Section 7: Security (1-5)

Section 7: Security (1-5)

University

17 Qs

quiz-placeholder

Similar activities

CQB NTRMS 24

CQB NTRMS 24

University

15 Qs

Section 8: Storage (4-7)

Section 8: Storage (4-7)

University

18 Qs

Linux Directory Structures

Linux Directory Structures

10th Grade - University

20 Qs

Linux: Users and Groups

Linux: Users and Groups

9th Grade - University

14 Qs

Section 9: Networking (21-25)

Section 9: Networking (21-25)

University

19 Qs

Technology Applications

Technology Applications

9th Grade - University

13 Qs

Security+

Security+

University

15 Qs

F2 User Access and Permissions Quiz

F2 User Access and Permissions Quiz

12th Grade - University

15 Qs

Section 7: Security (1-5)

Section 7: Security (1-5)

Assessment

Quiz

Computers

University

Medium

Created by

Maiky Alfaro

Used 4+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What three requirements should be meet by a host in Kubernetes?

Password based authentication disabled

SSH Key based authentication

Secure the physical or virtual infrastructure that hosts Kubernetes.

Password based authentication enabled

User authentication via LDAP

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The first line of defense is controlling access to:

API Server

Kubernetes

Pods

ETCD Server

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What of the following are authorization mechanisms we can set to define what can a user do with the API Server?

RBAC

Webhook Mode

  • Node Authorization

ABAC

DAC

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All communications with the cluster between the various components such as the ETCD cluster, kube-controller-manager, scheduler, API Server, kubelet, kube-proxy, is secured using:

SSL

TLS

HTTPS

DTLS

PGP

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What of the following types of users are used to access a Kubernetes Cluster?

End users

Administrators

Developers

Bots

Standard users

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________________ that access the cluster to perform administrative tasks.

Fill the blank space with the type of user used to access a Kubernetes Cluster:

End users

Administrators

Developers

Bots

Standard users

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________________ that access the cluster to test or deploy applications.

Fill the blank space with the type of user used to access a Kubernetes Cluster:

End users

Administrators

Developers

Bots

Standard users

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?