Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

KCNA Sample Questions Answers

Questions 4

Why do administrators need a container orchestration tool?

Options:

A.

To manage the lifecycle of an elevated number of containers.

B.

To assess the security risks of the container images used in production.

C.

To learn how to transform monolithic applications into microservices.

D.

Container orchestration tools such as Kubernetes are the future.

Buy Now
Questions 5

Which of the following options includes valid API versions?

Options:

A.

alpha1v1, beta3v3, v2

B.

alpha1, beta3, v2

C.

v1alpha1, v2beta3, v2

D.

v1alpha1, v2beta3, 2.0

Buy Now
Questions 6

What is a sidecar container?

Options:

A.

A Pod that runs next to another container within the same Pod.

B.

A container that runs next to another Pod within the same namespace.

C.

A container that runs next to another container within the same Pod.

D.

A Pod that runs next to another Pod within the same namespace.

Buy Now
Questions 7

What is the default value for authorization-mode in Kubernetes API server?

Options:

A.

--authorization-mode=RBAC

B.

--authorization-mode=AlwaysAllow

C.

--authorization-mode=AlwaysDeny

D.

--authorization-mode=ABAC

Buy Now
Questions 8

Which group of container runtimes provides additional sandboxed isolation and elevated security?

Options:

A.

rune, cgroups

B.

docker, containerd

C.

runsc, kata

D.

crun, cri-o

Buy Now
Questions 9

What helps an organization to deliver software more securely at a higher velocity?

Options:

A.

Kubernetes

B.

apt-get

C.

Docker Images

D.

CI/CD Pipeline

Buy Now
Questions 10

What edge and service proxy tool is designed to be integrated with cloud native applications?

Options:

A.

CoreDNS

B.

CNI

C.

gRPC

D.

Envoy

Buy Now
Questions 11

Which of the following is a valid PromQL query?

Options:

A.

SELECT * from http_requests_total WHERE job=apiserver

B.

http_requests_total WHERE (job="apiserver")

C.

SELECT * from http_requests_total

D.

http_requests_total(job="apiserver")

Buy Now
Questions 12

How can you monitor the progress for an updated Deployment/DaemonSets/StatefulSets?

Options:

A.

kubectl rollout watch

B.

kubectl rollout progress

C.

kubectl rollout state

D.

kubectl rollout status

Buy Now
Questions 13

Which of the following is a recommended security habit in Kubernetes?

Options:

A.

Run the containers as the user with group ID 0 (root) and any user ID.

B.

Disallow privilege escalation from within a container as the default option.

C.

Run the containers as the user with user ID 0 (root) and any group ID.

D.

Allow privilege escalation from within a container as the default option.

Buy Now
Questions 14

Which of the following options include resources cleaned by the Kubernetes garbage collection mechanism?

Options:

A.

Stale or expired CertificateSigningRequests (CSRs) and old deployments.

B.

Nodes deleted by a cloud controller manager and obsolete logs from the kubelet.

C.

Unused container and container images, and obsolete logs from the kubelet.

D.

Terminated pods, completed jobs, and objects without owner references.

Buy Now
Questions 15

In a cloud native environment, who is usually responsible for maintaining the workloads running across the different platforms?

Options:

A.

The cloud provider.

B.

The Site Reliability Engineering (SRE) team.

C.

The team of developers.

D.

The Support Engineering team (SE).

Buy Now
Questions 16

Which control plane component is responsible for updating the node Ready condition if a node becomes unreachable?

Options:

A.

The kube-proxy

B.

The node controller

C.

The kubectl

D.

The kube-apiserver

Buy Now
Questions 17

Which of the following is a good habit for cloud native cost efficiency?

Options:

A.

Follow an automated approach to cost optimization, including visibility and forecasting.

B.

Follow manual processes for cost analysis, including visibility and forecasting.

C.

Use only one cloud provider to simplify the cost analysis.

D.

Keep your legacy workloads unchanged, to avoid cloud costs.

Buy Now
Questions 18

How does dynamic storage provisioning work?

Options:

A.

A user requests dynamically provisioned storage by including an existing StorageClass in their PersistentVolumeClaim.

B.

An administrator creates a StorageClass and includes it in their Pod YAML definition file without creating a PersistentVolumeClaim.

C.

A Pod requests dynamically provisioned storage by including a StorageClass and the Pod name in their PersistentVolumeClaim.

D.

An administrator creates a PersistentVolume and includes the name of the PersistentVolume in their Pod YAML definition file.

Buy Now
Questions 19

What native runtime is Open Container Initiative (OCI) compliant?

Options:

A.

runC

B.

runV

C.

kata-containers

D.

gvisor

Buy Now
Questions 20

Which of the following is a correct definition of a Helm chart?

Options:

A.

A Helm chart is a collection of YAML files bundled in a tar.gz file and can be applied without decompressing it.

B.

A Helm chart is a collection of JSON files and contains all the resource definitions to run an application on Kubernetes.

C.

A Helm chart is a collection of YAML files that can be applied on Kubernetes by using the kubectl tool.

D.

A Helm chart is similar to a package and contains all the resource definitions to run an application on Kubernetes.

Buy Now
Questions 21

Which component of the node is responsible to run workloads?

Options:

A.

The kubelet.

B.

The kube-proxy.

C.

The kube-apiserver.

D.

The container runtime.

Buy Now
Questions 22

What component enables end users, different parts of the Kubernetes cluster, and external components to communicate with one another?

Options:

A.

kubectl

B.

AWS Management Console

C.

Kubernetes API

D.

Google Cloud SDK

Buy Now
Questions 23

What framework does Kubernetes use to authenticate users with JSON Web Tokens?

Options:

A.

OpenID Connect

B.

OpenID Container

C.

OpenID Cluster

D.

OpenID CNCF

Buy Now
Questions 24

What are the 3 pillars of Observability?

Options:

A.

Metrics, Logs, and Traces

B.

Metrics, Logs, and Spans

C.

Metrics, Data, and Traces

D.

Resources, Logs, and Tracing

Buy Now
Questions 25

A Kubernetes _____ is an abstraction that defines a logical set of Pods and a policy by which to access them.

Options:

A.

Selector

B.

Controller

C.

Service

D.

Job

Buy Now
Questions 26

Which item is a Kubernetes node component?

Options:

A.

kube-scheduler

B.

kubectl

C.

kube-proxy

D.

etcd

Buy Now
Questions 27

What sentence is true about CronJobs in Kubernetes?

Options:

A.

A CronJob creates one or multiple Jobs on a repeating schedule.

B.

A CronJob creates one container on a repeating schedule.

C.

CronJobs are useful on Linux but are obsolete in Kubernetes.

D.

The CronJob schedule format is different in Kubernetes and Linux.

Buy Now
Questions 28

What is CloudEvents?

Options:

A.

It is a specification for describing event data in common formats for Kubernetes network traffic management and cloud providers.

B.

It is a specification for describing event data in common formats in all cloud providers including major cloud providers.

C.

It is a specification for describing event data in common formats to provide interoperability across services, platforms and systems.

D.

It is a Kubernetes specification for describing events data in common formats for iCloud services, iOS platforms and iMac.

Buy Now
Questions 29

Which type of Service requires manual creation of Endpoints?

Options:

A.

LoadBalancer

B.

Services without selectors

C.

NodePort

D.

ClusterIP with selectors

Buy Now
Questions 30

The Kubernetes project work is carried primarily by SIGs. What does SIG stand for?

Options:

A.

Special Interest Group

B.

Software Installation Guide

C.

Support and Information Group

D.

Strategy Implementation Group

Buy Now
Questions 31

What is the resource type used to package sets of containers for scheduling in a cluster?

Options:

A.

Pod

B.

ContainerSet

C.

ReplicaSet

D.

Deployment

Buy Now
Questions 32

What Kubernetes control plane component exposes the programmatic interface used to create, manage and interact with the Kubernetes objects?

Options:

A.

kube-controller-manager

B.

kube-proxy

C.

kube-apiserver

D.

etcd

Buy Now
Questions 33

How long should a stable API element in Kubernetes be supported (at minimum) after deprecation?

Options:

A.

9 months

B.

24 months

C.

12 months

D.

6 months

Buy Now
Questions 34

What is a Kubernetes service with no cluster IP address called?

Options:

A.

Headless Service

B.

Nodeless Service

C.

IPLess Service

D.

Specless Service

Buy Now
Questions 35

Which of the following is the name of a container orchestration software?

Options:

A.

OpenStack

B.

Docker

C.

Apache Mesos

D.

CRI-O

Buy Now
Questions 36

What methods can you use to scale a Deployment?

Options:

A.

With kubectl edit deployment exclusively.

B.

With kubectl scale-up deployment exclusively.

C.

With kubectl scale deployment and kubectl edit deployment.

D.

With kubectl scale deployment exclusively.

Buy Now
Questions 37

In a serverless computing architecture:

Options:

A.

Users of the cloud provider are charged based on the number of requests to a function.

B.

Serverless functions are incompatible with containerized functions.

C.

Users should make a reservation to the cloud provider based on an estimation of usage.

D.

Containers serving requests are running in the background in idle status.

Buy Now
Questions 38

Which of the following would fall under the responsibilities of an SRE?

Options:

A.

Developing a new application feature.

B.

Creating a monitoring baseline for an application.

C.

Submitting a budget for running an application in a cloud.

D.

Writing policy on how to submit a code change.

Buy Now
Questions 39

What does vertical scaling an application deployment describe best?

Options:

A.

Adding/removing applications to meet demand.

B.

Adding/removing node instances to the cluster to meet demand.

C.

Adding/removing resources to applications to meet demand.

D.

Adding/removing application instances of the same application to meet demand.

Buy Now
Questions 40

What happens with a regular Pod running in Kubernetes when a node fails?

Options:

A.

A new Pod with the same UID is scheduled to another node after a while.

B.

A new, near-identical Pod but with different UID is scheduled to another node.

C.

By default, a Pod can only be scheduled to the same node when the node fails.

D.

A new Pod is scheduled on a different node only if it is configured explicitly.

Buy Now
Questions 41

Which key-value store is used to persist Kubernetes cluster data?

Options:

A.

etcd

B.

ZooKeeper

C.

ControlPlaneStore

D.

Redis

Buy Now
Questions 42

What is the main purpose of the Open Container Initiative (OCI)?

Options:

A.

Accelerating the adoption of containers and Kubernetes in the industry.

B.

Creating open industry standards around container formats and runtimes.

C.

Creating industry standards around container formats and runtimes for private purposes.

D.

Improving the security of standards around container formats and runtimes.

Buy Now
Questions 43

CI/CD stands for:

Options:

A.

Continuous Information / Continuous Development

B.

Continuous Integration / Continuous Development

C.

Cloud Integration / Cloud Development

D.

Continuous Integration / Continuous Deployment

Buy Now
Questions 44

What is the Kubernetes object used for running a recurring workload?

Options:

A.

Job

B.

Batch

C.

DaemonSet

D.

CronJob

Buy Now
Questions 45

What is the name of the lightweight Kubernetes distribution built for IoT and edge computing?

Options:

A.

OpenShift

B.

k3s

C.

RKE

D.

k1s

Buy Now
Questions 46

Which are the core features provided by a service mesh?

Options:

A.

Authentication and authorization

B.

Distributing and replicating data

C.

Security vulnerability scanning

D.

Configuration management

Buy Now
Questions 47

What default level of protection is applied to the data in Secrets in the Kubernetes API?

Options:

A.

The values use AES symmetric encryption

B.

The values are stored in plain text

C.

The values are encoded with SHA256 hashes

D.

The values are base64 encoded

Buy Now
Questions 48

What is the purpose of the kube-proxy?

Options:

A.

The kube-proxy balances network requests to Pods.

B.

The kube-proxy maintains network rules on nodes.

C.

The kube-proxy ensures the cluster connectivity with the internet.

D.

The kube-proxy maintains the DNS rules of the cluster.

Buy Now
Questions 49

Which component in Kubernetes is responsible to watch newly created Pods with no assigned node, and selects a node for them to run on?

Options:

A.

etcd

B.

kube-controller-manager

C.

kube-proxy

D.

kube-scheduler

Buy Now
Questions 50

In which framework do the developers no longer have to deal with capacity, deployments, scaling and fault tolerance, and OS?

Options:

A.

DockerSwarm

B.

Kubernetes

C.

Mesos

D.

Serverless

Buy Now
Questions 51

Which Kubernetes resource uses immutable: true boolean field?

Options:

A.

Deployment

B.

Pod

C.

ConfigMap

D.

ReplicaSet

Buy Now
Questions 52

Imagine there is a requirement to run a database backup every day. Which Kubernetes resource could be used to achieve that?

Options:

A.

kube-scheduler

B.

CronJob

C.

Task

D.

Job

Buy Now
Questions 53

Kubernetes ___ protect you against voluntary interruptions (such as deleting Pods, draining nodes) to run applications in a highly available manner.

Options:

A.

Pod Topology Spread Constraints

B.

Pod Disruption Budgets

C.

Taints and Tolerations

D.

Resource Limits and Requests

Buy Now
Questions 54

Which of these components is part of the Kubernetes Control Plane?

Options:

A.

CoreDNS

B.

cloud-controller-manager

C.

kube-proxy

D.

kubelet

Buy Now
Questions 55

Which of the following best describes horizontally scaling an application deployment?

Options:

A.

The act of adding/removing node instances to the cluster to meet demand.

B.

The act of adding/removing applications to meet demand.

C.

The act of adding/removing application instances of the same application to meet demand.

D.

The act of adding/removing resources to application instances to meet demand.

Buy Now
Questions 56

Which one of the following is an open source runtime security tool?

Options:

A.

lxd

B.

containerd

C.

falco

D.

gVisor

Buy Now
Questions 57

Which of the following options include only mandatory fields to create a Kubernetes object using a YAML file?

Options:

A.

apiVersion, template, kind, status

B.

apiVersion, metadata, status, spec

C.

apiVersion, template, kind, spec

D.

apiVersion, metadata, kind, spec

Buy Now
Questions 58

Which Kubernetes-native deployment strategy supports zero-downtime updates of a workload?

Options:

A.

Canary

B.

Recreate

C.

BlueGreen

D.

RollingUpdate

Buy Now
Questions 59

In CNCF, who develops specifications for industry standards around container formats and runtimes?

Options:

A.

Open Container Initiative (OCI)

B.

Linux Foundation Certification Group (LFCG)

C.

Container Network Interface (CNI)

D.

Container Runtime Interface (CRI)

Buy Now
Exam Code: KCNA
Exam Name: Kubernetes and Cloud Native Associate
Last Update: Jan 22, 2026
Questions: 199
$66  $164.99
$50  $124.99
$42  $104.99
buy now KCNA