Month End Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

KCSA Questions and Answers

Question # 6

Which step would give an attacker a foothold in a cluster butno long-term persistence?

A.

Modify Kubernetes objects stored within etcd.

B.

Modify file on host filesystem.

C.

Starting a process in a running container.

D.

Create restarting container on host using Docker.

Full Access
Question # 7

Which other controllers are part of the kube-controller-manager inside the Kubernetes cluster?

A.

Job controller, CronJob controller, and DaemonSet controller

B.

Pod, Service, and Ingress controller

C.

Namespace controller, ConfigMap controller, and Secret controller

D.

Replication controller, Endpoints controller, Namespace controller, and ServiceAccounts controller

Full Access
Question # 8

Which of the following is a valid security risk caused by having no egress controls in a Kubernetes cluster?

A.

Denial of Service

B.

Data exfiltration

C.

Increased attack surface

D.

Unauthorized access to external resources

Full Access
Question # 9

In a Kubernetes environment, what kind of Admission Controller can modify resource manifests when applied to the Kubernetes API to fix misconfigurations automatically?

A.

ValidatingAdmissionController

B.

PodSecurityPolicy

C.

MutatingAdmissionController

D.

ResourceQuota

Full Access
Question # 10

To restrict the kubelet's rights to the Kubernetes API, whatauthorization modeshould be set on the Kubernetes API server?

A.

Node

B.

AlwaysAllow

C.

kubelet

D.

Webhook

Full Access
Question # 11

Why does the defaultbase64 encodingthat Kubernetes applies to the contents of Secret resources provide inadequate protection?

A.

Base64 encoding is vulnerable to brute-force attacks.

B.

Base64 encoding relies on a shared key which can be easily compromised.

C.

Base64 encoding does not encrypt the contents of the Secret, only obfuscates it.

D.

Base64 encoding is not supported by all Secret Stores.

Full Access
Question # 12

How can a user enforce thePod Security Standardwithout third-party tools?

A.

Through implementing Kyverno or OPA Policies.

B.

Use the PodSecurity admission controller.

C.

It is only possible to enforce the Pod Security Standard with additional tools within the cloud native ecosystem.

D.

No additional measures have to be taken to enforce the Pod Security Standard.

Full Access
Question # 13

A cluster administrator wants to enforce the use of a different container runtime depending on the application a workload belongs to.

A.

By manually modifying the container runtime for each workload after it has been created.

B.

By modifying the kube-apiserver configuration file to specify the desired container runtime for each application.

C.

By configuring avalidating admission controllerwebhook that verifies the container runtime based on the application label and rejects requests that do not comply.

D.

By configuring amutating admission controllerwebhook that intercepts new workload creation requests and modifies the container runtime based on the application label.

Full Access
Question # 14

What is the reasoning behind considering the Cloud as the trusted computing base of a Kubernetes cluster?

A.

The Cloud enforces security controls at the Kubernetes cluster level, so application developers can focus on applications only.

B.

A Kubernetes cluster can only be trusted if the underlying Cloud provider is certified against international standards.

C.

A vulnerability in the Cloud layer has a negligible impact on containers due to Linux isolation mechanisms.

D.

A Kubernetes cluster can only be as secure as the security posture of its Cloud hosting.

Full Access
Question # 15

In order to reduce the attack surface of the Scheduler, which default parameter should be set to false?

A.

--scheduler-name

B.

--profiling

C.

--secure-kubeconfig

D.

--bind-address

Full Access
Question # 16

A cluster is failing to pull more recent versions of images from k8s.gcr.io. Why may this be?

A.

There is a network connectivity issue between the cluster and k8s.gcr.io.

B.

There is a bug in the container runtime or the image pull process.

C.

The authentication credentials for accessing k8s.gcr.io are incorrectly scoped.

D.

The container image registry k8s.gcr.io has been deprecated.

Full Access
Question # 17

In Kubernetes, what isPublic Key Infrastructure (PKI)used for?

A.

To manage certificates and ensure secure communication in a Kubernetes cluster.

B.

To automate the scaling of containers in a Kubernetes cluster.

C.

To manage networking in a Kubernetes cluster.

D.

To monitor and analyze performance metrics of a Kubernetes cluster.

Full Access
Question # 18

What kind of organization would need to be compliant with PCI DSS?

A.

Retail stores that only accept cash payments.

B.

Government agencies that collect personally identifiable information.

C.

Non-profit organizations that handle sensitive customer data.

D.

Merchants that process credit card payments.

Full Access