11. What is the primary mechanism to identify grouped objects in a Kubernetes cluster?
A. Custom Resources
B. Labels
C. Label Selector
D. Pod
Answer
B
12. What is the name of the Kubernetes resource used to expose an application?
A. Port
B. Service
C. DNS
D. Deployment
Answer
B
13. In the Kubernetes platform, which component is responsible for running containers?
A. etcd
B. CRI-O
C. cloud-controller-manager
D. kube-controller-manager
Answer
B
14. Services and Pods in Kubernetes are ______ objects.
A. JSON
B. YAML
C. Java
D. REST
Answer
D
15. What Kubernetes component handles network communications inside and outside of a cluster, using operating system packet filtering if available?
A. kube-proxy
B. kubelet
C. etcd
D. kube-controller-manager
Answer
A
16. Which of these commands is used to retrieve the documentation and field definitions for a Kubernetes resource?
A. kubectl explain
B. kubectl api-resources
C. kubectl get –help
D. kubectl show
Answer
A
17. Which statement about the Kubernetes network model is correct?
A. Pods can only communicate with Pods exposed via a Service.
B. Pods can communicate with all Pods without NAT.
C. The Pod IP is only visible inside a Pod.
D. The Service IP is used for the communication between Services.
Answer
B
18. Can a Kubernetes Service expose multiple ports?
A. No, you can only expose one port per each Service.
B. Yes, but you must specify an unambiguous name for each port.
C. Yes, the only requirement is to use different port numbers.
D. No, because the only port you can expose is port number 443.
Answer
B
19. Which of the following is a responsibility of the governance board of an open source project?
A. Decide about the marketing strategy of the project.
B. Review the pull requests in the main branch.
C. Outline the project’s “terms of engagement”.
D. Define the license to be used in the project.
Answer
C
20. What is the role of a NetworkPolicy in Kubernetes?
A. The ability to cryptic and obscure all traffic.
B. The ability to classify the Pods as isolated and non isolated.
C. The ability to prevent loopback or incoming host traffic.
D. The ability to log network security events.
Answer
B