covers the secondo point thanks to binary authorization. It also covers the signing requirement, as it is performed at CICD level. B: This is already covered by A. C: Makes sure that only required Service Accounts can pull the code from registry, so it covers the first part of the questione D. Secure scanning is about "security vulnerability in code". So it does not cover deployment phase, nor authorization phase. So, it's A & C
upvoted 1 times
...
ukivanlamlpi
4 months, 2 weeks ago
Selected Answer: AB
who deploy is not an issue, the question is 'only verified containers' ....kritis can do that.
upvoted 2 times
...
upliftinghut
5 months, 2 weeks ago
Selected Answer: AD
A : use binary authorization then D check vulnerabilities before being able to deploy
upvoted 1 times
...
Dav_96
7 months, 1 week ago
Selected Answer: A
Just got out of the exam. You only need to specify one answer, hence I chose A.
upvoted 10 times
...
Pime13
9 months, 3 weeks ago
Selected Answer: AD
ad for me
upvoted 1 times
...
Pime13
9 months, 4 weeks ago
Selected Answer: AD
https://cloud.google.com/docs/ci-cd/overview?hl=en&skip_cache=true https://cloud.google.com/binary-authorization/docs/overview
upvoted 1 times
...
didek1986
10 months ago
Selected Answer: AC
For surę AC
upvoted 1 times
...
JohnDohertyDoe
10 months, 2 weeks ago
Selected Answer: AC
Answer should be A & C, as the ask is to ensure only verified containers to be deployed. With just Binary Authorisation and signing images, you can't fulfil the requirement, you would need to also restrict it at the IAM level, so that no bad actor can create an image in the registry and bypass Binary Authorization to deploy an image.
upvoted 5 times
...
sudaraka
10 months, 2 weeks ago
I think A&B Kritis is an admission controller webhook for Kubernetes that enforces deploy-time security policies. By configuring Jenkins to use Kritis, you can cryptographically sign containers as part of the CI/CD pipeline, ensuring only signed containers are deployed. https://cloud.google.com/binary-authorization/docs/creating-attestations-kritis
upvoted 5 times
...
[Removed]
10 months, 4 weeks ago
Selected Answer: AD
Option C is incorrect because while limiting access to trusted service accounts enhances security, it doesn't ensure that only verified containers are deployed.
upvoted 3 times
...
Prudvi3266
11 months ago
Selected Answer: AD
Checked with standard process for this. I found the below. Image Building and Scanning: Developers build container images locally or using Cloud Build. Images are scanned for vulnerabilities using integrated tools or third-party services. Clean images are pushed to GCR. Image Verification: Binary Authorization enforces policies for image acceptance. Attestations from Cloud Security Scanner or third-party tools can be used.
upvoted 3 times
...
oidajoi
11 months, 1 week ago
A&D. C is incorrect because you configuring Container Registry doesn't only allow trusted service accounts to create/deploy containers. With IAM permissions, anyone can create non-trusted service accounts to deploy containers, or users can still deploy containers not in Container Registry.
upvoted 2 times
...
Roro_Brother
11 months, 2 weeks ago
Selected Answer: AC
A & C correct
upvoted 1 times
...
PreJo
11 months, 2 weeks ago
a and c are ok
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...