Q: 1
When should soft multitenancy be used over hard multitenancy?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
On a client machine, what directory (by default) contains sensitive credential information?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
What was the name of the precursor to Pod Security Standards?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
How can a user enforce the Pod Security Standard without third-party tools?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
Which of the following statements correctly describes a container breakout?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
Which way of defining security policy brings consistency, minimizes toil, and reduces the probability
of misconfiguration?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
Which security knowledge-base focuses specifically on offensive tools, techniques, and procedures?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
A cluster is failing to pull more recent versions of images from k8s.gcr.io. Why may this be?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
Which of the following snippets from a RoleBinding correctly associates user bob with Role pod-
reader ?


Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 10
You want to minimize security issues in running Kubernetes Pods. Which of the following actions can
help achieve this goal?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 10