CKS Exam Question 36
You're setting up a new Kubernetes cluster for a critical application, and you want to ensure that only authorized users can access the cluster's API server. Implement a solution using RBAC to achieve this, outlining the steps and the necessary configurations.
CKS Exam Question 37
You suspect that the Kubernetes binaries on your cluster nodes may have been tampered with. Implement a process to verify the integrity of the binaries and identify any potential compromises.
CKS Exam Question 38
Your organization is running a critical application in a Kubernetes cluster, and you need to implement a system to monitor and detect any malicious activity within the containers. Describe how you can leverage audit logs and container runtime security tools like Sysdig to achieve this goal.
CKS Exam Question 39
Your organization has a policy requiring all Kubernetes deployments to utilize Pod Security Policies (PSPs) to enforce security best practices. You're responsible for creating a PSP that enforces the following:
- Only allows containers with a specific security context (privileged: false, runAsUser: 1000, readOnlyRootFilesystem: true)
- Restricts access to most resources by denying the 'hostPort and 'hostNetwork' capabilities.
- Prohibits the use of privileged containers.
Implement the required PSP configuration
- Only allows containers with a specific security context (privileged: false, runAsUser: 1000, readOnlyRootFilesystem: true)
- Restricts access to most resources by denying the 'hostPort and 'hostNetwork' capabilities.
- Prohibits the use of privileged containers.
Implement the required PSP configuration
CKS Exam Question 40
You need to configure a Kubernetes cluster to use a pod security policy (PSP) that restricts the use of privileged containers and specific capabilities. You want to only allow specific pods in the 'production' namespace to run With the 'NET_ADMIN' capability.











