Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Linux Foundation CKS Exam - Topic 1 Question 20 Discussion

Actual exam question for Linux Foundation's CKS exam
Question #: 20
Topic #: 1
[All CKS Questions]

A container image scanner is set up on the cluster.

Given an incomplete configuration in the directory

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Mozell
5 months ago
Not sure if testing with latest is a good idea, though.
upvoted 0 times
...
India
5 months ago
I think enabling the admission plugin is a must.
upvoted 0 times
...
Robt
5 months ago
Wait, deploying with the latest tag? Isn't that risky?
upvoted 0 times
...
Genevive
5 months ago
Implicit deny is definitely the way to go!
upvoted 0 times
...
Bok
5 months ago
Sounds like a solid plan to secure the cluster.
upvoted 0 times
...
Chaya
5 months ago
I feel like I’ve seen a similar scenario before, but I can't recall if we needed to specify any additional parameters for the admission plugin to work correctly.
upvoted 0 times
...
Letha
5 months ago
I remember a practice question where we had to set up image scanning, and I think changing to implicit deny is crucial for security.
upvoted 0 times
...
Annette
5 months ago
I think enabling the admission plugin is the first step, but I'm not entirely sure how to validate the control configuration.
upvoted 0 times
...
Hermila
6 months ago
Testing with the 'latest' tag sounds familiar, but I’m a bit confused about how that interacts with the admission plugin.
upvoted 0 times
...
Timmy
6 months ago
Okay, let me see here. I remember learning about these system services, but I'm drawing a blank on which one uses the hosts.allow file. I'll have to carefully consider each option and try to eliminate the ones that don't fit.
upvoted 0 times
...
Fernanda
6 months ago
I think the key is to maintain control over the encryption keys. That way, you can be sure the data is completely removed when you need to.
upvoted 0 times
...
Anisha
6 months ago
I think one disadvantage could be the setup and maintenance costs, but I'm not entirely sure if there's more to it.
upvoted 0 times
...
Shelba
6 months ago
Okay, I think I've got this. The question is asking us to design a network that only allows the frontend application to access the backend database. So, creating separate VPC networks and connecting them with VPC peering or Cloud VPN seems like the most secure approach to me. I'm going with option C.
upvoted 0 times
...

Save Cancel