0
0
GCPcloud~20 mins

Binary Authorization for containers in GCP - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Binary Authorization Mastery
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Understanding Binary Authorization Policy Enforcement

What happens when a container image is deployed to Google Kubernetes Engine (GKE) with Binary Authorization enabled, but the image is not signed by a trusted authority?

AThe deployment is blocked and the container does not start.
BThe container starts but logs a warning about the unsigned image.
CThe container starts normally without any restrictions.
DThe deployment is allowed only if the image is from a public registry.
Attempts:
2 left
💡 Hint

Think about the purpose of Binary Authorization in enforcing image trust.

Architecture
intermediate
2:00remaining
Configuring Binary Authorization with Attestors

You want to enforce that only container images signed by your internal CI system can be deployed to your GKE cluster. Which component must you configure in Binary Authorization to achieve this?

AEnable Shielded Nodes on the GKE cluster.
BCreate an Attestor linked to your CI system's signing keys.
CConfigure a Network Policy to restrict image downloads.
DSet up a Cloud Armor policy for the cluster.
Attempts:
2 left
💡 Hint

Consider how Binary Authorization verifies image signatures.

security
advanced
2:00remaining
Impact of Missing Attestor in Binary Authorization Policy

What is the effect on container image deployment if a Binary Authorization policy requires an Attestor that is not configured or missing?

AThe policy is ignored and deployment proceeds normally.
BAll container images are allowed without signature verification.
COnly images signed by other Attestors are allowed; unsigned images are blocked.
DAll container image deployments are blocked until the Attestor is configured.
Attempts:
2 left
💡 Hint

Think about how Binary Authorization enforces policies with required Attestors.

service_behavior
advanced
2:00remaining
Binary Authorization Behavior with Multiple Attestors

If a Binary Authorization policy requires multiple Attestors, what is the expected behavior when a container image is signed by only some of them?

AThe deployment is blocked because all Attestors must approve the image.
BThe deployment is allowed if at least one Attestor approves the image.
CThe deployment is allowed only if the image is signed by the first Attestor in the list.
DThe deployment is allowed regardless of Attestor signatures.
Attempts:
2 left
💡 Hint

Consider the strictness of requiring multiple Attestors in a policy.

Best Practice
expert
3:00remaining
Best Practice for Managing Binary Authorization Keys

Which practice is best for managing signing keys used by Binary Authorization Attestors to ensure security and operational reliability?

AShare signing keys publicly to allow easy verification by all developers.
BUse the same signing key indefinitely to avoid deployment failures.
CRotate signing keys regularly and store private keys securely using Cloud KMS.
DStore private signing keys on developer laptops for quick access.
Attempts:
2 left
💡 Hint

Think about key security and operational continuity.