Logo Passei Direto
Material
Study with thousands of resources!

Text Material Preview

Kubernetes and Cloud
Native Security
Associate (KCSA)
Version: Demo
[ Total Questions: 10]
Web: www.dumpscafe.com
Email: support@dumpscafe.com
Linux Foundation
KCSA
https://www.dumpscafe.com
https://www.dumpscafe.com/Braindumps-KCSA.html
IMPORTANT NOTICE
Feedback
We have developed quality product and state-of-art service to ensure our customers interest. If you have any 
suggestions, please feel free to contact us at feedback@dumpscafe.com
Support
If you have any questions about our product, please provide the following items:
exam code
screenshot of the question
login id/email
please contact us at and our technical experts will provide support within 24 hours.support@dumpscafe.com
Copyright
The product of each order has its own encryption code, so you should use it independently. Any unauthorized 
changes will inflict legal punishment. We reserve the right of final explanation for this statement.
Linux Foundation - KCSAPass Exam
1 of 8Verified Solution - 100% Result
A. 
B. 
C. 
D. 
Category Breakdown
Category Number of Questions
Kubernetes Security Fundamentals 3
Kubernetes Cluster Component Security 2
Kubernetes Threat Model 3
Kubernetes Threat Model / Cluster Resilience 1
Compliance and Security Frameworks 1
TOTAL 10
Question #:1 - [Kubernetes Security Fundamentals]
A cluster administrator wants to enforce the use of a different container runtime depending on the application 
a workload belongs to.
By manually modifying the container runtime for each workload after it has been created.
By modifying the kube-apiserver configuration file to specify the desired container runtime for each 
application.
By configuring a webhook that verifies the container runtime based on validating admission controller
the application label and rejects requests that do not comply.
By configuring a webhook that intercepts new workload creation mutating admission controller
requests and modifies the container runtime based on the application label.
Answer: D
Kubernetes supports workload-specific runtimes via .RuntimeClass
A can enforce this automatically by:mutating admission controller
Intercepting workload creation requests.
Modifying the Pod spec to set runtimeClassName based on labels or policies.
Incorrect options:
(A) Manual modification is not scalable or secure.
(B) kube-apiserver cannot enforce per-application runtime policies.
(C) A validating webhook can only , not modify, the runtime.reject
References:
Kubernetes Documentation – RuntimeClass
Linux Foundation - KCSAPass Exam
2 of 8Verified Solution - 100% Result
A. 
B. 
C. 
D. 
A. 
B. 
C. 
D. 
CNCF Security Whitepaper – Admission controllers for enforcing runtime policies.
Question #:2 - [Kubernetes Security Fundamentals]
In which order are the run while the Kubernetes API server validating and mutating admission controllers
processes a request?
The order of execution varies and is determined by the cluster configuration.
Validating admission controllers run before mutating admission controllers.
Validating and mutating admission controllers run simultaneously.
Mutating admission controllers run before validating admission controllers.
Answer: D
The in Kubernetes:admission control flow
Mutating admission controllersrun first and can modify incoming requests.
Validating admission controllersrun after mutations to ensure the final object complies with 
policies.
This ensures policies validate the .final, mutated object
References:
Kubernetes Documentation – Admission Controllers
CNCF Security Whitepaper – Admission control workflow.
Question #:3 - [Kubernetes Cluster Component Security]
Which technology can be used to apply security policy for internal cluster traffic at the application layer of 
the network?
Network Policy
Ingress Controller
Container Runtime
Service Mesh
Answer: D
Explanation
Linux Foundation - KCSAPass Exam
3 of 8Verified Solution - 100% Result
A. 
B. 
C. 
D. 
Service Mesh (e.g., Istio, Linkerd, Consul):operates at , enforcing policies Layer 7 (application layer)
like mTLS, authorization, and routing between services.
NetworkPolicy:works at , not Layer 7.Layer 3/4 (IP/port)
Ingress Controller:handles external traffic ingress, not internal service-to-service traffic.
Container Runtime:responsible for running containers, not enforcing application-layer security.
Exact extract (Istio docs):
“Istio provides security by enforcing authentication, authorization, and encryption of service-to-
”service communication.
References:
Kubernetes Docs — Network Policies: https://kubernetes.io/docs/concepts/services-networking/network-
policies/
Istio Security Docs: https://istio.io/latest/docs/concepts/security/
Question #:4 - [Kubernetes Security Fundamentals]
How can a user enforce the without third-party tools?Pod Security Standard
Through implementing Kyverno or OPA Policies.
Use the PodSecurity admission controller.
It is only possible to enforce the Pod Security Standard with additional tools within the cloud native 
ecosystem.
No additional measures have to be taken to enforce the Pod Security Standard.
Answer: B
The (built-in as of Kubernetes v1.23+) enforces the Pod Security PodSecurity admission controller
Standards (Privileged, Baseline, Restricted).
Enforcement is namespace-scoped and configured through .namespace labels
Incorrect options:
(A) Kyverno/OPA are external policy tools (useful but not required).
(C) Not true, PodSecurity admission provides native enforcement.
(D) Enforcement requires explicit configuration, not automatic.
Linux Foundation - KCSAPass Exam
4 of 8Verified Solution - 100% Result
A. 
B. 
C. 
D. 
A. 
References:
Kubernetes Documentation – Pod Security Admission
CNCF Security Whitepaper – Policy enforcement and admission control.
Question #:5 - [Kubernetes Threat Model]
Which of the following is a valid security risk caused by having no egress controls in a Kubernetes cluster?
Denial of Service
Data exfiltration
Increased attack surface
Unauthorized access to external resources
Answer: B
Egress NetworkPoliciesrestrict outbound traffic from Pods.
Without egress restrictions, a compromised Pod could exfiltrate sensitive data (secrets, logs, customer 
data) to an attacker-controlled server.
Exact extract (Kubernetes Docs – Network Policies):
“Egress rules control outbound connections from Pods. Without such restrictions, 
”compromised workloads can connect freely to external endpoints.
Other options clarified:
A: DoS is more about flooding, not egress absence.
C: “Increased attack surface” is vague but not the main risk.
D: True in a sense, but the precise and most common risk is .data exfiltration
References:
Kubernetes Docs — Network Policies: https://kubernetes.io/docs/concepts/services-networking/network-
policies/
Question #:6 - [Kubernetes Threat Model]
In order to reduce the attack surface of the Scheduler, which default parameter should be set to false?
Linux Foundation - KCSAPass Exam
5 of 8Verified Solution - 100% Result
A. 
B. 
C. 
D. 
A. 
B. 
C. 
--scheduler-name
--profiling
--secure-kubeconfig
--bind-address
Answer: B
The exposes a when --profiling=true (default).kube-scheduler profiling/debugging endpoint
This can unnecessarily increase the attack surface.
Best practice: set --profiling=false in production.
Exact extract (Kubernetes Docs – kube-scheduler flags):
“ ”--profiling (default true): Enable profiling via web interface host:port/debug/pprof/.
Why others are wrong:
--scheduler-name: just identifies the scheduler, not a security risk.
--secure-kubeconfig: not a valid flag.
--bind-address: changing it limits exposure but is not the default risk parameter for profiling.
References:
Kubernetes Docs — kube-scheduler options: https://kubernetes.io/docs/reference/command-line-tools-
reference/kube-scheduler/
Question #:7 - [Kubernetes Threat Model / Cluster Resilience]
An attacker has successfully overwhelmedthe Kubernetes API server in a cluster with a single control plane 
node by flooding it with requests.
How would implementing a high-availability mode with multiple control plane nodes mitigate this attack?
By implementing network segmentation to isolate the API server from the rest of the cluster, preventing 
the attack from spreading.
By distributing the workload across multiple API servers, reducing the load on each server.
By increasing the resources allocated to the API server, allowing it to handle a higher volume of 
requests.
Linux Foundation - KCSAPass Exam
6 of 8Verified Solution - 100% Result
D. 
A. 
B. 
C. 
D. 
By implementing rate limiting and throttling mechanisms on the API server to restrict the number of 
requests allowed.
Answer: B
In , multiple API server instances run behind a load balancer.high-availability clusters
This , preventing a single API server from distributes client requests across multiple API servers
being overwhelmed.
Exact extract (Kubernetes Docs – High Availability Clusters):
“A highly available control plane runs multiple instances of kube-apiserver, typically 
fronted by a load balancer, so that if one instance fails or is overloaded, others continue 
”serving requests.
Other options clarified:
A: Network segmentation does not directly mitigate API server DoS.
C: Adding resources helps, but doesn’t solve single-point-of-failure.
D: Rate limiting is a valid mitigation but not provided by HA alone.
References:
Kubernetes Docs — Building High-Availability Clusters: https://kubernetes.io/docs/setup/production-
environment/tools/kubeadm/high-availability/
Question #:8 - [Compliance and Security Frameworks]
Which security knowledge-base focuses specifically on ?offensive tools, techniques, and procedures
MITRE ATT&CK
OWASP Top 10
CIS Controls
NIST Cybersecurity Framework
Answer: A
MITRE ATT&CKis a globally recognizedknowledge base of adversary tactics, techniques, and 
. It is focused on describing attackers use.procedures (TTPs) offensive behaviors
Linux Foundation - KCSAPass Exam
7 of 8Verified Solution - 100% Result
A. 
B. 
C. 
D. 
Incorrect options:
(B) highlights common application vulnerabilities, not attacker techniques.OWASP Top 10
(C) are defensive best practices, not offensive tools.CIS Controls
(D) provides a risk-based defensive framework, not adversary NIST Cybersecurity Framework
TTPs.
References:
MITRE ATT&CK Framework
CNCF Security Whitepaper – Threat intelligence section: references MITRE ATT&CK for describing 
attacker behavior.
Question #:9 - [Kubernetes Threat Model]
A container running in a Kubernetes cluster has permission to modify host processes on the underlying node.
What combination of privileges and capabilities is most likely to have led to this privilege escalation?
There is no combination of privileges and capabilities that permits this.
hostPID and SYS_PTRACE
hostPath and AUDIT_WRITE
hostNetwork and NET_RAW
Answer: B
hostPID:When enabled, the container shares the host’s process namespace # container can see and 
potentially interact with host processes.
SYS_PTRACE capability:Grants the container the ability to trace, inspect, and modify other processes 
(e.g., via ptrace).
Combination of hostPID + SYS_PTRACE allows a container to , attach to and modify host processes
which is a direct privilege escalation.
Other options explained:
hostPath + AUDIT_WRITE:hostPath exposes filesystem paths but does not inherently allow 
process modification.
hostNetwork + NET_RAW:grants raw socket access but only for networking, not host process 
modification.
Linux Foundation - KCSAPass Exam
8 of 8Verified Solution - 100% Result
A. 
B. 
C. 
D. 
A:Incorrect — such combinations (like B).do exist
References:
Kubernetes Docs — Configure a Pod to use hostPID: https://kubernetes.io/docs/tasks/configure-pod-container
/share-process-namespace/
Linux Capabilities man page: https://man7.org/linux/man-pages/man7/capabilities.7.html
Question #:10 - [Kubernetes Cluster Component Security]
Which other controllers are part of the kube-controller-manager inside the Kubernetes cluster?
Job controller, CronJob controller, and DaemonSet controller
Pod, Service, and Ingress controller
Namespace controller, ConfigMap controller, and Secret controller
Replication controller, Endpoints controller, Namespace controller, and ServiceAccounts controller
Answer: D
kube-controller-managerruns a set of controllers that regulate the cluster’s state.
Exact extract (Kubernetes Docs):“The kube-controller-manager runs controllers that are core to 
Kubernetes. Examples of controllers are: Node controller, Replication controller, Endpoints 
”controller, Namespace controller, and ServiceAccounts controller.
Why D is correct:All listed are actual controllers within kube-controller-manager.
Why others are wrong:
A:Job and CronJob controllers are managed by kube-controller-manager, but DaemonSet 
controller is managed by the kube-scheduler/deployment logic.
B:Pod, Service, Ingress controllers are not part of kube-controller-manager.
C:ConfigMap and Secret do not have dedicated controllers.
References:
Kubernetes Docs — kube-controller-manager: https://kubernetes.io/docs/reference/command-line-tools-
reference/kube-controller-manager/
About dumpscafe.com
dumpscafe.com was founded in 2007. We provide latest & high quality IT / Business Certification Training Exam 
Questions, Study Guides, Practice Tests.
We help you pass any IT / Business Certification Exams with 100% Pass Guaranteed or Full Refund. Especially 
Cisco, CompTIA, Citrix, EMC, HP, Oracle, VMware, Juniper, Check Point, LPI, Nortel, EXIN and so on.
View list of all certification exams: All vendors
 
 
 
We prepare state-of-the art practice tests for certification exams. You can reach us at any of the email addresses 
listed below.
Sales: sales@dumpscafe.com
Feedback: feedback@dumpscafe.com
Support: support@dumpscafe.com
Any problems about IT certification or our products, You can write us back and we will get back to you within 24 
hours.
https://www.dumpscafe.com
https://www.dumpscafe.com/allproducts.html
https://www.dumpscafe.com/Microsoft-exams.html
https://www.dumpscafe.com/Cisco-exams.html
https://www.dumpscafe.com/Citrix-exams.html
https://www.dumpscafe.com/CompTIA-exams.html
https://www.dumpscafe.com/EMC-exams.html
https://www.dumpscafe.com/ISC-exams.html
https://www.dumpscafe.com/Checkpoint-exams.html
https://www.dumpscafe.com/Juniper-exams.html
https://www.dumpscafe.com/Apple-exams.html
https://www.dumpscafe.com/Oracle-exams.html
https://www.dumpscafe.com/Symantec-exams.html
https://www.dumpscafe.com/VMware-exams.html
mailto:sales@dumpscafe.com
mailto:feedback@dumpscafe.com
mailto:support@dumpscafe.com