Section 7: Security (1-5)

Section 7: Security (1-5)

University

17 Qs

quiz-placeholder

Similar activities

Pre Test - SIK WKC

Pre Test - SIK WKC

University

15 Qs

(ACT 1A) Quiz # 4 - System Software

(ACT 1A) Quiz # 4 - System Software

University

15 Qs

KV5004 Week 3

KV5004 Week 3

University

20 Qs

DBMS Introduction Quiz 1

DBMS Introduction Quiz 1

University

20 Qs

Linux Essentials

Linux Essentials

University

15 Qs

operating systems

operating systems

University

15 Qs

Linux: Users and Groups

Linux: Users and Groups

9th Grade - University

14 Qs

PARC Linux Basic Part 2

PARC Linux Basic Part 2

University

20 Qs

Section 7: Security (1-5)

Section 7: Security (1-5)

Assessment

Quiz

Computers

University

Medium

Created by

Maiky Alfaro

Used 4+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What three requirements should be meet by a host in Kubernetes?

Password based authentication disabled

SSH Key based authentication

Secure the physical or virtual infrastructure that hosts Kubernetes.

Password based authentication enabled

User authentication via LDAP

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The first line of defense is controlling access to:

API Server

Kubernetes

Pods

ETCD Server

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What of the following are authorization mechanisms we can set to define what can a user do with the API Server?

RBAC

Webhook Mode

  • Node Authorization

ABAC

DAC

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All communications with the cluster between the various components such as the ETCD cluster, kube-controller-manager, scheduler, API Server, kubelet, kube-proxy, is secured using:

SSL

TLS

HTTPS

DTLS

PGP

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What of the following types of users are used to access a Kubernetes Cluster?

End users

Administrators

Developers

Bots

Standard users

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________________ that access the cluster to perform administrative tasks.

Fill the blank space with the type of user used to access a Kubernetes Cluster:

End users

Administrators

Developers

Bots

Standard users

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________________ that access the cluster to test or deploy applications.

Fill the blank space with the type of user used to access a Kubernetes Cluster:

End users

Administrators

Developers

Bots

Standard users

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?