When using a cloud provider's managed Kubernetes service, who is responsible for maintaining the etcd cluster?
Correct : C
Start a Discussions
A container image is trojanised by an attacker by compromising the build server. Based on the STRIDE threat modeling framework, which threat category best defines this threat?
Correct : D
Start a Discussions
Which of the following statements is true concerning the use of microVMs over user-space kernel implementations for advanced container sandboxing?
Correct : B
Start a Discussions
An attacker has successfully overwhelmed the Kubernetes API server in a cluster with a single control plane node by flooding it with requests.
How would implementing a high-availability mode with multiple control plane nodes mitigate this attack?
Correct : B
Start a Discussions
Which of the following statements on static Pods is true?
Correct : C
Start a Discussions