Q: 5
a. Retrieve the content of the existing secret named default-token-xxxxx in the testing namespace. Store the value of the token in the token.txt b. Create a new secret named test-db-secret in the DB namespace with the following content: username: mysql password: password@123 Create the Pod name test-db-pod of image nginx in the namespace db that can access test-db-secret via a volume at path /etc/mysql-credentials
Your Answer
Discussion
Its D. The explicit path mount for the secret is what makes it correct here.
Yeah D here, since mounting the secret at /etc/mysql-credentials is exactly what's asked. Env vars alone won't satisfy that requirement.
Probably D. That's the mount-at-path way CKS expects for secrets with files.
Pretty sure it's D, matches what the exam guide and practice labs use for secret mount tasks.
Its D, mounting the secret as a volume matches the path requirement. Using env vars (trap) would miss that.
B. saw something like this in a practice set and picked B then too.
I don’t think B is right here, D fits because of the explicit volume mount path in the question.
B
D imo, saw a similar one on my exam and this matches the steps exactly.
Secret names can be tricky if they auto-generate, but D fits the needed steps.
Be respectful. No spam.