View Mode
Q: 11
Which of the following statements best describe container image signing and verification in the cloud environment?
Options
Q: 12
An attacker has access to the network segment that the cluster is on. What happens when a compromised Pod attempts to connect to the API server?
Options
Q: 13
A container image is trojanised by an attacker by compromising the build server. Based on the STRIDE threat modeling framework, which threat category best defines this threat?
Options
Q: 14
What does the 'cluster-admin' ClusterRole enable when used in a RoleBinding?
Options
Q: 15
Which of the following statements on static Pods is true?
Options
Question 11 of 20 · Page 2 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE