Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Linux Foundation Exam CKS Topic 5 Question 79 Discussion

Actual exam question for Linux Foundation's CKS exam
Question #: 79
Topic #: 5
[All CKS Questions]

Fix all issues via configuration and restart the affected components to ensure the new setting takes effect.

Fix all of the following violations that were found against theAPI server:-

a. Ensure the --authorization-mode argument includes RBAC

b. Ensure the --authorization-mode argument includes Node

c. Ensure that the --profiling argument is set to false

Fix all of the following violations that were found against theKubelet:-

a. Ensure the --anonymous-auth argument is set to false.

b. Ensure that the --authorization-mode argument is set to Webhook.

Fix all of the following violations that were found against theETCD:-

a. Ensure that the --auto-tls argument is not set to true

Hint: Take the use of Tool Kube-Bench

Show Suggested Answer Hide Answer
Suggested Answer: A


Contribute your Thoughts:

Lajuana
14 days ago
Wait, we need to turn off --auto-tls for ETCD? I thought self-signed certificates were the way to go. Guess I've been living under a rock all this time. Time to upgrade my Kubernetes security knowledge.
upvoted 0 times
India
10 days ago
Yes, turning off --auto-tls for ETCD is recommended for better security.
upvoted 0 times
...
...
Jenelle
21 days ago
I think it's important to follow the remediation steps provided for each violation.
upvoted 0 times
...
Britt
24 days ago
I agree, Kube-Bench is a great tool for ensuring security compliance.
upvoted 0 times
...
Jacqueline
26 days ago
I feel confident about fixing the violations using Kube-Bench.
upvoted 0 times
...
Glory
29 days ago
Hmm, looks like we need to ensure the --authorization-mode argument includes RBAC and Node for the API server. And for the Kubelet, we need to set --anonymous-auth to false and --authorization-mode to Webhook. Easy peasy!
upvoted 0 times
...
Latosha
1 months ago
Ah, the good old Kube-Bench tool! I remember when I first used it, it was like a treasure hunt for security vulnerabilities. Time to put on my detective hat and fix these issues.
upvoted 0 times
Jolene
12 hours ago
Finally, we'll make sure that the --auto-tls argument is not set to true for ETCD.
upvoted 0 times
...
Dexter
3 days ago
After that, we can work on fixing the violations found against the Kubelet.
upvoted 0 times
...
Kimberlie
4 days ago
Let's start by ensuring the --authorization-mode argument includes RBAC for the API server.
upvoted 0 times
...
Florinda
6 days ago
I agree, Kube-Bench is a great tool for finding and fixing security vulnerabilities.
upvoted 0 times
...
...
Hildred
1 months ago
The question seems straightforward, it's just a matter of making the necessary configuration changes to the API server, Kubelet, and ETCD components.
upvoted 0 times
Lynda
15 days ago
Don't forget to check that the --auto-tls argument is not set to true for ETCD.
upvoted 0 times
...
Laticia
15 days ago
Yes, we should also make sure that the --anonymous-auth argument is set to false for the Kubelet.
upvoted 0 times
...
Rosalyn
25 days ago
I think we need to ensure the --authorization-mode argument includes RBAC for the API server.
upvoted 0 times
...
...

Save Cancel