Spring Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Linux Foundation KCNA Dumps

Page: 1 / 24
Total 239 questions

Kubernetes and Cloud Native Associate Questions and Answers

Question 1

Which statement about Secrets is correct?

Options:

A.

A Secret is part of a Pod specification.

B.

Secret data is encrypted with the cluster private key by default.

C.

Secret data is base64 encoded and stored unencrypted by default.

D.

A Secret can only be used for confidential data.

Question 2

Which of the following are tasks performed by a container orchestration tool?

Options:

A.

Schedule, scale, and manage the health of containers.

B.

Create images, scale, and manage the health of containers.

C.

Debug applications, and manage the health of containers.

D.

Store images, scale, and manage the health of containers.

Question 3

Which Kubernetes resource uses immutable: true boolean field?

Options:

A.

Deployment

B.

Pod

C.

ConfigMap

D.

ReplicaSet

Question 4

What is the main purpose of the Ingress in Kubernetes?

Options:

A.

Access HTTP and HTTPS services running in the cluster based on their IP address.

B.

Access services different from HTTP or HTTPS running in the cluster based on their IP address.

C.

Access services different from HTTP or HTTPS running in the cluster based on their path.

D.

Access HTTP and HTTPS services running in the cluster based on their path.

Question 5

What is a Pod?

Options:

A.

A networked application within Kubernetes.

B.

A storage volume within Kubernetes.

C.

A single container within Kubernetes.

D.

A group of one or more containers within Kubernetes.

Question 6

Which of the following is the correct command to run an nginx deployment with 2 replicas?

Options:

A.

kubectl run deploy nginx --image=nginx --replicas=2

B.

kubectl create deploy nginx --image=nginx --replicas=2

C.

kubectl create nginx deployment --image=nginx --replicas=2

D.

kubectl create deploy nginx --image=nginx --count=2

Question 7

CI/CD stands for:

Options:

A.

Continuous Information / Continuous Development

B.

Continuous Integration / Continuous Development

C.

Cloud Integration / Cloud Development

D.

Continuous Integration / Continuous Deployment

Question 8

Which of the following cloud native proxies is used for ingress/egress in a service mesh and can also serve as an application gateway?

Options:

A.

Frontend proxy

B.

Kube-proxy

C.

Envoy proxy

D.

Reverse proxy

Question 9

What edge and service proxy tool is designed to be integrated with cloud native applications?

Options:

A.

CoreDNS

B.

CNI

C.

gRPC

D.

Envoy

Question 10

What is the name of the Kubernetes resource used to expose an application?

Options:

A.

Port

B.

Service

C.

DNS

D.

Deployment

Question 11

What can be used to create a job that will run at specified times/dates or on a repeating schedule?

Options:

A.

Job

B.

CalendarJob

C.

BatchJob

D.

CronJob

Question 12

Kubernetes ___ allows you to automatically manage the number of nodes in your cluster to meet demand.

Options:

A.

Node Autoscaler

B.

Cluster Autoscaler

C.

Horizontal Pod Autoscaler

D.

Vertical Pod Autoscaler

Question 13

Which Kubernetes Service type exposes a service only within the cluster?

Options:

A.

ClusterIP

B.

NodePort

C.

LoadBalancer

D.

ExternalName

Question 14

What is a Kubernetes service with no cluster IP address called?

Options:

A.

Headless Service

B.

Nodeless Service

C.

IPLess Service

D.

Specless Service

Question 15

Which statement about Ingress is correct?

Options:

A.

Ingress provides a simple way to track network endpoints within a cluster.

B.

Ingress is a Service type like NodePort and ClusterIP.

C.

Ingress is a construct that allows you to specify how a Pod is allowed to communicate.

D.

Ingress exposes routes from outside the cluster to Services in the cluster.

Question 16

What is the primary mechanism to identify grouped objects in a Kubernetes cluster?

Options:

A.

Custom Resources

B.

Labels

C.

Label Selector

D.

Pod

Question 17

Which type of Service requires manual creation of Endpoints?

Options:

A.

LoadBalancer

B.

Services without selectors

C.

NodePort

D.

ClusterIP with selectors

Question 18

Which of the following statements is correct concerning Open Policy Agent (OPA)?

Options:

A.

The policies must be written in Python language.

B.

Kubernetes can use it to validate requests and apply policies.

C.

Policies can only be tested when published.

D.

It cannot be used outside Kubernetes.

Question 19

Which of the following is a recommended security habit in Kubernetes?

Options:

A.

Run the containers as the user with group ID 0 (root) and any user ID.

B.

Disallow privilege escalation from within a container as the default option.

C.

Run the containers as the user with user ID 0 (root) and any group ID.

D.

Allow privilege escalation from within a container as the default option.

Question 20

In Kubernetes, what is the primary purpose of using annotations?

Options:

A.

To control the access permissions for users and service accounts.

B.

To provide a way to attach metadata to objects.

C.

To specify the deployment strategy for applications.

D.

To define the specifications for resource limits and requests.

Question 21

In which framework do the developers no longer have to deal with capacity, deployments, scaling and fault tolerance, and OS?

Options:

A.

Docker Swarm

B.

Kubernetes

C.

Mesos

D.

Serverless

Question 22

A site reliability engineer needs to temporarily prevent new Pods from being scheduled on node-2 while keeping the existing workloads running without disruption. Which kubectl command should be used?

Options:

A.

kubectl cordon node-2

B.

kubectl delete node-2

C.

kubectl drain node-2

D.

kubectl pause deployment

Question 23

In a Kubernetes cluster, which scenario best illustrates the use case for a StatefulSet?

Options:

A.

A web application that requires multiple replicas for load balancing.

B.

A service that routes traffic to various microservices in the cluster.

C.

A background job that runs periodically and does not maintain state.

D.

A database that requires persistent storage and stable network identities.

Question 24

What is ephemeral storage?

Options:

A.

Storage space that need not persist across restarts.

B.

Storage that may grow dynamically.

C.

Storage used by multiple consumers (e.g., multiple Pods).

D.

Storage that is always provisioned locally.

Question 25

Which of the following systems is NOT compatible with the CRI runtime interface standard?

(Typo corrected: “CRI-0” → “CRI-O”)

Options:

A.

CRI-O

B.

dockershim

C.

systemd

D.

containerd

Question 26

How does cert-manager integrate with Kubernetes resources to provide TLS certificates for an application?

Options:

A.

It manages Certificate resources and Secrets that can be used by Ingress objects for TLS.

B.

It replaces default Kubernetes API certificates with those from external authorities.

C.

It updates kube-proxy configuration to ensure encrypted traffic between Services.

D.

It injects TLS certificates directly into Pods when the workloads are deployed.

Question 27

Which of these is a valid container restart policy?

Options:

A.

On login

B.

On update

C.

On start

D.

On failure

Question 28

What happens if only a limit is specified for a resource and no admission-time mechanism has applied a default request?

Options:

A.

Kubernetes will create the container but it will fail with CrashLoopBackOff.

B.

Kubernetes does not allow containers to be created without request values, causing eviction.

C.

Kubernetes copies the specified limit and uses it as the requested value for the resource.

D.

Kubernetes chooses a random value and uses it as the requested value for the resource.

Question 29

What is the Kubernetes abstraction that allows groups of Pods to be exposed inside a Kubernetes cluster?

Options:

A.

Deployment

B.

Daemon

C.

Unit

D.

Service

Question 30

Which option represents best practices when building container images?

Options:

A.

Use multi-stage builds, use the latest tag for image version, and only install necessary packages.

B.

Use multi-stage builds, pin the base image version to a specific digest, and install extra packages just in case.

C.

Use multi-stage builds, pin the base image version to a specific digest, and only install necessary packages.

D.

Avoid multi-stage builds, use the latest tag for image version, and install extra packages just in case.

Question 31

What does vertical scaling an application deployment describe best?

Options:

A.

Adding/removing applications to meet demand.

B.

Adding/removing node instances to the cluster to meet demand.

C.

Adding/removing resources to applications to meet demand.

D.

Adding/removing application instances of the same application to meet demand.

Question 32

Kubernetes Secrets are specifically intended to hold confidential data. Which API object should be used to hold non-confidential data?

Options:

A.

CNI

B.

CSI

C.

ConfigMaps

D.

RBAC

Question 33

What is an important consideration when choosing a base image for a container in a Kubernetes deployment?

Options:

A.

It should be minimal and purpose-built for the application to reduce attack surface and improve performance.

B.

It should always be the latest version to ensure access to the newest features.

C.

It should be the largest available image to ensure all dependencies are included.

D.

It can be any existing image from the public repository without consideration of its contents.

Question 34

What is the core functionality of GitOps tools like Argo CD and Flux?

Options:

A.

They track production changes made by a human in a Git repository and generate a human-readable audit trail.

B.

They replace human operations with an agent that tracks Git commands.

C.

They automatically create pull requests when dependencies are outdated.

D.

They continuously compare the desired state in Git with the actual production state and notify or act upon differences.

Question 35

What does “Continuous Integration” mean?

Options:

A.

The continuous integration and testing of code changes from multiple sources manually.

B.

The continuous integration and testing of code changes from multiple sources via automation.

C.

The continuous integration of changes from one environment to another.

D.

The continuous integration of new tools to support developers in a project.

Question 36

What is the default value for authorization-mode in Kubernetes API server?

Options:

A.

--authorization-mode=RBAC

B.

--authorization-mode=AlwaysAllow

C.

--authorization-mode=AlwaysDeny

D.

--authorization-mode=ABAC

Question 37

Which of the following is a challenge derived from running cloud native applications?

Options:

A.

The operational costs of maintaining the data center of the company.

B.

Cost optimization is complex to maintain across different public cloud environments.

C.

The lack of different container images available in public image repositories.

D.

The lack of services provided by the most common public clouds.

Question 38

Which control plane component is responsible for updating the node Ready condition if a node becomes unreachable?

Options:

A.

The kube-proxy

B.

The node controller

C.

The kubectl

D.

The kube-apiserver

Question 39

Which of the following characteristics is associated with container orchestration?

Options:

A.

Application message distribution

B.

Dynamic scheduling

C.

Deploying application JAR files

D.

Virtual machine distribution

Question 40

What is the purpose of the CRI?

Options:

A.

To provide runtime integration control when multiple runtimes are used.

B.

Support container replication and scaling on nodes.

C.

Provide an interface allowing Kubernetes to support pluggable container runtimes.

D.

Allow the definition of dynamic resource criteria across containers.

Question 41

What factors influence the Kubernetes scheduler when it places Pods on nodes?

Options:

A.

Pod memory requests, node taints, and Pod affinity.

B.

Pod labels, node labels, and request labels.

C.

Node taints, node level, and Pod priority.

D.

Pod priority, container command, and node labels.

Question 42

What are the advantages of adopting a GitOps approach for your deployments?

Options:

A.

Reduce failed deployments, operational costs, and fragile release processes.

B.

Reduce failed deployments, configuration drift, and fragile release processes.

C.

Reduce failed deployments, operational costs, and learn git.

D.

Reduce failed deployments, configuration drift and improve your reputation.

Question 43

How many different Kubernetes service types can you define?

Options:

A.

2

B.

3

C.

4

D.

5

Question 44

Which of the following is a valid PromQL query?

Options:

A.

SELECT * from http_requests_total WHERE job=apiserver

B.

http_requests_total WHERE (job="apiserver")

C.

SELECT * from http_requests_total

D.

http_requests_total(job="apiserver")

Question 45

Imagine you're releasing open-source software for the first time. Which of the following is a valid semantic version?

Options:

A.

1.0

B.

2021-10-11

C.

0.1.0-rc

D.

v1beta1

Question 46

How to load and generate data required before the Pod startup?

Options:

A.

Use an init container with shared file storage.

B.

Use a PVC volume.

C.

Use a sidecar container with shared volume.

D.

Use another Pod with a PVC.

Question 47

Which of these components is part of the Kubernetes Control Plane?

Options:

A.

CoreDNS

B.

cloud-controller-manager

C.

kube-proxy

D.

kubelet

Question 48

What’s the difference between a security profile and a security context?

Options:

A.

Security Contexts configure Clusters and Namespaces at runtime. Security profiles are control plane mechanisms to enforce specific settings in the Security Context.

B.

Security Contexts configure Pods and Containers at runtime. Security profiles are control plane mechanisms to enforce specific settings in the Security Context.

C.

Security Profiles configure Pods and Containers at runtime. Security Contexts are control plane mechanisms to enforce specific settings in the Security Profile.

D.

Security Profiles configure Clusters and Namespaces at runtime. Security Contexts are control plane mechanisms to enforce specific settings in the Security Profile.

Question 49

What are the most important resources to guarantee the performance of an etcd cluster?

Options:

A.

CPU and disk capacity.

B.

Network throughput and disk I/O.

C.

CPU and RAM memory.

D.

Network throughput and CPU.

Question 50

In a cloud native environment, how do containerization and virtualization differ in terms of resource management?

Options:

A.

Containerization uses hypervisors to manage resources, while virtualization does not.

B.

Containerization shares the host OS, while virtualization runs a full OS for each instance.

C.

Containerization consumes more memory than virtualization by default.

D.

Containerization allocates resources per container, virtualization does not isolate them.

Question 51

Which are the two primary modes for Service discovery within a Kubernetes cluster?

Options:

A.

Environment variables and DNS

B.

API calls and LDAP

C.

Labels and RADIUS

D.

Selectors and DHCP

Question 52

Which of the following is a responsibility of the governance board of an open source project?

Options:

A.

Decide about the marketing strategy of the project.

B.

Review the pull requests in the main branch.

C.

Outline the project's “terms of engagement”.

D.

Define the license to be used in the project.

Question 53

A platform engineer wants to ensure that a new microservice is automatically deployed to every cluster registered in Argo CD. Which configuration best achieves this goal?

Options:

A.

Set up a Kubernetes CronJob that redeploys the microservice to all registered clusters on a schedule.

B.

Manually configure every registered cluster with the deployment YAML for installing the microservice.

C.

Create an Argo CD ApplicationSet that uses a Git repository containing the microservice manifests.

D.

Use a Helm chart to package the microservice and manage it with a single Application defined in Argo CD.

Question 54

What is a Dockerfile?

Options:

A.

A bash script that is used to automatically build a docker image.

B.

A config file that defines which image registry a container should be pushed to.

C.

A text file that contains all the commands a user could call on the command line to assemble an image.

D.

An image layer created by a running container stored on the host.

Question 55

In a serverless computing architecture:

Options:

A.

Users of the cloud provider are charged based on the number of requests to a function.

B.

Serverless functions are incompatible with containerized functions.

C.

Users should make a reservation to the cloud provider based on an estimation of usage.

D.

Containers serving requests are running in the background in idle status.

Question 56

Which is the correct kubectl command to display logs in real time?

Options:

A.

kubectl logs -p test-container-1

B.

kubectl logs -c test-container-1

C.

kubectl logs -l test-container-1

D.

kubectl logs -f test-container-1

Question 57

What does “continuous” mean in the context of CI/CD?

Options:

A.

Frequent releases, manual processes, repeatable, fast processing

B.

Periodic releases, manual processes, repeatable, automated processing

C.

Frequent releases, automated processes, repeatable, fast processing

D.

Periodic releases, automated processes, repeatable, automated processing

Question 58

Which of the following is the name of a container orchestration software?

Options:

A.

OpenStack

B.

Docker

C.

Apache Mesos

D.

CRI-O

Question 59

Which of the following options include resources cleaned by the Kubernetes garbage collection mechanism?

Options:

A.

Stale or expired CertificateSigningRequests (CSRs) and old deployments.

B.

Nodes deleted by a cloud controller manager and obsolete logs from the kubelet.

C.

Unused container and container images, and obsolete logs from the kubelet.

D.

Terminated pods, completed jobs, and objects without owner references.

Question 60

What are the two steps performed by the kube-scheduler to select a node to schedule a pod?

Options:

A.

Grouping and placing

B.

Filtering and selecting

C.

Filtering and scoring

D.

Scoring and creating

Question 61

Which statement about the Kubernetes network model is correct?

Options:

A.

Pods can only communicate with Pods exposed via a Service.

B.

Pods can communicate with all Pods without NAT.

C.

The Pod IP is only visible inside a Pod.

D.

The Service IP is used for the communication between Services.

Question 62

Which of the following options is true about considerations for large Kubernetes clusters?

Options:

A.

Kubernetes supports up to 1000 nodes and recommends no more than 1000 containers per node.

B.

Kubernetes supports up to 5000 nodes and recommends no more than 500 Pods per node.

C.

Kubernetes supports up to 5000 nodes and recommends no more than 110 Pods per node.

D.

Kubernetes supports up to 50 nodes and recommends no more than 1000 containers per node.

Question 63

How long should a stable API element in Kubernetes be supported (at minimum) after deprecation?

Options:

A.

9 months

B.

24 months

C.

12 months

D.

6 months

Question 64

In Kubernetes, which command is the most efficient way to check the progress of a Deployment rollout and confirm if it has completed successfully?

Options:

A.

kubectl get deployments --show-labels -o wide

B.

kubectl describe deployment my-deployment --namespace=default

C.

kubectl logs deployment/my-deployment --all-containers=true

D.

kubectl rollout status deployment/my-deployment

Question 65

Which of the following is a lightweight tool that manages traffic flows between services, enforces access policies, and aggregates telemetry data, all without requiring changes to application code?

Options:

A.

NetworkPolicy

B.

Linkerd

C.

kube-proxy

D.

Nginx

Question 66

What feature must a CNI support to control specific traffic flows for workloads running in Kubernetes?

Options:

A.

Border Gateway Protocol

B.

IP Address Management

C.

Pod Security Policy

D.

Network Policies

Question 67

The IPv4/IPv6 dual stack in Kubernetes:

Options:

A.

Translates an IPv4 request from a Service to an IPv6 Service.

B.

Allows you to access the IPv4 address by using the IPv6 address.

C.

Requires NetworkPolicies to prevent Services from mixing requests.

D.

Allows you to create IPv4 and IPv6 dual stack Services.

Question 68

What function does kube-proxy provide to a cluster?

Options:

A.

Implementing the Ingress resource type for application traffic.

B.

Forwarding data to the correct endpoints for Services.

C.

Managing data egress from the cluster nodes to the network.

D.

Managing access to the Kubernetes API.

Question 69

Which API object is the recommended way to run a scalable, stateless application on your cluster?

Options:

A.

ReplicaSet

B.

Deployment

C.

DaemonSet

D.

Pod

Question 70

What framework does Kubernetes use to authenticate users with JSON Web Tokens?

Options:

A.

OpenID Connect

B.

OpenID Container

C.

OpenID Cluster

D.

OpenID CNCF

Question 71

At which layer would distributed tracing be implemented in a cloud native deployment?

Options:

A.

Network

B.

Application

C.

Database

D.

Infrastructure

Page: 1 / 24
Total 239 questions