Which step would give an attacker a foothold in a cluster butno long-term persistence?
Which other controllers are part of the kube-controller-manager inside the Kubernetes cluster?
Which of the following is a valid security risk caused by having no egress controls in a Kubernetes cluster?
In a Kubernetes environment, what kind of Admission Controller can modify resource manifests when applied to the Kubernetes API to fix misconfigurations automatically?
To restrict the kubelet's rights to the Kubernetes API, whatauthorization modeshould be set on the Kubernetes API server?
Why does the defaultbase64 encodingthat Kubernetes applies to the contents of Secret resources provide inadequate protection?
A cluster administrator wants to enforce the use of a different container runtime depending on the application a workload belongs to.
What is the reasoning behind considering the Cloud as the trusted computing base of a Kubernetes cluster?
In order to reduce the attack surface of the Scheduler, which default parameter should be set to false?
A cluster is failing to pull more recent versions of images from k8s.gcr.io. Why may this be?