Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What is the main reason an organization would use a Cloud Workload Protection Platform (CWPP) solution?

A.

To protect containerized workloads from known vulnerabilities and malware threats.

B.

To automate the deployment and management of containerized workloads.

C.

To manage networking between containerized workloads in the Kubernetes cluster.

D.

To optimize resource utilization and scalability of containerized workloads.

In order to reduce the attack surface of the Scheduler, which default parameter should be set to false?

A.

--scheduler-name

B.

--profiling

C.

--secure-kubeconfig

D.

--bind-address

What is Grafana?

A.

A cloud-native distributed tracing system for monitoring microservices architectures.

B.

A container orchestration platform for managing and scaling applications.

C.

A platform for monitoring and visualizing time-series data.

D.

A cloud-native security tool for scanning and detecting vulnerabilities in Kubernetes clusters.

What is the reasoning behind considering the Cloud as the trusted computing base of a Kubernetes cluster?

A.

The Cloud enforces security controls at the Kubernetes cluster level, so application developers can focus on applications only.

B.

A Kubernetes cluster can only be trusted if the underlying Cloud provider is certified against international standards.

C.

A vulnerability in the Cloud layer has a negligible impact on containers due to Linux isolation mechanisms.

D.

A Kubernetes cluster can only be as secure as the security posture of its Cloud hosting.

Which of the following statements is true concerning the use ofmicroVMsover user-space kernel implementations for advanced container sandboxing?

A.

MicroVMs allow for easier container management and orchestration than user-space kernel implementation.

B.

MicroVMs offer higher isolation than user-space kernel implementations at the cost of a higher per-instance memory footprint.

C.

MicroVMs provide reduced application compatibility and higher per-system call overhead than user-space kernel implementations.

D.

MicroVMs offer lower isolation and security compared to user-space kernel implementations.

You are responsible for securing thekubeletcomponent in a Kubernetes cluster.

Which of the following statements about kubelet security is correct?

A.

Kubelet runs as a privileged container by default.

B.

Kubelet does not have any built-in security features.

C.

Kubelet supports TLS authentication and encryption for secure communication with the API server.

D.

Kubelet requires root access to interact with the host system.

Which way of defining security policy brings consistency, minimizes toil, and reduces the probability of misconfiguration?

A.

Using a declarative approach to define security policies as code.

B.

Relying on manual audits and inspections for security policy enforcement.

C.

Manually configuring security controls for each individual resource, regularly.

D.

Implementing security policies through manual scripting on an ad-hoc basis.

An attacker has successfully overwhelmed the Kubernetes API server in a cluster with a single control plane node by flooding it with requests.

How would implementing a high-availability mode with multiple control plane nodes mitigate this attack?

A.

By implementing network segmentation to isolate the API server from the rest of the cluster, preventing the attack from spreading.

B.

By distributing the workload across multiple API servers, reducing the load on each server.

C.

By increasing the resources allocated to the API server, allowing it to handle a higher volume of requests.

D.

By implementing rate limiting and throttling mechanisms on the API server to restrict the number of requests allowed.