Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Linux Foundation Exam CKS Topic 1 Question 40 Discussion

Actual exam question for Linux Foundation's CKS exam
Question #: 40
Topic #: 1
[All CKS Questions]

Cluster:scanner Master node:controlplane Worker node:worker1

You can switch the cluster/configuration context using the following command:

[desk@cli] $kubectl config use-context scanner

Given: You may use Trivy's documentation.

Task: Use the Trivy open-source container scanner to detect images with severe vulnerabilities used by Pods in the namespacenato.

Look for images withHighorCriticalseverity vulnerabilities and delete the Pods that use those images. Trivy is pre-installed on the cluster's master node. Use cluster's master node to use Trivy.

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Glory
4 days ago
Wait, do I need to use 'kubectl config use-context scanner' first? I don't want to accidentally delete the wrong Pods. Better be careful here.
upvoted 0 times
...
Dino
10 days ago
This is a piece of cake! I bet the answer is as simple as 'kubectl delete pod ' for any vulnerable Pods. Easy-peasy!
upvoted 0 times
...
Tracey
18 days ago
That makes sense. We should focus on images with High or Critical severity vulnerabilities in the namespace nato.
upvoted 0 times
...
Ahmed
18 days ago
Hmm, I wonder if I need to have specific permissions to use Trivy on the master node. I better double-check the documentation just to be sure.
upvoted 0 times
Make sure to check the Trivy documentation for any permission requirements.
upvoted 0 times
...
...
Adolph
21 days ago
The question is clear and the task is straightforward. I should be able to use Trivy on the master node to scan the images in the 'nato' namespace and delete the vulnerable Pods.
upvoted 0 times
Xochitl
6 days ago
I will switch the cluster context to 'scanner' using the command provided.
upvoted 0 times
...
...
Tamra
22 days ago
I think we need to carefully read the task and use the Trivy tool on the master node to find and delete Pods with critical vulnerabilities.
upvoted 0 times
...
Tracey
1 months ago
I'm nervous about the exam question on using Trivy to detect vulnerabilities.
upvoted 0 times
...

Save Cancel