What mechanism can I use to block unsigned images from running in my cluster?
Answer : D
In the context of Kubernetes, what is privilege escalation?
Answer : D
Which of the following best defines the shared responsibility model in the Cloud?
Answer : D
In a multi-tenant Kubernetes environment where each team has distinct access requirements and workloads, which combination of strategies would enhance client security and maintain workload isolation?
Answer : B
A company is using Kubernetes to manage its cloud-native applications. They want to ensure that the security controls are consistently configured and reduce the probability of misconfiguration.
Which option is the best approach to achieve this?
Answer : A
What security risks are introduced by Pod misconfiguration?
Answer : D
A user has a client X.509 certificate with Subject including 0=system:masters that lets them authenticate to the Kubernetes API server. What is the consequence of this?
Answer : B
Which value of the runAsUser field in the security context for a Pod denotes that the Pod is running as root?
Answer : D
What was the name of the precursor to Pod Security Standards?
Answer : B
What is the recommended way to pass Secrets into a container running in a Pod?
Answer : D
Which components should be able to access etcd at the network level directly?
Answer : D
How does the kube-proxy forward traffic to a Pod based on its Service configuration?
Answer : B
A user runs a command with kubectl to apply a change to a deployment. What is the first Kubernetes component that the request reaches?
Answer : D
What is the difference between gVisor and Firecracker?
Answer : C
What is the name for the process of assessing the validity of vulnerabilities detected in the code or dependencies of a piece of software?
Answer : B
Have any questions or issues ? Please dont hesitate to contact us