Challenge - 5 Problems
Image Security Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
💻 Command Output
intermediate2:00remaining
Output of Trivy scan on a vulnerable image
You run the command
trivy image alpine:3.12 to scan the Alpine Linux image for vulnerabilities. What is the expected output type?Kubernetes
trivy image alpine:3.12Attempts:
2 left
💡 Hint
Trivy scans images and reports vulnerabilities found inside them.
✗ Incorrect
Trivy outputs a detailed list of vulnerabilities found in the image, including severity and CVE identifiers.
🧠 Conceptual
intermediate1:30remaining
Purpose of image security scanning in Kubernetes
What is the main purpose of performing image security scanning before deploying containers in Kubernetes?
Attempts:
2 left
💡 Hint
Think about why security scanning is important before running containers.
✗ Incorrect
Image security scanning helps identify known vulnerabilities in container images to prevent deploying insecure containers.
🔀 Workflow
advanced2:30remaining
Correct order of steps for integrating image scanning in CI/CD
Arrange the following steps in the correct order to integrate image security scanning into a Kubernetes CI/CD pipeline.
Attempts:
2 left
💡 Hint
Think about when scanning should happen relative to building and pushing images.
✗ Incorrect
You first build the image, then scan it for vulnerabilities before pushing it to the registry and deploying it.
❓ Troubleshoot
advanced2:00remaining
Troubleshooting failed image scan due to missing permissions
A Trivy scan fails with the error:
failed to initialize image source: unauthorized: authentication required. What is the most likely cause?Attempts:
2 left
💡 Hint
Consider what 'authentication required' means when accessing images.
✗ Incorrect
This error means Trivy cannot access the image because it lacks proper credentials for the private registry.
✅ Best Practice
expert3:00remaining
Best practice for automating image security scanning in Kubernetes environments
Which approach is considered best practice for automating image security scanning in Kubernetes environments?
Attempts:
2 left
💡 Hint
Think about how automation and early detection improve security.
✗ Incorrect
Automating scanning in the CI pipeline helps catch vulnerabilities early and prevents insecure images from being deployed.