1. Kubernetes Documentation
"Using RBAC Authorization": Under the section "Default Roles and Role Bindings
" the cluster-admin role is described: "When used in a RoleBinding
it gives full control over every resource in the RoleBinding's namespace
including the namespace itself." This directly validates answer C. The same section describes the admin role
confirming the description in option D belongs to a different role.
2. Kubernetes Documentation
"Using RBAC Authorization": The distinction between a RoleBinding and ClusterRoleBinding is fundamental. The documentation states
"A RoleBinding grants permissions within a specific namespace whereas a ClusterRoleBinding grants them cluster-wide." This confirms that a RoleBinding cannot provide the cluster-wide access described in option B.