Section 7: Security (1-5)

Section 7: Security (1-5)

University

17 Qs

quiz-placeholder

Similar activities

Big Data & Hadoop

Big Data & Hadoop

University

20 Qs

Modul 7 - Komputer I

Modul 7 - Komputer I

University

20 Qs

Section 8: Storage (4-7)

Section 8: Storage (4-7)

University

18 Qs

GDSC Intro Quiz

GDSC Intro Quiz

University

15 Qs

Latihan 8 - Cloud Computing - 2TRKB

Latihan 8 - Cloud Computing - 2TRKB

University

18 Qs

Quiz on Access Control Models

Quiz on Access Control Models

University

20 Qs

CompTIA IT Fundamentals Practice

CompTIA IT Fundamentals Practice

9th Grade - University

20 Qs

Section 9: Networking (21-25)

Section 9: Networking (21-25)

University

19 Qs

Section 7: Security (1-5)

Section 7: Security (1-5)

Assessment

Quiz

Computers

University

Medium

Created by

Maiky Alfaro

Used 4+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What three requirements should be meet by a host in Kubernetes?

Password based authentication disabled

SSH Key based authentication

Secure the physical or virtual infrastructure that hosts Kubernetes.

Password based authentication enabled

User authentication via LDAP

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The first line of defense is controlling access to:

API Server

Kubernetes

Pods

ETCD Server

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What of the following are authorization mechanisms we can set to define what can a user do with the API Server?

RBAC

Webhook Mode

  • Node Authorization

ABAC

DAC

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All communications with the cluster between the various components such as the ETCD cluster, kube-controller-manager, scheduler, API Server, kubelet, kube-proxy, is secured using:

SSL

TLS

HTTPS

DTLS

PGP

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What of the following types of users are used to access a Kubernetes Cluster?

End users

Administrators

Developers

Bots

Standard users

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________________ that access the cluster to perform administrative tasks.

Fill the blank space with the type of user used to access a Kubernetes Cluster:

End users

Administrators

Developers

Bots

Standard users

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________________ that access the cluster to test or deploy applications.

Fill the blank space with the type of user used to access a Kubernetes Cluster:

End users

Administrators

Developers

Bots

Standard users

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?