Quiz Question 5
When during the CI/CD pipeline does vulnerability scanning typically occur?
This exercise is part of the course
Manage Scalable Workloads in GKE
Hands-on interactive exercise
Turn theory into action with one of our interactive exercises
Start Exercise