Which of the following statements best describes the role of the Scheduler in Kubernetes?
In a Kubernetes cluster, what are the security risks associated with using ConfigMaps for storing secrets?
A cluster administrator wants to enforce the use of a different container runtime depending on the application a workload belongs to.
An attacker has successfully overwhelmed the Kubernetes API server in a cluster with a single control plane node by flooding it with requests.
How would implementing a high-availability mode with multiple control plane nodes mitigate this attack?
Which other controllers are part of the kube-controller-manager inside the Kubernetes cluster?
Why does the defaultbase64 encodingthat Kubernetes applies to the contents of Secret resources provide inadequate protection?
Which technology can be used to apply security policy for internal cluster traffic at the application layer of the network?
Is it possible to restrict permissions so that a controller can only change the image of a deployment (without changing anything else about it, e.g., environment variables, commands, replicas, secrets)?
You want to minimize security issues in running Kubernetes Pods. Which of the following actions can help achieve this goal?
In the event that kube-proxy is in a CrashLoopBackOff state, what impact does it have on the Pods running on the same worker node?
A container running in a Kubernetes cluster has permission to modify host processes on the underlying node.
What combination of privileges and capabilities is most likely to have led to this privilege escalation?
When using a cloud provider's managed Kubernetes service, who is responsible for maintaining the etcd cluster?