An attacker has successfully overwhelmed the Kubernetes API server in a cluster with a single control plane node by flooding it with requests.
How would implementing a high-availability mode with multiple control plane nodes mitigate this attack?
A cluster administrator wants to enforce the use of a different container runtime depending on the application a workload belongs to.
Which of the following is a valid security risk caused by having no egress controls in a Kubernetes cluster?
Which of the following statements is true concerning the use ofmicroVMsover user-space kernel implementations for advanced container sandboxing?
Which of the following statements regarding a container run with privileged: true is correct?
To restrict the kubelet's rights to the Kubernetes API, whatauthorization modeshould be set on the Kubernetes API server?
You are responsible for securing thekubeletcomponent in a Kubernetes cluster.
Which of the following statements about kubelet security is correct?
Which security knowledge-base focuses specifically onoffensive tools, techniques, and procedures?
Which standard approach to security is augmented by the 4C’s of Cloud Native security?
Which of the following snippets from a RoleBinding correctly associates user bob with Role pod-reader ?
Which way of defining security policy brings consistency, minimizes toil, and reduces the probability of misconfiguration?
How do Kubernetes namespaces impact the application of policies when using Pod Security Admission?
Which other controllers are part of the kube-controller-manager inside the Kubernetes cluster?