Q: 11
Which of the following statements best describe container image signing and verification in the cloud
environment?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
An attacker has access to the network segment that the cluster is on.
What happens when a compromised Pod attempts to connect to the API server?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
A container image is trojanised by an attacker by compromising the build server. Based on the STRIDE
threat modeling framework, which threat category best defines this threat?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
What does the 'cluster-admin' ClusterRole enable when used in a RoleBinding?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2