Section 7: Security (1-5)

Section 7: Security (1-5)

University

17 Qs

quiz-placeholder

Similar activities

PICMAKER

PICMAKER

University

15 Qs

Vistacreate

Vistacreate

University

15 Qs

12AIT - All About W3C <3

12AIT - All About W3C <3

10th Grade - University

18 Qs

C++ Assesment 1

C++ Assesment 1

University

20 Qs

Text me!

Text me!

University

20 Qs

Control Structures  C#

Control Structures C#

University

20 Qs

Pengantar Teknologi Informasi 8

Pengantar Teknologi Informasi 8

University

17 Qs

DBMS - Fundamentals

DBMS - Fundamentals

University

19 Qs

Section 7: Security (1-5)

Section 7: Security (1-5)

Assessment

Quiz

Computers

University

Medium

Created by

Maiky Alfaro

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

17 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What three requirements should be meet by a host in Kubernetes?

Password based authentication disabled

SSH Key based authentication

Secure the physical or virtual infrastructure that hosts Kubernetes.

Password based authentication enabled

User authentication via LDAP

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The first line of defense is controlling access to:

API Server

Kubernetes

Pods

ETCD Server

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What of the following are authorization mechanisms we can set to define what can a user do with the API Server?

RBAC

Webhook Mode

  • Node Authorization

ABAC

DAC

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All communications with the cluster between the various components such as the ETCD cluster, kube-controller-manager, scheduler, API Server, kubelet, kube-proxy, is secured using:

SSL

TLS

HTTPS

DTLS

PGP

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What of the following types of users are used to access a Kubernetes Cluster?

End users

Administrators

Developers

Bots

Standard users

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________________ that access the cluster to perform administrative tasks.

Fill the blank space with the type of user used to access a Kubernetes Cluster:

End users

Administrators

Developers

Bots

Standard users

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________________ that access the cluster to test or deploy applications.

Fill the blank space with the type of user used to access a Kubernetes Cluster:

End users

Administrators

Developers

Bots

Standard users

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?