Challenge - 5 Problems
Vulnerability Scanning Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
💻 Command Output
intermediate2:00remaining
Output of Docker image vulnerability scan using Trivy
You run the command
trivy image alpine:3.18 to scan the Alpine Linux Docker image for vulnerabilities. What is the expected type of output you will see?Docker
trivy image alpine:3.18Attempts:
2 left
💡 Hint
Trivy scans images and reports vulnerabilities with details like severity and fixes.
✗ Incorrect
Trivy scans container images and outputs detected vulnerabilities with details such as severity, affected packages, and fixed versions if available. It does not just show image metadata or layer counts.
🧠 Conceptual
intermediate2:00remaining
Understanding vulnerability scanning in CI/CD pipelines
Why is it important to include Docker image vulnerability scanning as part of a CI/CD pipeline?
Attempts:
2 left
💡 Hint
Think about security risks and deployment safety.
✗ Incorrect
Including vulnerability scanning in CI/CD helps catch security problems early, preventing vulnerable containers from reaching production environments.
❓ Troubleshoot
advanced2:00remaining
Troubleshooting Trivy scan failure due to missing Docker daemon
You run
trivy image myapp:latest on a server without Docker installed and get an error. What is the most likely cause?Docker
trivy image myapp:latest
Attempts:
2 left
💡 Hint
Trivy needs to access the image locally or remotely.
✗ Incorrect
Without Docker installed or running, Trivy cannot pull or inspect local images, causing scan failures.
❓ Configuration
advanced2:00remaining
Configuring Trivy to ignore low severity vulnerabilities
Which Trivy command option correctly configures the scan to report only vulnerabilities with severity HIGH or CRITICAL?
Attempts:
2 left
💡 Hint
Check Trivy's official option for severity filtering.
✗ Incorrect
The correct option is --severity followed by a comma-separated list of severities to include in the report.
✅ Best Practice
expert2:00remaining
Best practice for scanning multi-stage Docker builds
In a multi-stage Dockerfile, which stage should you scan for vulnerabilities to ensure the final image is secure?
Attempts:
2 left
💡 Hint
Think about hidden vulnerabilities in build stages.
✗ Incorrect
Scanning all stages helps detect vulnerabilities in build dependencies that might affect the build process or leak into the final image.