Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Linux Foundation Exam CKS Topic 3 Question 73 Discussion

Actual exam question for Linux Foundation's CKS exam
Question #: 73
Topic #: 3
[All CKS Questions]

Context

A container image scanner is set up on the cluster, but it's not yet fully integrated into the cluster s configuration. When complete, the container image scanner shall scan for and reject the use of vulnerable images.

Task

Given an incomplete configuration in directory /etc/kubernetes/epconfig and a functional container image scanner with HTTPS endpoint https://wakanda.local:8081 /image_policy :

1. Enable the necessary plugins to create an image policy

2. Validate the control configuration and change it to an implicit deny

3. Edit the configuration to point to the provided HTTPS endpoint correctly

Finally, test if the configuration is working by trying to deploy the vulnerable resource /root/KSSC00202/vulnerable-resource.yml.

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Yuriko
1 months ago
Hmm, 'wakanda.local' huh? I bet T'Challa is the one monitoring these scans. Better not mess this up!
upvoted 0 times
...
Edda
2 months ago
Wait, we have to configure an image scanner? That's like adding an extra layer of security. I'm starting to feel like a cybersecurity superhero already!
upvoted 0 times
Mable
15 days ago
Once the configuration is complete, the image scanner will help prevent the use of vulnerable images.
upvoted 0 times
...
Selma
24 days ago
I agree, it's like being a cybersecurity superhero protecting the cluster from vulnerabilities.
upvoted 0 times
...
Shawana
26 days ago
It's an important step to ensure that only secure container images are used.
upvoted 0 times
...
Amie
29 days ago
Yes, configuring an image scanner adds an extra layer of security to the cluster.
upvoted 0 times
...
...
Annmarie
2 months ago
Finally, a question that doesn't involve memorizing a gazillion Kubernetes commands. This one's got my name written all over it!
upvoted 0 times
Wilda
22 days ago
Let's make sure we follow the steps correctly to enable the necessary plugins and validate the control configuration.
upvoted 0 times
...
Fernanda
24 days ago
I'm excited to set up the container image scanner and test the configuration.
upvoted 0 times
...
Kara
25 days ago
I know, right? This question seems more practical and hands-on.
upvoted 0 times
...
...
Jutta
3 months ago
Ah, I see we need to enable the necessary plugins and set up the HTTPS endpoint. Looks like a solid challenge to test my Kubernetes skills.
upvoted 0 times
Leonora
1 months ago
I agree, setting up the container image scanner properly is crucial.
upvoted 0 times
...
Dorthy
2 months ago
Yes, it's definitely a good challenge to test our skills.
upvoted 0 times
...
...
Cyril
3 months ago
I believe enabling the necessary plugins and configuring the HTTPS endpoint are key steps to achieve this.
upvoted 0 times
...
Marisha
3 months ago
I agree, we need to ensure that only secure images are used in the cluster.
upvoted 0 times
...
Latricia
3 months ago
Hmm, this seems like a tricky one. I better double-check the configuration steps to get this right.
upvoted 0 times
Gerald
1 months ago
User 4: Once that's done, we can test if the configuration is working by deploying the vulnerable resource.
upvoted 0 times
...
Fernanda
2 months ago
User 3: Don't forget to edit the configuration to point to the provided HTTPS endpoint correctly.
upvoted 0 times
...
Blair
2 months ago
User 2: Yes, that's the first step. We also need to validate the control configuration and change it to an implicit deny.
upvoted 0 times
...
Rodrigo
2 months ago
User 1: I think we need to enable the necessary plugins to create an image policy.
upvoted 0 times
...
...
Loise
3 months ago
I think setting up the container image scanner is crucial for security.
upvoted 0 times
...

Save Cancel