As the use of the container is keeping pace in the software industry, it is always good to test how much you understand about Docker security in terms of its usage. Like the Docker threat landscape, Docker Security Hardening, How Docker architecture poses a security threat, etc.
This Docker Security quiz would help you to understand the very basics working part of Docker Security exploitation and mitigation. It has 10 questions. You have 10 minutes to complete the quiz and you would need 80% to pass the quiz.
If you find any issue in the quiz, please mail us at [email protected]
You can also comment on what you think about this quiz content and its quality.
0 of 10 Questions completed
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 10 Questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Attackers can use a _____________ to escape the container and gain access to the host as root.CorrectIncorrect
_____________ should not be exposed to the internet, as it is not authenticatedCorrectIncorrect
To exploit a vulnerable third-party package in an image, an attacker would attackCorrectIncorrect
_______________ prevents the user from using a container image from an unknown source.CorrectIncorrect
Restrict Allowable Base images is one of the security points we should enforce in CI/CDCorrectIncorrect
Command to perform image signing for Docker ContainersCorrectIncorrect
Enforce Docker Daemon isolation as a Docker Security Best Practices, because itCorrectIncorrect
Restrict docker daemon communication to the local Docker client only by binding the Docker daemon to _____.CorrectIncorrect
Configure containers to run images as _____ by default.CorrectIncorrect
Best practice to store and protect sensitive information in an image to use authentication and secrets in _____.CorrectIncorrect