When using a cloud provider's managed Kubernetes service, who is responsible for maintaining the etcd cluster?
Answer : C
Which security knowledge-base focuses specifically on offensive tools, techniques, and procedures?
Answer : A
Which of the following statements best describe container image signing and verification in the cloud environment?
Answer : A
What does the 'cluster-admin' ClusterRole enable when used in a RoleBinding?
Answer : B
Which of the following statements is true concerning the use of microVMs over user-space kernel implementations for advanced container sandboxing?
Answer : B
An attacker has successfully overwhelmed the Kubernetes API server in a cluster with a single control plane node by flooding it with requests.
How would implementing a high-availability mode with multiple control plane nodes mitigate this attack?
Answer : B
What is Grafana?
Answer : C