MultipleChoice
Which way of defining security policy brings consistency, minimizes toil, and reduces the probability of misconfiguration?
OptionsMultipleChoice
An attacker has access to the network segment that the cluster is on.
What happens when a compromised Pod attempts to connect to the API server?
OptionsMultipleChoice
What mechanism can I use to block unsigned images from running in my cluster?
Options