0
0
GCPcloud~20 mins

Container vulnerability scanning in GCP - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Container Vulnerability Scanning Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Understanding Container Vulnerability Scanning in GCP

Which GCP service is primarily used to automatically scan container images for vulnerabilities when they are pushed to Container Registry or Artifact Registry?

AContainer Analysis
BCloud Run
CCloud Functions
DCloud Build
Attempts:
2 left
💡 Hint

Think about the service that stores metadata and security findings about container images.

Configuration
intermediate
2:00remaining
Configuring Vulnerability Scanning for Artifact Registry

You want to ensure that all container images pushed to Artifact Registry are scanned for vulnerabilities automatically. Which configuration step is required?

AManually run vulnerability scans using Cloud Build after pushing images.
BEnable the Container Analysis API and set up Artifact Registry to trigger scans on image push.
CEnable Cloud Run to scan images automatically on deployment.
DConfigure Cloud Functions to scan images after deployment.
Attempts:
2 left
💡 Hint

Automatic scanning requires enabling a specific API and integration with Artifact Registry.

Architecture
advanced
2:00remaining
Designing a Secure Container Deployment Pipeline

You are designing a CI/CD pipeline on GCP that builds container images, scans them for vulnerabilities, and only deploys images that pass the scan. Which architecture best enforces this security requirement?

AUse Cloud Functions to scan images after deployment and rollback if vulnerabilities are found.
BUse Cloud Run to build and deploy images directly without scanning.
CUse Artifact Registry to build images and deploy them without scanning.
DUse Cloud Build to build images, Container Analysis to scan, and Cloud Deploy with a policy gate that blocks deployment of vulnerable images.
Attempts:
2 left
💡 Hint

Think about integrating scanning results into deployment gating.

security
advanced
2:00remaining
Interpreting Vulnerability Scan Results

After scanning a container image with Container Analysis, you receive a report showing vulnerabilities with severity levels: HIGH, MEDIUM, and LOW. Which action aligns best with security best practices?

ADeploy images only if no vulnerabilities of any severity are found.
BIgnore all vulnerabilities below HIGH severity and deploy images anyway.
CImmediately block deployment if any HIGH severity vulnerabilities are found, but allow MEDIUM and LOW after review.
DDeploy images regardless of vulnerabilities but monitor logs for issues.
Attempts:
2 left
💡 Hint

Consider risk levels and practical deployment constraints.

service_behavior
expert
2:00remaining
Behavior of Container Analysis on Image Updates

When a new version of a container image is pushed to Artifact Registry, how does Container Analysis handle vulnerability scanning and reporting?

AIt automatically scans the new image version and updates the vulnerability report without affecting previous versions.
BIt rescans all previous image versions and merges reports into one summary.
CIt requires manual trigger to scan the new image version.
DIt deletes previous vulnerability reports and replaces them with the new image's report.
Attempts:
2 left
💡 Hint

Think about how scanning is version-specific and automated.