Month End Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

KCSA Sample Questions Answers

Questions 4

An attacker has successfully overwhelmed the Kubernetes API server in a cluster with a single control plane node by flooding it with requests.

How would implementing a high-availability mode with multiple control plane nodes mitigate this attack?

Options:

A.

By implementing network segmentation to isolate the API server from the rest of the cluster, preventing the attack from spreading.

B.

By distributing the workload across multiple API servers, reducing the load on each server.

C.

By increasing the resources allocated to the API server, allowing it to handle a higher volume of requests.

D.

By implementing rate limiting and throttling mechanisms on the API server to restrict the number of requests allowed.

Buy Now
Questions 5

A cluster administrator wants to enforce the use of a different container runtime depending on the application a workload belongs to.

Options:

A.

By manually modifying the container runtime for each workload after it has been created.

B.

By modifying the kube-apiserver configuration file to specify the desired container runtime for each application.

C.

By configuring avalidating admission controllerwebhook that verifies the container runtime based on the application label and rejects requests that do not comply.

D.

By configuring amutating admission controllerwebhook that intercepts new workload creation requests and modifies the container runtime based on the application label.

Buy Now
Questions 6

Which of the following is a valid security risk caused by having no egress controls in a Kubernetes cluster?

Options:

A.

Denial of Service

B.

Data exfiltration

C.

Increased attack surface

D.

Unauthorized access to external resources

Buy Now
Questions 7

What is the purpose of an egress NetworkPolicy?

Options:

A.

To control the incoming network traffic to a Kubernetes cluster.

B.

To control the outbound network traffic from a Kubernetes cluster.

C.

To secure the Kubernetes cluster against unauthorized access.

D.

To control the outgoing network traffic from one or more Kubernetes Pods.

Buy Now
Questions 8

Which of the following statements is true concerning the use ofmicroVMsover user-space kernel implementations for advanced container sandboxing?

Options:

A.

MicroVMs allow for easier container management and orchestration than user-space kernel implementation.

B.

MicroVMs offer higher isolation than user-space kernel implementations at the cost of a higher per-instance memory footprint.

C.

MicroVMs provide reduced application compatibility and higher per-system call overhead than user-space kernel implementations.

D.

MicroVMs offer lower isolation and security compared to user-space kernel implementations.

Buy Now
Questions 9

Which of the following statements regarding a container run with privileged: true is correct?

Options:

A.

A container run with privileged: true within a cluster can access all Secrets used within that cluster.

B.

A container run with privileged: true within a Namespace can access all Secrets used within that Namespace.

C.

A container run with privileged: true on a node can access all Secrets used on that node.

D.

A container run with privileged: true has no additional access to Secrets than if it were run with privileged: false.

Buy Now
Questions 10

To restrict the kubelet's rights to the Kubernetes API, whatauthorization modeshould be set on the Kubernetes API server?

Options:

A.

Node

B.

AlwaysAllow

C.

kubelet

D.

Webhook

Buy Now
Questions 11

You are responsible for securing thekubeletcomponent in a Kubernetes cluster.

Which of the following statements about kubelet security is correct?

Options:

A.

Kubelet runs as a privileged container by default.

B.

Kubelet does not have any built-in security features.

C.

Kubelet supports TLS authentication and encryption for secure communication with the API server.

D.

Kubelet requires root access to interact with the host system.

Buy Now
Questions 12

Which security knowledge-base focuses specifically onoffensive tools, techniques, and procedures?

Options:

A.

MITRE ATT&CK

B.

OWASP Top 10

C.

CIS Controls

D.

NIST Cybersecurity Framework

Buy Now
Questions 13

Which standard approach to security is augmented by the 4C’s of Cloud Native security?

Options:

A.

Zero Trust

B.

Least Privilege

C.

Defense-in-Depth

D.

Secure-by-Design

Buy Now
Questions 14

Which of the following snippets from a RoleBinding correctly associates user bob with Role pod-reader ?

Options:

A.

subjects:

- kind: User

name: pod-reader

apiGroup: rbac.authorization.k8s.io

roleRef:

kind: Role

name: bob

apiGroup: rbac.authorization.k8s.io

B.

subjects:

- kind: User

name: bob

apiGroup: rbac.authorization.k8s.io

roleRef:

kind: Role

name: pod-reader

apiGroup: rbac.authorization.k8s.io

C.

subjects:

- kind: User

name: bob

apiGroup: rbac.authorization.k8s.io

roleRef:

kind: ClusterRole

name: pod-reader

apiGroup: rbac.authorization.k8s.io

D.

subjects:

- kind: Group

name: bob

apiGroup: rbac.authorization.k8s.io

roleRef:

kind: Role

name: pod-reader

apiGroup: rbac.authorization.k8s.io

Buy Now
Questions 15

What is the difference between gVisor and Firecracker?

Options:

A.

gVisor is a user-space kernel that provides isolation and security for containers. At the same time, Firecracker is a lightweight virtualization technology for creating and managing secure, multi-tenant container and function-as-a-service (FaaS) workloads.

B.

gVisor is a lightweight virtualization technology for creating and managing secure, multi-tenant container and function-as-a-service (FaaS) workloads. At the same time, Firecracker is a user-space kernel that provides isolation and security for containers.

C.

gVisor and Firecracker are both container runtimes that can be used interchangeably.

D.

gVisor and Firecracker are two names for the same technology, which provides isolation and security for containers.

Buy Now
Questions 16

Which way of defining security policy brings consistency, minimizes toil, and reduces the probability of misconfiguration?

Options:

A.

Using a declarative approach to define security policies as code.

B.

Relying on manual audits and inspections for security policy enforcement.

C.

Manually configuring security controls for each individual resource, regularly.

D.

Implementing security policies through manual scripting on an ad-hoc basis.

Buy Now
Questions 17

How do Kubernetes namespaces impact the application of policies when using Pod Security Admission?

Options:

A.

Namespaces are ignored; Pod Security Admission policies apply cluster-wide only.

B.

Different policies can be applied to specific namespaces.

C.

Each namespace can have only one active policy.

D.

The default namespace enforces the strictest security policies by default.

Buy Now
Questions 18

Which other controllers are part of the kube-controller-manager inside the Kubernetes cluster?

Options:

A.

Job controller, CronJob controller, and DaemonSet controller

B.

Pod, Service, and Ingress controller

C.

Namespace controller, ConfigMap controller, and Secret controller

D.

Replication controller, Endpoints controller, Namespace controller, and ServiceAccounts controller

Buy Now
Exam Code: KCSA
Exam Name: Kubernetes and Cloud Native Security Associate (KCSA)
Last Update: Aug 29, 2025
Questions: 60
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now KCSA