Section 7: Security (1-5)

Section 7: Security (1-5)

University

17 Qs

quiz-placeholder

Similar activities

AACS3013 Quick Revision C1-C3

AACS3013 Quick Revision C1-C3

University

20 Qs

GCloud Quiz : The Finale

GCloud Quiz : The Finale

University

20 Qs

CSE 102 Exam 3 Practice

CSE 102 Exam 3 Practice

University

18 Qs

Final Komputasi Awan

Final Komputasi Awan

University

20 Qs

Computer Knowledge

Computer Knowledge

12th Grade - University

20 Qs

Docker & Kubernates

Docker & Kubernates

University

20 Qs

Section 7: Security (6-8)

Section 7: Security (6-8)

University

22 Qs

Operating System Quiz

Operating System Quiz

University

20 Qs

Section 7: Security (1-5)

Section 7: Security (1-5)

Assessment

Quiz

Computers

University

Medium

Created by

Maiky Alfaro

Used 4+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What three requirements should be meet by a host in Kubernetes?

Password based authentication disabled

SSH Key based authentication

Secure the physical or virtual infrastructure that hosts Kubernetes.

Password based authentication enabled

User authentication via LDAP

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The first line of defense is controlling access to:

API Server

Kubernetes

Pods

ETCD Server

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What of the following are authorization mechanisms we can set to define what can a user do with the API Server?

RBAC

Webhook Mode

  • Node Authorization

ABAC

DAC

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All communications with the cluster between the various components such as the ETCD cluster, kube-controller-manager, scheduler, API Server, kubelet, kube-proxy, is secured using:

SSL

TLS

HTTPS

DTLS

PGP

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What of the following types of users are used to access a Kubernetes Cluster?

End users

Administrators

Developers

Bots

Standard users

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________________ that access the cluster to perform administrative tasks.

Fill the blank space with the type of user used to access a Kubernetes Cluster:

End users

Administrators

Developers

Bots

Standard users

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________________ that access the cluster to test or deploy applications.

Fill the blank space with the type of user used to access a Kubernetes Cluster:

End users

Administrators

Developers

Bots

Standard users

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?