Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

KCNA Questions and Answers

Question # 6

Which statement about the Kubernetes network model is correct?

A.

Pods can only communicate with Pods exposed via a Service.

B.

Pods can communicate with all Pods without NAT.

C.

The Pod IP is only visible inside a Pod.

D.

The Service IP is used for the communication between Services.

Full Access
Question # 7

What are the advantages of adopting a GitOps approach for your deployments?

A.

Reduce failed deployments, operational costs, and fragile release processes.

B.

Reduce failed deployments, configuration drift, and fragile release processes.

C.

Reduce failed deployments, operational costs, and learn git.

D.

Reduce failed deployments, configuration drift and improve your reputation.

Full Access
Question # 8

Which of the following is a correct definition of a Helm chart?

A.

A Helm chart is a collection of YAML files bundled in a tar.gz file and can be applied without decompressing it.

B.

A Helm chart is a collection of JSON files and contains all the resource definitions to run an application on Kubernetes.

C.

A Helm chart is a collection of YAML files that can be applied on Kubernetes by using the kubectl tool.

D.

A Helm chart is similar to a package and contains all the resource definitions to run an application on Kubernetes.

Full Access
Question # 9

Which Kubernetes Service type exposes a service only within the cluster?

A.

ClusterIP

B.

NodePort

C.

LoadBalancer

D.

ExternalName

Full Access
Question # 10

Can a Kubernetes Service expose multiple ports?

A.

No, you can only expose one port per each Service.

B.

Yes, but you must specify an unambiguous name for each port.

C.

Yes, the only requirement is to use different port numbers.

D.

No, because the only port you can expose is port number 443.

Full Access
Question # 11

If kubectl is failing to retrieve information from the cluster, where can you find Pod logs to troubleshoot?

A.

/var/log/pods/

B.

~/.kube/config

C.

/var/log/k8s/

D.

/etc/kubernetes/

Full Access
Question # 12

What is Helm?

A.

An open source dashboard for Kubernetes.

B.

A package manager for Kubernetes applications.

C.

A custom scheduler for Kubernetes.

D.

An end-to-end testing project for Kubernetes applications.

Full Access
Question # 13

Which of the following statements is correct concerning Open Policy Agent (OPA)?

A.

The policies must be written in Python language.

B.

Kubernetes can use it to validate requests and apply policies.

C.

Policies can only be tested when published.

D.

It cannot be used outside Kubernetes.

Full Access
Question # 14

What framework does Kubernetes use to authenticate users with JSON Web Tokens?

A.

OpenID Connect

B.

OpenID Container

C.

OpenID Cluster

D.

OpenID CNCF

Full Access
Question # 15

Which of the following sentences is true about namespaces in Kubernetes?

A.

You can create a namespace within another namespace in Kubernetes.

B.

You can create two resources of the same kind and name in a namespace.

C.

The default namespace exists when a new cluster is created.

D.

All the objects in the cluster are namespaced by default.

Full Access
Question # 16

What is ephemeral storage?

A.

Storage space that need not persist across restarts.

B.

Storage that may grow dynamically.

C.

Storage used by multiple consumers (e.g., multiple Pods).

D.

Storage that is always provisioned locally.

Full Access
Question # 17

A site reliability engineer needs to temporarily prevent new Pods from being scheduled on node-2 while keeping the existing workloads running without disruption. Which kubectl command should be used?

A.

kubectl cordon node-2

B.

kubectl delete node-2

C.

kubectl drain node-2

D.

kubectl pause deployment

Full Access
Question # 18

Which component of the node is responsible to run workloads?

A.

The kubelet.

B.

The kube-proxy.

C.

The kube-apiserver.

D.

The container runtime.

Full Access
Question # 19

What is the main purpose of etcd in Kubernetes?

A.

etcd stores all cluster data in a key value store.

B.

etcd stores the containers running in the cluster for disaster recovery.

C.

etcd stores copies of the Kubernetes config files that live /etc/.

D.

etcd stores the YAML definitions for all the cluster components.

Full Access
Question # 20

Which of these is a valid container restart policy?

A.

On login

B.

On update

C.

On start

D.

On failure

Full Access
Question # 21

What does “Continuous Integration” mean?

A.

The continuous integration and testing of code changes from multiple sources manually.

B.

The continuous integration and testing of code changes from multiple sources via automation.

C.

The continuous integration of changes from one environment to another.

D.

The continuous integration of new tools to support developers in a project.

Full Access
Question # 22

What is the role of the ingressClassName field in a Kubernetes Ingress resource?

A.

It defines the type of protocol (HTTP or HTTPS) that the Ingress Controller should process.

B.

It specifies the backend Service used by the Ingress Controller to route external requests.

C.

It determines how routing rules are prioritized when multiple Ingress objects are applied.

D.

It indicates which Ingress Controller should implement the rules defined in the Ingress resource.

Full Access
Question # 23

What is the practice of bringing financial accountability to the variable spend model of cloud resources?

A.

FaaS

B.

DevOps

C.

CloudCost

D.

FinOps

Full Access
Question # 24

How can you extend the Kubernetes API?

A.

Adding a CustomResourceDefinition or implementing an aggregation layer.

B.

Adding a new version of a resource, for instance v4beta3.

C.

With the command kubectl extend api, logged in as an administrator.

D.

Adding the desired API object as a kubelet parameter.

Full Access
Question # 25

Scenario: You have a Kubernetes cluster hosted in a public cloud provider. When trying to create a Service of type LoadBalancer, the external-ip is stuck in the "Pending" state. Which Kubernetes component is failing in this scenario?

A.

Cloud Controller Manager

B.

Load Balancer Manager

C.

Cloud Architecture Manager

D.

Cloud Load Balancer Manager

Full Access
Question # 26

What feature must a CNI support to control specific traffic flows for workloads running in Kubernetes?

A.

Border Gateway Protocol

B.

IP Address Management

C.

Pod Security Policy

D.

Network Policies

Full Access
Question # 27

In a Kubernetes cluster, what is the primary role of the Kubernetes scheduler?

A.

To manage the lifecycle of the Pods by restarting them when they fail.

B.

To monitor the health of the nodes and Pods in the cluster.

C.

To handle network traffic between services within the cluster.

D.

To distribute Pods across nodes based on resource availability and constraints.

Full Access
Question # 28

What is the name of the Kubernetes resource used to expose an application?

A.

Port

B.

Service

C.

DNS

D.

Deployment

Full Access
Question # 29

What is a sidecar container?

A.

A Pod that runs next to another container within the same Pod.

B.

A container that runs next to another Pod within the same namespace.

C.

A container that runs next to another container within the same Pod.

D.

A Pod that runs next to another Pod within the same namespace.

Full Access
Question # 30

What is the purpose of the kube-proxy?

A.

The kube-proxy balances network requests to Pods.

B.

The kube-proxy maintains network rules on nodes.

C.

The kube-proxy ensures the cluster connectivity with the internet.

D.

The kube-proxy maintains the DNS rules of the cluster.

Full Access
Question # 31

Which command will list the resource types that exist within a cluster?

A.

kubectl api-resources

B.

kubectl get namespaces

C.

kubectl api-versions

D.

curl https://kubectrl/namespaces

Full Access
Question # 32

Which are the two primary modes for Service discovery within a Kubernetes cluster?

A.

Environment variables and DNS

B.

API calls and LDAP

C.

Labels and RADIUS

D.

Selectors and DHCP

Full Access
Question # 33

What is a Service?

A.

A static network mapping from a Pod to a port.

B.

A way to expose an application running on a set of Pods.

C.

The network configuration for a group of Pods.

D.

An NGINX load balancer that gets deployed for an application.

Full Access
Question # 34

Which GitOps engine can be used to orchestrate parallel jobs on Kubernetes?

A.

Jenkins X

B.

Flagger

C.

Flux

D.

Argo Workflows

Full Access
Question # 35

What helps an organization to deliver software more securely at a higher velocity?

A.

Kubernetes

B.

apt-get

C.

Docker Images

D.

CI/CD Pipeline

Full Access
Question # 36

In Kubernetes, which command is the most efficient way to check the progress of a Deployment rollout and confirm if it has completed successfully?

A.

kubectl get deployments --show-labels -o wide

B.

kubectl describe deployment my-deployment --namespace=default

C.

kubectl logs deployment/my-deployment --all-containers=true

D.

kubectl rollout status deployment/my-deployment

Full Access
Question # 37

What's the most adopted way of conflict resolution and decision-making for the open-source projects under the CNCF umbrella?

A.

Financial Analysis

B.

Discussion and Voting

C.

Flipism Technique

D.

Project Founder Say

Full Access
Question # 38

Why is Cloud-Native Architecture important?

A.

Cloud Native Architecture revolves around containers, microservices and pipelines.

B.

Cloud Native Architecture removes constraints to rapid innovation.

C.

Cloud Native Architecture is modern for application deployment and pipelines.

D.

Cloud Native Architecture is a bleeding edge technology and service.

Full Access
Question # 39

Which component of the Kubernetes architecture is responsible for integration with the CRI container runtime?

A.

kubeadm

B.

kubelet

C.

kube-apiserver

D.

kubectl

Full Access
Question # 40

Which option represents best practices when building container images?

A.

Use multi-stage builds, use the latest tag for image version, and only install necessary packages.

B.

Use multi-stage builds, pin the base image version to a specific digest, and install extra packages just in case.

C.

Use multi-stage builds, pin the base image version to a specific digest, and only install necessary packages.

D.

Avoid multi-stage builds, use the latest tag for image version, and install extra packages just in case.

Full Access
Question # 41

What is the default eviction timeout when the Ready condition of a node is Unknown or False?

A.

Thirty seconds.

B.

Thirty minutes.

C.

One minute.

D.

Five minutes.

Full Access
Question # 42

What is the API that exposes resource metrics from the metrics-server?

A.

custom.k8s.io

B.

resources.k8s.io

C.

metrics.k8s.io

D.

cadvisor.k8s.io

Full Access
Question # 43

What is a DaemonSet?

A.

It’s a type of workload that ensures a specific set of nodes run a copy of a Pod.

B.

It’s a type of workload responsible for maintaining a stable set of replica Pods running in any node.

C.

It’s a type of workload that needs to be run periodically on a given schedule.

D.

It’s a type of workload that provides guarantees about ordering, uniqueness, and identity of a set of Pods.

Full Access
Question # 44

What is the role of a NetworkPolicy in Kubernetes?

A.

The ability to cryptic and obscure all traffic.

B.

The ability to classify the Pods as isolated and non isolated.

C.

The ability to prevent loopback or incoming host traffic.

D.

The ability to log network security events.

Full Access
Question # 45

What is the purpose of the kubelet component within a Kubernetes cluster?

A.

A dashboard for Kubernetes clusters that allows management and troubleshooting of applications.

B.

A network proxy that runs on each node in your cluster, implementing part of the Kubernetes Service concept.

C.

A component that watches for newly created Pods with no assigned node, and selects a node for them to run on.

D.

An agent that runs on each node in the cluster. It makes sure that containers are running in a Pod.

Full Access
Question # 46

Which Kubernetes resource workload ensures that all (or some) nodes run a copy of a Pod?

A.

DaemonSet

B.

StatefulSet

C.

kubectl

D.

Deployment

Full Access
Question # 47

Which of the following best describes horizontally scaling an application deployment?

A.

The act of adding/removing node instances to the cluster to meet demand.

B.

The act of adding/removing applications to meet demand.

C.

The act of adding/removing application instances of the same application to meet demand.

D.

The act of adding/removing resources to application instances to meet demand.

Full Access
Question # 48

When modifying an existing Helm release to apply new configuration values, which approach is the best practice?

A.

Use helm upgrade with the --set flag to apply new values while preserving the release history.

B.

Use kubectl edit to modify the live release configuration and apply the updated resource values.

C.

Delete the release and reinstall it with the desired configuration to force an updated deployment.

D.

Edit the Helm chart source files directly and reapply them to push the updated configuration values.

Full Access
Question # 49

What native runtime is Open Container Initiative (OCI) compliant?

A.

runC

B.

runV

C.

kata-containers

D.

gvisor

Full Access
Question # 50

The cloud native architecture centered around microservices provides a strong system that ensures ______________.

A.

fallback

B.

resiliency

C.

failover

D.

high reachability

Full Access
Question # 51

What default level of protection is applied to the data in Secrets in the Kubernetes API?

A.

The values use AES symmetric encryption

B.

The values are stored in plain text

C.

The values are encoded with SHA256 hashes

D.

The values are base64 encoded

Full Access
Question # 52

A Pod named my-app must be created to run a simple nginx container. Which kubectl command should be used?

A.

kubectl create nginx --name=my-app

B.

kubectl run my-app --image=nginx

C.

kubectl create my-app --image=nginx

D.

kubectl run nginx --name=my-app

Full Access
Question # 53

Which of the following cloud native proxies is used for ingress/egress in a service mesh and can also serve as an application gateway?

A.

Frontend proxy

B.

Kube-proxy

C.

Envoy proxy

D.

Reverse proxy

Full Access
Question # 54

What is the Kubernetes abstraction that allows groups of Pods to be exposed inside a Kubernetes cluster?

A.

Deployment

B.

Daemon

C.

Unit

D.

Service

Full Access
Question # 55

In Kubernetes, what is the primary responsibility of the kubelet running on each worker node?

A.

To allocate persistent storage volumes and manage distributed data replication for Pods.

B.

To manage cluster state information and handle all scheduling decisions for workloads.

C.

To ensure that containers defined in Pod specifications are running and remain healthy on the node.

D.

To provide internal DNS resolution and route service traffic between Pods and nodes.

Full Access
Question # 56

What is the difference between a Deployment and a ReplicaSet?

A.

With a Deployment, you can’t control the number of pod replicas.

B.

A ReplicaSet does not guarantee a stable set of replica pods running.

C.

A Deployment is basically the same as a ReplicaSet with annotations.

D.

A Deployment is a higher-level concept that manages ReplicaSets.

Full Access
Question # 57

What Kubernetes component handles network communications inside and outside of a cluster, using operating system packet filtering if available?

A.

kube-proxy

B.

kubelet

C.

etcd

D.

kube-controller-manager

Full Access
Question # 58

What is Serverless computing?

A.

A computing method of providing backend services on an as-used basis.

B.

A computing method of providing services for AI and ML operating systems.

C.

A computing method of providing services for quantum computing operating systems.

D.

A computing method of providing services for cloud computing operating systems.

Full Access
Question # 59

Which of the following characteristics is associated with container orchestration?

A.

Application message distribution

B.

Dynamic scheduling

C.

Deploying application JAR files

D.

Virtual machine distribution

Full Access
Question # 60

Which command lists the running containers in the current Kubernetes namespace?

A.

kubectl get pods

B.

kubectl ls

C.

kubectl ps

D.

kubectl show pods

Full Access
Question # 61

How do you deploy a workload to Kubernetes without additional tools?

A.

Create a Bash script and run it on a worker node.

B.

Create a Helm Chart and install it with helm.

C.

Create a manifest and apply it with kubectl.

D.

Create a Python script and run it with kubectl.

Full Access
Question # 62

What do Deployments and StatefulSets have in common?

A.

They manage Pods that are based on an identical container spec.

B.

They support the OnDelete update strategy.

C.

They support an ordered, graceful deployment and scaling.

D.

They maintain a sticky identity for each of their Pods.

Full Access
Question # 63

Which of the following are tasks performed by a container orchestration tool?

A.

Schedule, scale, and manage the health of containers.

B.

Create images, scale, and manage the health of containers.

C.

Debug applications, and manage the health of containers.

D.

Store images, scale, and manage the health of containers.

Full Access
Question # 64

Which of the following options includes valid API versions?

A.

alpha1v1, beta3v3, v2

B.

alpha1, beta3, v2

C.

v1alpha1, v2beta3, v2

D.

v1alpha1, v2beta3, 2.0

Full Access
Question # 65

In Kubernetes, what is the primary function of a RoleBinding?

A.

To provide a user or group with permissions across all resources at the cluster level.

B.

To assign the permissions of a Role to a user, group, or service account within a namespace.

C.

To enforce namespace network rules by binding policies to Pods running in the namespace.

D.

To create and define a new Role object that contains a specific set of permissions.

Full Access
Question # 66

Imagine you're releasing open-source software for the first time. Which of the following is a valid semantic version?

A.

1.0

B.

2021-10-11

C.

0.1.0-rc

D.

v1beta1

Full Access
Question # 67

Which API object is the recommended way to run a scalable, stateless application on your cluster?

A.

ReplicaSet

B.

Deployment

C.

DaemonSet

D.

Pod

Full Access
Question # 68

What function does kube-proxy provide to a cluster?

A.

Implementing the Ingress resource type for application traffic.

B.

Forwarding data to the correct endpoints for Services.

C.

Managing data egress from the cluster nodes to the network.

D.

Managing access to the Kubernetes API.

Full Access
Question # 69

What is the core metric type in Prometheus used to represent a single numerical value that can go up and down?

A.

Summary

B.

Counter

C.

Histogram

D.

Gauge

Full Access
Question # 70

Which of the following is a good habit for cloud native cost efficiency?

A.

Follow an automated approach to cost optimization, including visibility and forecasting.

B.

Follow manual processes for cost analysis, including visibility and forecasting.

C.

Use only one cloud provider to simplify the cost analysis.

D.

Keep your legacy workloads unchanged, to avoid cloud costs.

Full Access
Question # 71

What is the main purpose of a DaemonSet?

A.

A DaemonSet ensures that all (or certain) nodes run a copy of a Pod.

B.

A DaemonSet ensures that the kubelet is constantly up and running.

C.

A DaemonSet ensures that there are as many pods running as specified in the replicas field.

D.

A DaemonSet ensures that a process (agent) runs on every node.

Full Access