Month End Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Linux Foundation KCSA Dumps

Page: 1 / 6
Total 60 questions

Kubernetes and Cloud Native Security Associate (KCSA) Questions and Answers

Question 1

What is the purpose of the Supplier Assessments and Reviews control in the NIST 800-53 Rev. 5 set of controls for Supply Chain Risk Management?

Options:

A.

To evaluate and monitor existing suppliers for adherence to security requirements.

B.

To conduct regular audits of suppliers' financial performance.

C.

To establish contractual agreements with suppliers.

D.

To identify potential suppliers for the organization.

Question 2

Which of the following statements best describe container image signing and verification in the cloud environment?

Options:

A.

Container image signatures and their verification ensure their authenticity and integrity against tampering.

B.

Container image signatures are concerned with defining developer ownership of applications within multi-tenant environments.

C.

Container image signatures are mandatory in cloud environments, as cloud providers would deny the execution of unsigned container images.

D.

Container image signatures affect the performance of containerized applications, as they increase the size of images with additional metadata.

Question 3

Why does the defaultbase64 encodingthat Kubernetes applies to the contents of Secret resources provide inadequate protection?

Options:

A.

Base64 encoding is vulnerable to brute-force attacks.

B.

Base64 encoding relies on a shared key which can be easily compromised.

C.

Base64 encoding does not encrypt the contents of the Secret, only obfuscates it.

D.

Base64 encoding is not supported by all Secret Stores.

Question 4

In a cluster that contains Nodes withmultiple container runtimesinstalled, how can a Pod be configured to be created on a specific runtime?

Options:

A.

By using a command-line flag when creating the Pod.

B.

By modifying the Docker daemon configuration.

C.

By setting the container runtime as an environment variable in the Pod.

D.

By specifying the container runtime in the Pod's YAML file.

Question 5

In order to reduce the attack surface of the Scheduler, which default parameter should be set to false?

Options:

A.

--scheduler-name

B.

--profiling

C.

--secure-kubeconfig

D.

--bind-address

Question 6

In a Kubernetes cluster, what are the security risks associated with using ConfigMaps for storing secrets?

Options:

A.

Storing secrets in ConfigMaps does not allow for fine-grained access control via RBAC.

B.

Storing secrets in ConfigMaps can expose sensitive information as they are stored in plaintext and can be accessed by unauthorized users.

C.

Using ConfigMaps for storing secrets might make applications incompatible with the Kubernetes cluster.

D.

ConfigMaps store sensitive information in etcd encoded in base64 format automatically, which does not ensure confidentiality of data.

Question 7

What is the reasoning behind considering the Cloud as the trusted computing base of a Kubernetes cluster?

Options:

A.

The Cloud enforces security controls at the Kubernetes cluster level, so application developers can focus on applications only.

B.

A Kubernetes cluster can only be trusted if the underlying Cloud provider is certified against international standards.

C.

A vulnerability in the Cloud layer has a negligible impact on containers due to Linux isolation mechanisms.

D.

A Kubernetes cluster can only be as secure as the security posture of its Cloud hosting.

Question 8

On a client machine, what directory (by default) contains sensitive credential information?

Options:

A.

/etc/kubernetes/

B.

$HOME/.kube

C.

/opt/kubernetes/secrets/

D.

$HOME/.config/kubernetes/

Question 9

Why mightNetworkPolicyresources have no effect in a Kubernetes cluster?

Options:

A.

NetworkPolicy resources are only enforced if the Kubernetes scheduler supports them.

B.

NetworkPolicy resources are only enforced if the networking plugin supports them.

C.

NetworkPolicy resources are only enforced for unprivileged Pods.

D.

NetworkPolicy resources are only enforced if the user has the right RBAC permissions.

Question 10

A Kubernetes cluster tenant can launch privileged Pods in contravention of therestricted Pod Security Standardmandated for cluster tenants and enforced by the built-inPodSecurity admission controller.

The tenant has full CRUD permissions on the namespace object and the namespaced resources. How did the tenant achieve this?

Options:

A.

The scope of the tenant role means privilege escalation is impossible.

B.

By tampering with the namespace labels.

C.

By deleting the PodSecurity admission controller deployment running in their namespace.

D.

By using higher-level access credentials obtained reading secrets from another namespace.

Question 11

Which label should be added to the Namespace to block any privileged Pods from being created in that Namespace?

Options:

A.

privileged: false

B.

privileged: true

C.

pod-security.kubernetes.io/enforce: baseline

D.

pod.security.kubernetes.io/privileged: false

Question 12

How do Kubernetes namespaces impact the application of policies when using Pod Security Admission?

Options:

A.

Namespaces are ignored; Pod Security Admission policies apply cluster-wide only.

B.

Different policies can be applied to specific namespaces.

C.

Each namespace can have only one active policy.

D.

The default namespace enforces the strictest security policies by default.

Question 13

What kind of organization would need to be compliant with PCI DSS?

Options:

A.

Retail stores that only accept cash payments.

B.

Government agencies that collect personally identifiable information.

C.

Non-profit organizations that handle sensitive customer data.

D.

Merchants that process credit card payments.

Question 14

Which of the following statements correctly describes a container breakout?

Options:

A.

A container breakout is the process of escaping the container and gaining access to the Pod's network traffic.

B.

A container breakout is the process of escaping a container when it reaches its resource limits.

C.

A container breakout is the process of escaping the container and gaining access to the cloud provider's infrastructure.

D.

A container breakout is the process of escaping the container and gaining access to the host operating system.

Question 15

By default, in a Kubeadm cluster, which authentication methods are enabled?

Options:

A.

OIDC, Bootstrap tokens, and Service Account Tokens

B.

X509 Client Certs, OIDC, and Service Account Tokens

C.

X509 Client Certs, Bootstrap Tokens, and Service Account Tokens

D.

X509 Client Certs, Webhook Authentication, and Service Account Tokens

Question 16

In a Kubernetes environment, what kind of Admission Controller can modify resource manifests when applied to the Kubernetes API to fix misconfigurations automatically?

Options:

A.

ValidatingAdmissionController

B.

PodSecurityPolicy

C.

MutatingAdmissionController

D.

ResourceQuota

Question 17

Which technology can be used to apply security policy for internal cluster traffic at the application layer of the network?

Options:

A.

Network Policy

B.

Ingress Controller

C.

Container Runtime

D.

Service Mesh

Question 18

What does thecluster-adminClusterRole enable when used in a RoleBinding?

Options:

A.

It gives full control over every resource in the role binding's namespace, not including the namespace object for isolation purposes.

B.

It gives full control over every resource in the cluster and in all namespaces.

C.

It gives full control over every resource in the role binding's namespace, including the namespace itself.

D.

It allows read/write access to most resources in the role binding's namespace. This role does not allow write access to resource quota, to the namespace itself, and to EndpointSlices (or Endpoints).

Page: 1 / 6
Total 60 questions