What are valid authorization mechanisms in a Kubernetes cluster?
Section 7: Security (20-23)

Quiz
•
Computers
•
University
•
Easy
Maiky Alfaro
Used 6+ times
FREE Resource
31 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Webhook
Node authorizer
ABAC
RBAC
Tokens
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It authorizes any request coming from a user with the name "system:node" and part of the "system:node" group. Then is granted with the privileges.
What type of authorization mechanism is described above?
Webhook
Node authorizer
ABAC
RBAC
Tokens
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When kubelet server access the Kube API to read information about services, nodes, pods, etc...
What type of authorization mechanism is described above?
Webhook
Node authorizer
ABAC
RBAC
Tokens
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It's used when we associate a user or a group of users to a set of permissions. For example, allow a user to view PODs, create PODs or delete PODs.
What type of authorization mechanism is described above?
Webhook
Node authorizer
ABAC
RBAC
Tokens
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
We create a policy file in JSON format with a set of policies and pass it to the Kube API configuration.
What type of authorization mechanism is described above?
Webhook
Node authorizer
ABAC
RBAC
Tokens
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Instead of associating a user or group of users to a set of permissions, we define a role. The permissions are associated to a role. This role is then applied to users or group of users.
What type of authorization mechanism is described above?
Webhook
Node authorizer
ABAC
RBAC
Tokens
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It's externally managed authorization mechanism.
What type of authorization mechanism is described above?
Webhook
Node authorizer
ABAC
RBAC
Tokens
Create a free account and access millions of resources
Similar Resources on Quizizz
29 questions
cybersecurity worksheet

Quiz
•
9th Grade - University
29 questions
COMPTIA ITF

Quiz
•
1st Grade - Professio...
35 questions
Chapter 9. Physical Security and Authentication Models

Quiz
•
University
32 questions
Section 7: Security (24-27)

Quiz
•
University
32 questions
Section 9: Networking (14-20)

Quiz
•
University
33 questions
Section 2: Core concepts (8-12)

Quiz
•
University
32 questions
1. Section 6: Cluster Maintenance (1-10)

Quiz
•
University
30 questions
Google Prof Cloud Archi - pt 3

Quiz
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade