单选题 In Kubernetes, which security measure is most effective in preventing privilege escalation within a container?
A、
Allocating more CPU and memory resources to the container
B、
Regularly updating container images to the latest version
C、
Configuring containers to run as a non-root user and disabling privilege escalation
D、
Implementing network policies to restrict external access to the container
单选题 In Kubernetes, what is an effective measure to prevent malicious code execution within containers?
A、
Increasing the number of pod replicas for redundancy
B、
Regularly backing up container data to external storage
C、
Using trusted base images and scanning images for vulnerabilities
D、
Implementing auto-scaling to adjust to varying loads
单选题 Under the “4Cs of Cloud Native Security” model, which component emphasizes the security of the codebase, including practices like secure coding standards, code reviews, and vulnerability scanning?
单选题 What is the role of a Certificate Authority (CA) in the PKI setup of a Kubernetes cluster?
A、
To provide load balancing between different Kubernetes services
B、
To manage the distribution of secrets within the Kubernetes cluster
C、
To issue and manage digital certificates for secure communication within the cluster
D、
To optimize network traffic routing within the Kubernetes environment
单选题 What is the primary security advantage of implementing Pod Security Policies (PSPs) in Kubernetes?
A、
Enhancing the network performance of pods
B、
Automatically scaling pods based on demand
C、
Controlling the security features that pods must comply with
D、
Optimizing the storage utilization of pods
单选题 What is the primary benefit of implementing a Software Bill of Materials (SBOM) in the context of supply chain compliance in Kubernetes?
A、
To accelerate the deployment of Kubernetes workloads
B、
To optimize network traffic routing within the Kubernetes cluster
C、
To provide transparency in software components used, aiding in security and compliance checks
D、
To enhance load balancing capabilities across Kubernetes nodes
单选题 How does the implementation of automated security scanning tools in a Kubernetes environment contribute to compliance and security frameworks?
A、
By enhancing the deployment speed of Kubernetes applications
B、
By optimizing resource allocation within the Kubernetes nodes
C、
By continuously identifying and addressing security vulnerabilities in container images and configurations
D、
By improving inter-service communication efficiency within the Kubernetes cluster
单选题 In Kubernetes, what is the primary purpose of using Namespaces as an isolation technique?
A、
To provide network segmentation between different application components
B、
To limit the resource usage of different teams or projects
C、
To isolate workloads for security and organizational purposes
D、
To encrypt data traffic between different services