Which label should be added to the Namespace to block any privileged Pods from being created in that Namespace?
Answer : C
How can a user enforce the Pod Security Standard without third-party tools?
Answer : B
When should soft multitenancy be used over hard multitenancy?
Answer : A
In a Kubernetes cluster, what are the security risks associated with using ConfigMaps for storing secrets?
Answer : B, D
What is the purpose of the Supplier Assessments and Reviews control in the NIST 800-53 Rev. 5 set of controls for Supply Chain Risk Management?
Answer : A
Which of the following is a control for Supply Chain Risk Management according to NIST 800-53 Rev. 5?
Answer : C
In Kubernetes, what is Public Key Infrastructure used for?
Answer : A