Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Linux Foundation Kubernetes and Cloud Native KCNA Questions and answers with CertsForce

Viewing page 7 out of 8 pages
Viewing questions 61-70 out of questions
Questions # 61:

A Pod named my-app must be created to run a simple nginx container. Which kubectl command should be used?

Options:

A.

kubectl create nginx --name=my-app


B.

kubectl run my-app --image=nginx


C.

kubectl create my-app --image=nginx


D.

kubectl run nginx --name=my-app


Expert Solution
Questions # 62:

What is ephemeral storage?

Options:

A.

Storage space that need not persist across restarts.


B.

Storage that may grow dynamically.


C.

Storage used by multiple consumers (e.g., multiple Pods).


D.

Storage that is always provisioned locally.


Expert Solution
Questions # 63:

Kubernetes supports multiple virtual clusters backed by the same physical cluster. These virtual clusters are called:

Options:

A.

Namespaces


B.

Containers


C.

Hypervisors


D.

cgroups


Expert Solution
Questions # 64:

What happens if only a limit is specified for a resource and no admission-time mechanism has applied a default request?

Options:

A.

Kubernetes will create the container but it will fail with CrashLoopBackOff.


B.

Kubernetes does not allow containers to be created without request values, causing eviction.


C.

Kubernetes copies the specified limit and uses it as the requested value for the resource.


D.

Kubernetes chooses a random value and uses it as the requested value for the resource.


Expert Solution
Questions # 65:

Which GitOps engine can be used to orchestrate parallel jobs on Kubernetes?

Options:

A.

Jenkins X


B.

Flagger


C.

Flux


D.

Argo Workflows


Expert Solution
Questions # 66:

What’s the difference between a security profile and a security context?

Options:

A.

Security Contexts configure Clusters and Namespaces at runtime. Security profiles are control plane mechanisms to enforce specific settings in the Security Context.


B.

Security Contexts configure Pods and Containers at runtime. Security profiles are control plane mechanisms to enforce specific settings in the Security Context.


C.

Security Profiles configure Pods and Containers at runtime. Security Contexts are control plane mechanisms to enforce specific settings in the Security Profile.


D.

Security Profiles configure Clusters and Namespaces at runtime. Security Contexts are control plane mechanisms to enforce specific settings in the Security Profile.


Expert Solution
Questions # 67:

Which of the following is a lightweight tool that manages traffic flows between services, enforces access policies, and aggregates telemetry data, all without requiring changes to application code?

Options:

A.

NetworkPolicy


B.

Linkerd


C.

kube-proxy


D.

Nginx


Expert Solution
Questions # 68:

Which option represents best practices when building container images?

Options:

A.

Use multi-stage builds, use the latest tag for image version, and only install necessary packages.


B.

Use multi-stage builds, pin the base image version to a specific digest, and install extra packages just in case.


C.

Use multi-stage builds, pin the base image version to a specific digest, and only install necessary packages.


D.

Avoid multi-stage builds, use the latest tag for image version, and install extra packages just in case.


Expert Solution
Questions # 69:

What is the goal of load balancing?

Options:

A.

Automatically measure request performance across instances of an application.


B.

Automatically distribute requests across different versions of an application.


C.

Automatically distribute instances of an application across the cluster.


D.

Automatically distribute requests across instances of an application.


Expert Solution
Questions # 70:

In Kubernetes, what is the primary function of a RoleBinding?

Options:

A.

To provide a user or group with permissions across all resources at the cluster level.


B.

To assign the permissions of a Role to a user, group, or service account within a namespace.


C.

To enforce namespace network rules by binding policies to Pods running in the namespace.


D.

To create and define a new Role object that contains a specific set of permissions.


Expert Solution
Viewing page 7 out of 8 pages
Viewing questions 61-70 out of questions