Linux Foundation KCSA
Q: 1
When should soft multitenancy be used over hard multitenancy?
Options
Q: 2
On a client machine, what directory (by default) contains sensitive credential information?
Options
Q: 3
What was the name of the precursor to Pod Security Standards?
Options
Q: 4
How can a user enforce the Pod Security Standard without third-party tools?
Options
Q: 5
Which of the following statements correctly describes a container breakout?
Options
Q: 6
Which way of defining security policy brings consistency, minimizes toil, and reduces the probability
of misconfiguration?
Options
Q: 7
Which security knowledge-base focuses specifically on offensive tools, techniques, and procedures?
Options
Q: 8
A cluster is failing to pull more recent versions of images from k8s.gcr.io. Why may this be?
Options
Q: 9
Which of the following snippets from a RoleBinding correctly associates user bob with Role pod-
reader ?


Options
Q: 10
You want to minimize security issues in running Kubernetes Pods. Which of the following actions can
help achieve this goal?
Options
Question 1 of 10