MultipleChoice
An attacker has access to the network segment that the cluster is on.
What happens when a compromised Pod attempts to connect to the API server?
OptionsMultipleChoice
What mechanism can I use to block unsigned images from running in my cluster?
Options