Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Linux Foundation Exam CKS Topic 3 Question 73 Discussion

Actual exam question for Linux Foundation's CKS exam
Question #: 73
Topic #: 3
[All CKS Questions]

Context

A container image scanner is set up on the cluster, but it's not yet fully integrated into the cluster s configuration. When complete, the container image scanner shall scan for and reject the use of vulnerable images.

Task

Given an incomplete configuration in directory /etc/kubernetes/epconfig and a functional container image scanner with HTTPS endpoint https://wakanda.local:8081 /image_policy :

1. Enable the necessary plugins to create an image policy

2. Validate the control configuration and change it to an implicit deny

3. Edit the configuration to point to the provided HTTPS endpoint correctly

Finally, test if the configuration is working by trying to deploy the vulnerable resource /root/KSSC00202/vulnerable-resource.yml.

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Yuriko
16 days ago
Hmm, 'wakanda.local' huh? I bet T'Challa is the one monitoring these scans. Better not mess this up!
upvoted 0 times
...
Edda
17 days ago
Wait, we have to configure an image scanner? That's like adding an extra layer of security. I'm starting to feel like a cybersecurity superhero already!
upvoted 0 times
Amie
24 hours ago
Yes, configuring an image scanner adds an extra layer of security to the cluster.
upvoted 0 times
...
...
Annmarie
22 days ago
Finally, a question that doesn't involve memorizing a gazillion Kubernetes commands. This one's got my name written all over it!
upvoted 0 times
...
Jutta
2 months ago
Ah, I see we need to enable the necessary plugins and set up the HTTPS endpoint. Looks like a solid challenge to test my Kubernetes skills.
upvoted 0 times
Leonora
15 days ago
I agree, setting up the container image scanner properly is crucial.
upvoted 0 times
...
Dorthy
20 days ago
Yes, it's definitely a good challenge to test our skills.
upvoted 0 times
...
...
Cyril
2 months ago
I believe enabling the necessary plugins and configuring the HTTPS endpoint are key steps to achieve this.
upvoted 0 times
...
Marisha
2 months ago
I agree, we need to ensure that only secure images are used in the cluster.
upvoted 0 times
...
Latricia
2 months ago
Hmm, this seems like a tricky one. I better double-check the configuration steps to get this right.
upvoted 0 times
Gerald
8 days ago
User 4: Once that's done, we can test if the configuration is working by deploying the vulnerable resource.
upvoted 0 times
...
Fernanda
23 days ago
User 3: Don't forget to edit the configuration to point to the provided HTTPS endpoint correctly.
upvoted 0 times
...
Blair
1 months ago
User 2: Yes, that's the first step. We also need to validate the control configuration and change it to an implicit deny.
upvoted 0 times
...
Rodrigo
1 months ago
User 1: I think we need to enable the necessary plugins to create an image policy.
upvoted 0 times
...
...
Loise
2 months ago
I think setting up the container image scanner is crucial for security.
upvoted 0 times
...

Save Cancel