Which object type does the Kubernetes RBAC API declare?
Kubernetes Role-Based Access Control (RBAC) is implemented through theRBAC API group(rbac.authorization.k8s.io) and defines the core authorization primitives used to grant permissions to users, groups, and service accounts. The cluster-scoped objects declared by the RBAC API areClusterRoleandClusterRoleBinding. AClusterRoledefines a set of permissions (verbs such as get/list/watch/create/update/delete) over resources at thecluster scope(including cluster-wide resources and optionally namespaced resources across namespaces). AClusterRoleBindingthenbindsthat ClusterRole to a subject (user/group/serviceaccount), making those permissions effective cluster-wide.
This differs from namespace-scoped RBAC objects (RoleandRoleBinding) which apply only within a single namespace. The other options are incorrect becauseClusterObject/ClusterNodeare not RBAC API objects,ValidatingAdmissionPolicybelongs to the admission control API surface (policy enforcement),ResourceQuotais a namespace resource governance object, andContainer/Deploymentare workload/runtime concepts defined in the core/apps APIs rather than authorization primitives.
An administrator runs several critical workloads on vSphere Kubernetes Service (VKS). An audit identified an outdated container image with a known CVE that exposed internal APIs to unauthorized access. To mitigate this risk and enhance image security, the administrator enabled Harbor as a Supervisor Service.
Which two Harbor registry capabilities help the organization prevent a recurrence of this type of security incident? (Choose two.)
Harbor reduces the risk of running vulnerable or tampered images primarily throughvulnerability scanningandimage signing.Vulnerability scanning (E)detects known CVEs in image layers (OS packages and application dependencies, depending on the scanner configuration). This allows teams to identify---and gate the use of---images that contain high/critical vulnerabilities before those images are deployed to Kubernetes clusters. Enforcing scanning as part of the image promotion process helps prevent outdated images with known CVEs from being pulled into production.Image signing (A)provides integrity and provenance controls by enabling consumers to verify that an image was produced and approved by a trusted publisher and has not been altered. When combined with admission controls/policies (for example, only allowing signed images from specific projects), signing helps block unauthorized or unapproved images from being deployed, which is critical when the incident involves exposed internal APIs and supply-chain risk.
The other choices do not directly prevent recurrence:automatic image update (B)is not a core Harbor registry control,deploy both container and VM images (C)is a content capability rather than a security control, andautomatic image validation (D)is not a standard Harbor registry capability distinct from signing/scanning.
An administrator is modernizing the internal HR and payroll applications using vSphere Kubernetes Service (VKS). The applications are composed of multiple microservices deployed across Kubernetes clusters, fronted by Ingress controllers that route user traffic through Avi Kubernetes Operator. During testing, it is discovered that manually creating and renewing TLS certificates for each Ingress resource is error-prone and leads to periodic outages when certificates expire. The requirements also mandate that all application endpoints use trusted certificates issued through the corporate certificate authority (CA) with automatic renewal and rotation.
Which requirement can be met by using cert-manager?
cert-manager addresses the operational risk described (manual creation/renewal causing outages) by making certificate lifecycle management anative, declarative Kubernetes workflow. Instead of treating TLS certificates as manually managed files, cert-manager extends the Kubernetes API with custom resources such asCertificate,Issuer, andClusterIssuer, so certificates and their issuing policies become first-class objects that can be version-controlled and automatically reconciled. This directly satisfies the requirement to usetrusted certificates issued through the corporate CA, because an Issuer/ClusterIssuer can represent that corporate CA integration and define how certificate requests are fulfilled. Once configured, cert-manager continuously monitors certificate validity andautomatically renews and rotatescertificates before expiration, then updates the referenced Kubernetes Secrets so Ingress endpoints remain protected without human intervention. In a vSphere Supervisor / VKS environment, VMware also uses cert-manager on the Supervisor for automated certificate rotation in platform integrations (for example, rotating certificates used by monitoring components), reinforcing the model of automated rotation rather than manual certificate handling.
What three components run in a VMware vSphere Kubernetes Service (VKS) cluster? (Choose three.)
VCF 9.0 explicitly lists thecomponents that run in a VKS clusterand groups them into areas such as authentication/authorization, storage integration, pod networking, and load balancing. In that list, the documentation names:''Container Storage Interface Plugin''(a paravirtual CSI plug-in that integrates with CNS through the Supervisor),''Container Network Interface Plug-in''(a CNI plugin that provides pod networking), and''Cloud Provider Implementation''(supports creating Kubernetes load balancer services).
These three items map directly to the answer choicesD (Container Storage Interface),F (Container Network Interface), andA (Cloud Provider Implementation). The same VCF 9.0 section also mentions an authentication webhook, but that component is not offered as a selectable option in this question, so the best three matches among the provided choices are the CSI, CNI, and cloud provider implementation entries that the document explicitly states are present inside a VKS cluster.
An administrator has been tasked to temporarily scale the Control Plane of a VKS cluster with no service disruption. How should the administrator accomplish this task?
VKS cluster lifecycle is managed using adeclarative API: you usekubectl with a YAML fileto specify the desired state of the cluster (for example: ''how many nodes,'' Kubernetes version, sizing, and storage). After the cluster is created, youupdate the YAMLto update the cluster. This is why the correct operational approach is to modify the cluster manifest (cluster.yaml) rather than deleting and redeploying.
Additionally, VKS uses multiple controller layers, whereCluster APIand theVirtual Machine Serviceare responsible for provisioning and managing the lifecycle of the control plane and worker node VMs that make up the VKS cluster. In other words, when you change the declared state for control plane sizing/replica count in the cluster YAML, the platform reconciles to that new state by adjusting the underlying control plane VMs through the supported controllers, instead of requiring disruptive ''tear down and rebuild'' operations.
So, editing the cluster.yaml to adjust the control plane replica count is the method that matches the documented VKS declarative operations model and controller-driven reconciliation.
Currently there are no comments in this discussion, be the first to comment!