Which of the following statements regarding a container run with privileged: true is correct?
Which security knowledge-base focuses specifically onoffensive tools, techniques, and procedures?
What kind of organization would need to be compliant with PCI DSS?
What was the name of the precursor to Pod Security Standards?
Which of the following statements correctly describes a container breakout?
An attacker compromises a Pod and attempts to use its service account token to escalate privileges within the cluster. Which Kubernetes security feature is designed tolimit what this service account can do?
Which step would give an attacker a foothold in a cluster butno long-term persistence?
In a Kubernetes environment, what kind of Admission Controller can modify resource manifests when applied to the Kubernetes API to fix misconfigurations automatically?
In the event that kube-proxy is in a CrashLoopBackOff state, what impact does it have on the Pods running on the same worker node?
By default, in a Kubeadm cluster, which authentication methods are enabled?