1. Home
  2. Linux Foundation
  3. CKS PDF

Linux Foundation CKS PDF Exam Questions:

How to Get Success in Linux Foundation CKS Exam:

  • Avoid deceptive CKS PDF Exam Questions.
  • Focus on CKS Questions (PDF) based on the latest exam syllabus.
  • Make notes of Linux Foundation CKS PDF for better learning.
  • Prepare from our latest Linux Foundation CKS PDF file and get success in first attempt.
CKS PDF
Linux Foundation CKS PDF

Prepare Linux Foundation CKS Exam Within Short Time

Your knowledge and abilities are validated by passing the Linux Foundation CKS exam. Our PDF questions and answers will help you prepare for the CKS exam in a short time because it includes questions similar to the real Linux Foundation exam questions. After downloading the CKS Linux Foundation PDF exam questions, relevant to the actual exam, you can take a print of all questions and prepare them anytime, anywhere.

Realistic Scenario Based Linux Foundation CKS PDF Exam Questions:

Everyone wants to become certified Kubernetes Security Specialist and improve his/her resume. You should practice with real CKS questions. Students can benefit from the CKS exam questions which are available in PDF format. The CKS exam questions and answers are designed to match the criteria of the actual exam. If you use scenario-based Linux Foundation CKS questions you will have an extra potential to clear the exam on the first attempt.

Q1.

Create a new ServiceAccount named backend-sa in the existing namespace default, which has the capability to list the pods inside the namespace default.

Create a new Pod named backend-pod in the namespace default, mount the newly created sa backend-sa to the pod, and Verify that the pod is able to list pods.

Ensure that the Pod is running.

Answer: A
Q2.

Fix all issues via configuration and restart the affected components to ensure the new setting takes effect.

Fix all of the following violations that were found against theAPI server:-

a. Ensure the --authorization-mode argument includes RBAC

b. Ensure the --authorization-mode argument includes Node

c. Ensure that the --profiling argument is set to false

Fix all of the following violations that were found against theKubelet:-

a. Ensure the --anonymous-auth argument is set to false.

b. Ensure that the --authorization-mode argument is set to Webhook.

Fix all of the following violations that were found against theETCD:-

a. Ensure that the --auto-tls argument is not set to true

Hint: Take the use of Tool Kube-Bench

Answer: A

See the explanation below.


Q3.

Create a PSP that will prevent the creation of privileged pods in the namespace.

Create a new PodSecurityPolicy named prevent-privileged-policy which prevents the creation of privileged pods.

Create a new ServiceAccount named psp-sa in the namespace default.

Create a new ClusterRole named prevent-role, which uses the newly created Pod Security Policy prevent-privileged-policy.

Create a new ClusterRoleBinding named prevent-role-binding, which binds the created ClusterRole prevent-role to the created SA psp-sa.

Also, Check the Configuration is working or not by trying to Create a Privileged pod, it should get failed.

Answer: A
Q4.

Context

A Role bound to a Pod's ServiceAccount grants overly permissive permissions. Complete the following tasks to reduce the set of permissions.

Task

Given an existing Pod named web-pod running in the namespace security.

Edit the existing Role bound to the Pod's ServiceAccount sa-dev-1 to only allow performing watch operations, only on resources of type services.

Create a new Role named role-2 in the namespace security, which only allows performing update

operations, only on resources of type namespaces.

Create a new RoleBinding named role-2-binding binding the newly created Role to the Pod's ServiceAccount.

q4_CKS

Answer: A
Q5.

Enable audit logs in the cluster, To Do so, enable the log backend, and ensure that

1. logs are stored at /var/log/kubernetes-logs.txt.

2. Log files are retained for 12 days.

3. at maximum, a number of 8 old audit logs files are retained.

4. set the maximum size before getting rotated to 200MB

Edit and extend the basic policy to log:

1. namespaces changes at RequestResponse

2. Log the request body of secrets changes in the namespace kube-system.

3. Log all other resources in core and extensions at the Request level.

4. Log "pods/portforward", "services/proxy" at Metadata level.

5. Omit the Stage RequestReceived

All other requests at the Metadata level

Answer: A

Reliable Source Of Preparation For Certified Kubernetes Security Specialist Exam.

We provide Kubernetes Security Specialist certification questions along with answers to assist students in passing the Linux Foundation Exam. You can enhance your Linux Foundation CKS preparation with the help of an online practice engine. Try out our Linux Foundation CKS questions because 98% of Examskit users passed the final CKS exam in one go.