Month End Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

KCSA Kubernetes and Cloud Native Security Associate (KCSA) Questions and Answers

Questions 4

Which of the following statements best describes the role of the Scheduler in Kubernetes?

Options:

A.

The Scheduler is responsible for monitoring and managing the health of the Kubernetes cluster.

B.

The Scheduler is responsible for ensuring the security of the Kubernetes cluster and its components.

C.

The Scheduler is responsible for managing the deployment and scaling of applications in the Kubernetes cluster.

D.

The Scheduler is responsible for assigning Pods to nodes based on resource availability and other constraints.

Buy Now
Questions 5

In a Kubernetes cluster, what are the security risks associated with using ConfigMaps for storing secrets?

Options:

A.

Storing secrets in ConfigMaps does not allow for fine-grained access control via RBAC.

B.

Storing secrets in ConfigMaps can expose sensitive information as they are stored in plaintext and can be accessed by unauthorized users.

C.

Using ConfigMaps for storing secrets might make applications incompatible with the Kubernetes cluster.

D.

ConfigMaps store sensitive information in etcd encoded in base64 format automatically, which does not ensure confidentiality of data.

Buy Now
Questions 6

A cluster administrator wants to enforce the use of a different container runtime depending on the application a workload belongs to.

Options:

A.

By manually modifying the container runtime for each workload after it has been created.

B.

By modifying the kube-apiserver configuration file to specify the desired container runtime for each application.

C.

By configuring avalidating admission controllerwebhook that verifies the container runtime based on the application label and rejects requests that do not comply.

D.

By configuring amutating admission controllerwebhook that intercepts new workload creation requests and modifies the container runtime based on the application label.

Buy Now
Questions 7

What is the difference between gVisor and Firecracker?

Options:

A.

gVisor is a user-space kernel that provides isolation and security for containers. At the same time, Firecracker is a lightweight virtualization technology for creating and managing secure, multi-tenant container and function-as-a-service (FaaS) workloads.

B.

gVisor is a lightweight virtualization technology for creating and managing secure, multi-tenant container and function-as-a-service (FaaS) workloads. At the same time, Firecracker is a user-space kernel that provides isolation and security for containers.

C.

gVisor and Firecracker are both container runtimes that can be used interchangeably.

D.

gVisor and Firecracker are two names for the same technology, which provides isolation and security for containers.

Buy Now
Questions 8

An attacker has successfully overwhelmed the Kubernetes API server in a cluster with a single control plane node by flooding it with requests.

How would implementing a high-availability mode with multiple control plane nodes mitigate this attack?

Options:

A.

By implementing network segmentation to isolate the API server from the rest of the cluster, preventing the attack from spreading.

B.

By distributing the workload across multiple API servers, reducing the load on each server.

C.

By increasing the resources allocated to the API server, allowing it to handle a higher volume of requests.

D.

By implementing rate limiting and throttling mechanisms on the API server to restrict the number of requests allowed.

Buy Now
Questions 9

Which other controllers are part of the kube-controller-manager inside the Kubernetes cluster?

Options:

A.

Job controller, CronJob controller, and DaemonSet controller

B.

Pod, Service, and Ingress controller

C.

Namespace controller, ConfigMap controller, and Secret controller

D.

Replication controller, Endpoints controller, Namespace controller, and ServiceAccounts controller

Buy Now
Questions 10

Why does the defaultbase64 encodingthat Kubernetes applies to the contents of Secret resources provide inadequate protection?

Options:

A.

Base64 encoding is vulnerable to brute-force attacks.

B.

Base64 encoding relies on a shared key which can be easily compromised.

C.

Base64 encoding does not encrypt the contents of the Secret, only obfuscates it.

D.

Base64 encoding is not supported by all Secret Stores.

Buy Now
Questions 11

Which technology can be used to apply security policy for internal cluster traffic at the application layer of the network?

Options:

A.

Network Policy

B.

Ingress Controller

C.

Container Runtime

D.

Service Mesh

Buy Now
Questions 12

Is it possible to restrict permissions so that a controller can only change the image of a deployment (without changing anything else about it, e.g., environment variables, commands, replicas, secrets)?

Options:

A.

Yes, by granting permission to the /image subresource.

B.

Not with RBAC, but it is possible with an admission webhook.

C.

No, because granting access to the spec.containers.image field always grants access to the rest of the spec object.

D.

Yes, with a 'managed fields' annotation.

Buy Now
Questions 13

Which of the following represents a baseline security measure for containers?

Options:

A.

Implementing access control to restrict container access.

B.

Configuring a static IP for each container.

C.

Configuring persistent storage for containers.

D.

Run containers as the root user.

Buy Now
Questions 14

You want to minimize security issues in running Kubernetes Pods. Which of the following actions can help achieve this goal?

Options:

A.

Sharing sensitive data among Pods in the same cluster to improve collaboration.

B.

Running Pods with elevated privileges to maximize their capabilities.

C.

Implement Pod Security standards in the Pod's YAML configuration.

D.

Deploying Pods with randomly generated names to obfuscate their identities.

Buy Now
Questions 15

In the event that kube-proxy is in a CrashLoopBackOff state, what impact does it have on the Pods running on the same worker node?

Options:

A.

The Pods cannot communicate with other Pods in the cluster.

B.

The Pod cannot mount persistent volumes through CSI drivers.

C.

The Pod's security context restrictions cannot be enforced.

D.

The Pod's resource utilization increases significantly.

Buy Now
Questions 16

A container running in a Kubernetes cluster has permission to modify host processes on the underlying node.

What combination of privileges and capabilities is most likely to have led to this privilege escalation?

Options:

A.

There is no combination of privileges and capabilities that permits this.

B.

hostPID and SYS_PTRACE

C.

hostPath and AUDIT_WRITE

D.

hostNetwork and NET_RAW

Buy Now
Questions 17

What was the name of the precursor to Pod Security Standards?

Options:

A.

Container Runtime Security

B.

Kubernetes Security Context

C.

Container Security Standards

D.

Pod Security Policy

Buy Now
Questions 18

When using a cloud provider's managed Kubernetes service, who is responsible for maintaining the etcd cluster?

Options:

A.

Kubernetes administrator

B.

Namespace administrator

C.

Cloud provider

D.

Application developer

Buy Now
Exam Code: KCSA
Exam Name: Kubernetes and Cloud Native Security Associate (KCSA)
Last Update: Aug 26, 2025
Questions: 60

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now KCSA testing engine

PDF (Q&A)

$43.57  $124.49
buy now KCSA pdf