0
0
GCPcloud~20 mins

Container supply chain security in GCP - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Container Supply Chain Security Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Understanding Container Image Vulnerability Scanning

Which of the following best describes the purpose of container image vulnerability scanning in a supply chain?

AIt encrypts container images to prevent unauthorized access.
BIt automatically updates container images to the latest version.
CIt monitors container runtime performance metrics.
DIt checks container images for known security issues before deployment.
Attempts:
2 left
💡 Hint

Think about what security scanning tools do before containers run.

Architecture
intermediate
2:00remaining
Securing Container Supply Chain with Binary Authorization

In Google Cloud, which component enforces that only trusted container images are deployed to GKE clusters?

ACloud CDN
BCloud Armor
CBinary Authorization
DCloud Functions
Attempts:
2 left
💡 Hint

Consider the service that controls image deployment policies.

Configuration
advanced
2:30remaining
Identifying the Effect of a Binary Authorization Policy

Given this Binary Authorization policy snippet, what will happen if an image is not signed by the trusted authority?

{
  "defaultAdmissionRule": {
    "enforcementMode": "ENFORCED",
    "requireAttestationsBy": ["projects/my-project/attestors/my-attestor"]
  }
}
AThe image will deploy but with a warning logged.
BThe image deployment will be blocked by Binary Authorization.
CThe image will deploy without any checks.
DThe image will be automatically signed by Binary Authorization.
Attempts:
2 left
💡 Hint

What does enforcementMode ENFORCED imply?

service_behavior
advanced
2:00remaining
Behavior of Container Analysis API in Supply Chain Security

What is the primary role of the Container Analysis API in Google Cloud's container supply chain security?

AIt stores and retrieves metadata about container images, including vulnerability and attestation data.
BIt automatically patches vulnerabilities in running containers.
CIt encrypts container images stored in Container Registry.
DIt manages container orchestration and scaling.
Attempts:
2 left
💡 Hint

Think about metadata and security information storage.

security
expert
3:00remaining
Impact of Missing Attestation in a Multi-Stage Supply Chain

In a multi-stage container supply chain using Binary Authorization, what is the impact if an intermediate build stage image lacks a required attestation?

AThe final image deployment will be blocked because the supply chain integrity cannot be verified.
BBinary Authorization automatically generates missing attestations for intermediate images.
CThe missing attestation is ignored if the final image is signed correctly.
DOnly the intermediate image deployment is blocked; the final image deploys normally.
Attempts:
2 left
💡 Hint

Consider how Binary Authorization verifies the entire supply chain.