Kubernetes and Cloud Native Security Associate (KCSA) Questions and Answers
What is the purpose of the Supplier Assessments and Reviews control in the NIST 800-53 Rev. 5 set of controls for Supply Chain Risk Management?
Which of the following statements best describe container image signing and verification in the cloud environment?
Why does the defaultbase64 encodingthat Kubernetes applies to the contents of Secret resources provide inadequate protection?
In a cluster that contains Nodes withmultiple container runtimesinstalled, how can a Pod be configured to be created on a specific runtime?
In order to reduce the attack surface of the Scheduler, which default parameter should be set to false?
In a Kubernetes cluster, what are the security risks associated with using ConfigMaps for storing secrets?
What is the reasoning behind considering the Cloud as the trusted computing base of a Kubernetes cluster?
On a client machine, what directory (by default) contains sensitive credential information?
Why mightNetworkPolicyresources have no effect in a Kubernetes cluster?
A Kubernetes cluster tenant can launch privileged Pods in contravention of therestricted Pod Security Standardmandated for cluster tenants and enforced by the built-inPodSecurity admission controller.
The tenant has full CRUD permissions on the namespace object and the namespaced resources. How did the tenant achieve this?
Which label should be added to the Namespace to block any privileged Pods from being created in that Namespace?
How do Kubernetes namespaces impact the application of policies when using Pod Security Admission?
What kind of organization would need to be compliant with PCI DSS?
Which of the following statements correctly describes a container breakout?
By default, in a Kubeadm cluster, which authentication methods are enabled?
In a Kubernetes environment, what kind of Admission Controller can modify resource manifests when applied to the Kubernetes API to fix misconfigurations automatically?
Which technology can be used to apply security policy for internal cluster traffic at the application layer of the network?
What does thecluster-adminClusterRole enable when used in a RoleBinding?