exam questions

Exam Professional Cloud Architect All Questions

View all questions & answers for the Professional Cloud Architect exam

Exam Professional Cloud Architect topic 4 question 2 discussion

Actual exam question from Google's Professional Cloud Architect
Question #: 2
Topic #: 4
[All Professional Cloud Architect Questions]

For this question, refer to the EHR Healthcare case study. You need to define the technical architecture for securely deploying workloads to Google Cloud. You also need to ensure that only verified containers are deployed using Google Cloud services. What should you do? (Choose two.)

  • A. Enable Binary Authorization on GKE, and sign containers as part of a CI/CD pipeline.
  • B. Configure Jenkins to utilize Kritis to cryptographically sign a container as part of a CI/CD pipeline.
  • C. Configure Container Registry to only allow trusted service accounts to create and deploy containers from the registry.
  • D. Configure Container Registry to use vulnerability scanning to confirm that there are no vulnerabilities before deploying the workload.
Show Suggested Answer Hide Answer
Suggested Answer: AD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
raf2121
Highly Voted 3 years, 5 months ago
A & D Binary Authorization to ensure only verified containers are deployed To ensure deployment are secure and and consistent, automatically scan images for vulnerabilities with container analysis (https://cloud.google.com/docs/ci-cd/overview?hl=en&skip_cache=true)
upvoted 50 times
cloudmon
2 years, 10 months ago
Also see references to the combination of using binary authorization and vulnerability scanning here: https://cloud.google.com/binary-authorization/docs/overview
upvoted 13 times
...
...
KillerGoogle
Highly Voted 3 years, 5 months ago
IMHO its A&C
upvoted 32 times
mgm7
3 years, 2 months ago
I see a lot of people answered D but I don't see how it answers the question. I can securely deploy complete junk code. There is no contradiction in this phrase even if one obviously should avoid doing this.
upvoted 6 times
BeCalm
1 year, 11 months ago
Dude the same applies to C. Trusted service accounts can deploy junk too.
upvoted 8 times
medi01
1 year, 10 months ago
But that's the goal: secure the deployment process.
upvoted 4 times
...
...
...
...
desertlotus1211
Most Recent 2 months, 2 weeks ago
Selected Answer: AB
Answer is A&B. remember the questions ask abut securely deployment container images and verified containers. scanning for vulnerabilities does not accomplish this. I know this goes against common sense, but good code or bad code - how would you securely deploy the container? Answer is A&B.
upvoted 1 times
...
dfizban
4 months, 1 week ago
Selected Answer: AD
A&D I'm sure
upvoted 1 times
...
pcamaster
4 months, 3 weeks ago
Selected Answer: AC
AC Question is about: - Securing the deployment process - Make sure only verified containers can run on the cluster A: Covers the secondo point thanks to binary authorization. It also covers the signing requirement, as it is performed at CICD level. B: This is already covered by A. C: Makes sure that only required Service Accounts can pull the code from registry, so it covers the first part of the questione D. Secure scanning is about "security vulnerability in code". So it does not cover deployment phase, nor authorization phase. So, it's A & C
upvoted 1 times
...
ukivanlamlpi
7 months, 1 week ago
Selected Answer: AB
who deploy is not an issue, the question is 'only verified containers' ....kritis can do that.
upvoted 2 times
...
upliftinghut
8 months, 1 week ago
Selected Answer: AD
A : use binary authorization then D check vulnerabilities before being able to deploy
upvoted 1 times
...
Dav_96
10 months ago
Selected Answer: A
Just got out of the exam. You only need to specify one answer, hence I chose A.
upvoted 12 times
...
Pime13
1 year ago
Selected Answer: AD
ad for me
upvoted 1 times
...
Pime13
1 year ago
Selected Answer: AD
https://cloud.google.com/docs/ci-cd/overview?hl=en&skip_cache=true https://cloud.google.com/binary-authorization/docs/overview
upvoted 1 times
...
didek1986
1 year ago
Selected Answer: AC
For surę AC
upvoted 1 times
...
JohnDohertyDoe
1 year, 1 month ago
Selected Answer: AC
Answer should be A & C, as the ask is to ensure only verified containers to be deployed. With just Binary Authorisation and signing images, you can't fulfil the requirement, you would need to also restrict it at the IAM level, so that no bad actor can create an image in the registry and bypass Binary Authorization to deploy an image.
upvoted 5 times
...
sudaraka
1 year, 1 month ago
I think A&B Kritis is an admission controller webhook for Kubernetes that enforces deploy-time security policies. By configuring Jenkins to use Kritis, you can cryptographically sign containers as part of the CI/CD pipeline, ensuring only signed containers are deployed. https://cloud.google.com/binary-authorization/docs/creating-attestations-kritis
upvoted 5 times
...
[Removed]
1 year, 1 month ago
Selected Answer: AD
Option C is incorrect because while limiting access to trusted service accounts enhances security, it doesn't ensure that only verified containers are deployed.
upvoted 4 times
...
Prudvi3266
1 year, 1 month ago
Selected Answer: AD
Checked with standard process for this. I found the below. Image Building and Scanning: Developers build container images locally or using Cloud Build. Images are scanned for vulnerabilities using integrated tools or third-party services. Clean images are pushed to GCR. Image Verification: Binary Authorization enforces policies for image acceptance. Attestations from Cloud Security Scanner or third-party tools can be used.
upvoted 3 times
...
oidajoi
1 year, 2 months ago
A&D. C is incorrect because you configuring Container Registry doesn't only allow trusted service accounts to create/deploy containers. With IAM permissions, anyone can create non-trusted service accounts to deploy containers, or users can still deploy containers not in Container Registry.
upvoted 2 times
...
Roro_Brother
1 year, 2 months ago
Selected Answer: AC
A & C correct
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago