Question 6 of 60

In the STRIDE threat modelling framework, what does the letter D stand for?

Answer

Suggested Answer

The suggested answer is D.

Question 7 of 60

A malicious user is targeting the etcd key-value store of a Kubernetes cluster for data exfiltration.

Which option describes how an adversary can access sensitive data from etcd?

Answer

Suggested Answer

The suggested answer is D.

Question 8 of 60

Is it a best practice to let an application Pod use the underlying node's identity and credentials to authenticate to a datastore?

Answer

Suggested Answer

The suggested answer is D.

Question 9 of 60

A user needs to maintain the audit policy of a Kubernetes cluster and wants to make sure that they log the most information in regard to Pod changes.

Which level do they select for the Pod resource?

Answer

Suggested Answer

The suggested answer is B.

Question 10 of 60

Which of the following is a recommendation in the NSA and CISA Kubernetes Hardening Guidance on namespaces?

Answer

Suggested Answer

The suggested answer is C.