Which of the following statements best describe container image signing and verification in the cloud environment?
To restrict the kubelet's rights to the Kubernetes API, whatauthorization modeshould be set on the Kubernetes API server?
Why does the defaultbase64 encodingthat Kubernetes applies to the contents of Secret resources provide inadequate protection?
Which of the following is a control for Supply Chain Risk Management according to NIST 800-53 Rev. 5?
An attacker has successfully overwhelmed the Kubernetes API server in a cluster with a single control plane node by flooding it with requests.
How would implementing a high-availability mode with multiple control plane nodes mitigate this attack?
Given a standard Kubernetes cluster architecture comprising a single control plane node (hosting bothetcdand the control plane as Pods) and three worker nodes, which of the following data flows crosses atrust boundary?
What is the difference between gVisor and Firecracker?
What is the purpose of the Supplier Assessments and Reviews control in the NIST 800-53 Rev. 5 set of controls for Supply Chain Risk Management?
Which of the following statements is true concerning the use ofmicroVMsover user-space kernel implementations for advanced container sandboxing?
In order to reduce the attack surface of the Scheduler, which default parameter should be set to false?