Certified Kubernetes Security Specialist (CKS) Exam Dumps
July 02,2021
If you want to become a Certified Kubernetes Security Specialist, you can come to Passcert to get the latest Certified Kubernetes Security Specialist (CKS) Exam Dumps for your best preparation.Passcert team arranged the set of actual questions with their right answers for your success in the CKS exam in your first try with excellent marks. You can pass your Certified Kubernetes Security Specialist (CKS) exam with the help of our outstanding CKS Exam Dumps.This CKS Exam Dumps will help you to make better use of your time and effort efficiently.
Certified Kubernetes Security Specialist (CKS)
The CKS is the third Kubernetes based certification backed by the Cloud Native Computing Foundation (CNCF). CKS will join the existing Certified Kubernetes Administrator (CKA) and Certified Kubernetes Application Developer (CKAD) programs. All three certifications are online, proctored, performance-based exams that will require solving multiple Kubernetes security tasks from the command line. With the massive investment into Kubernetes over the last five years, these certifications continue to be highly sought after by many seeking technical knowledge about Kubernetes.
A Certified Kubernetes Security Specialist (CKS) is an accomplished Kubernetes practitioner (must be CKA certified) who has demonstrated competence on a broad range of best practices for securing container-based applications and Kubernetes platforms during build, deployment and runtime.CKS is a performance-based certification exam that tests candidates' knowledge of Kubernetes and cloud security in a simulated, real world environment.
Exam Details
This exam is an online, proctored, performance-based test that requires solving multiple tasks from a command line running Kubernetes. Candidates have two (2) hours to complete the tasks.The exam is taken remotely with a live proctor monitoring via webcam and screen sharing. Candidates for CKS must hold a current Certified Kubernetes Administrator (CKA) certification to demonstrate they possess sufficient Kubernetes expertise before sitting for the CKS.The cost is $375 and includes one free retake.
Exam Domains
View Online Certified Kubernetes Security Specialist (CKS) Free Questions
1.CORRECT TEXT
a. Retrieve the content of the existing secret named default-token-xxxxx in the testing namespace.
Store the value of the token in the token.txt
b. Create a new secret named test-db-secret in the DB namespace with the following content:
username: mysql
password: password@123
Create the Pod name test-db-pod of image nginx in the namespace db that can access test-db-secret via a volume at path /etc/mysql-credentials
Answer:
To add a Kubernetes cluster to your project, group, or instance:
? Navigate to your:
? Click Add Kubernetes cluster.
? Click the Add existing cluster tab and fill in the details: Get the API URL by running this command:
kubectl cluster-info | grep-E'Kubernetes master|Kubernetes control plane'| awk'/http/ {print $NF}'
? uk.co.certification.simulator.questionpool.PList@dc67810
kubectl get secret <secret name>-ojsonpath="{['data']['ca\.crt']}"
2.CORRECT TEXT
On the Cluster worker node, enforce the prepared AppArmor profile
? #include<tunables/global>
? profile nginx-deny flags=(attach_disconnected) {
? #include<abstractions/base>
? file,
? # Deny all file writes.
? deny/** w,
? }
? EOF'
Edit the prepared manifest file to include the AppArmor profile.
? apiVersion: v1
? kind: Pod
? metadata:
? name: apparmor-pod
? spec:
? containers:
? - name: apparmor-pod
? image: nginx
Finally, apply the manifests files and create the Pod specified on it.
Verify: Try to make a file inside the directory which is restricted.
Answer: Send us your Feedback on this.
3.CORRECT TEXT
Create a network policy named allow-np, that allows pod in the namespace staging to connect to port 80 of other pods in the same namespace.
Ensure that Network Policy:-
1. Does not allow access to pod not listening on port 80.
2. Does not allow access from Pods, not in namespace staging.
Answer:
apiVersion:networking.k8s.io/v1
kind:NetworkPolicy
metadata:
name:network-policy
spec:
podSelector:{} #selects all the pods in the namespace deployed
policyTypes:
-Ingress
ingress:
-ports:#in input traffic allowed only through 80 port only
-protocol:TCP
port:80
4.CORRECT TEXT
Given an existing Pod named nginx-pod running in the namespace test-system, fetch the service-account-name used and put the content in /candidate/KSC00124.txt
Create a new Role named dev-test-role in the namespace test-system, which can perform
update operations, on resources of type namespaces.
Create a new RoleBinding named dev-test-role-binding, which binds the newly created Role to the Pod's ServiceAccount ( found in the Nginx pod running in namespace test-system).
Answer: Send us your feedback on it.
5.CORRECT TEXT
A container image scanner is set up on the cluster.
Given an incomplete configuration in the directory
/etc/Kubernetes/confcontrol and a functional container image scanner with HTTPS endpoint https://acme.local.8081/image_policy
1. Enable the admission plugin.
2. Validate the control configuration and change it to implicit deny.
Finally, test the configuration by deploying the pod having the image tag as the latest.
Answer: Send us your feedback on it.
- Related Suggestion
- Linux Foundation Certified IT Associate (LFCA) Exam Dumps October 06,2023
- FinOps Certified Practitioner FOCP Certification Exam Dumps November 02,2022
- Certified Kubernetes Application Developer (CKAD) Exam Dumps October 05,2022
- Kubernetes and Cloud Native Associate (KCNA) Dumps July 01,2022
- Linux Foundation Certified System Administrator (LFCS) Dumps November 10,2020