Online KCSA Practice TestMore Linux-Foundation Products >

Free Linux-Foundation KCSA Exam Dumps Questions

Linux-Foundation KCSA: Kubernetes and Cloud Native Security Associate (KCSA)

- Get instant access to KCSA practice exam questions

- Get ready to pass the Kubernetes and Cloud Native Security Associate (KCSA) exam right now using our Linux-Foundation KCSA exam package, which includes Linux-Foundation KCSA practice test plus an Linux-Foundation KCSA Exam Simulator.

- The best online KCSA exam study material and preparation tool is here.

4.5 
(9480 ratings)

Question 1

What information is stored in etcd?

Correct Answer:A
KCSA dumps exhibit etcdis Kubernetes??key-value storeforcluster state.
KCSA dumps exhibit Stores: ConfigMaps, Secrets, Pod definitions, Deployments, RBAC policies, and metadata.
KCSA dumps exhibit Exact extract (Kubernetes Docs – etcd):
KCSA dumps exhibit ??etcd is a consistent and highly-available key-value store used as Kubernetes?? backing store for all cluster data.??
KCSA dumps exhibit Clarifications:
KCSA dumps exhibit B: Logs/metrics are handled by logging/monitoring solutions, not etcd.
KCSA dumps exhibit C: Secrets may be stored here but encoded in base64, not specifically "usernames/passwords" as primary use.
KCSA dumps exhibit D: Persistent Volumes are external storage, not stored in etcd.
References:
Kubernetes Docs — etcd: https://kubernetes.io/docs/concepts/overview/components/#etcd

Question 2

By default, in a Kubeadm cluster, which authentication methods are enabled?

Correct Answer:C
In akubeadm cluster, by default the API server enables several authentication mechanisms:
X509 Client Certs: Used for authenticating kubelets, admins, and control-plane components.
Bootstrap Tokens: Temporary credentials used for node bootstrap/joining clusters.
Service Account Tokens: Used by workloads in pods to authenticate with the API server.
Exact extract (Kubernetes Docs – Authentication):
"Kubernetes uses client certificates, bearer tokens, an authenticating proxy, or HTTP basic auth to authenticate API requests."
"Bootstrap tokens are a simple bearer token that is meant to be used when creating new clusters or joining new nodes to an existing cluster."
"Service accounts are special accounts that provide an identity for processes that run in a Pod."
References:
Kubernetes Docs — Authentication: https://kubernetes.io/docs/reference/access-authn-authz/authentication/
Kubeadm — TLS Bootstrapping: https://kubernetes.io/docs/reference/access-authn-authz/bootstrap-tokens/

Question 3

Why mightNetworkPolicyresources have no effect in a Kubernetes cluster?

Correct Answer:B
NetworkPolicies define how Pods can communicate with each other and external endpoints.
However, Kubernetes itselfdoes not enforce NetworkPolicy. Enforcement depends on theCNI plugin
used (e.g., Calico, Cilium, Kube-Router, Weave Net).
If a cluster is using a network plugin that does not support NetworkPolicies, then creating NetworkPolicy objects hasno effect.
References:
Kubernetes Documentation – Network Policies
CNCF Security Whitepaper – Platform security section: notes that security enforcement relies on CNI capabilities.

Question 4

A cluster administrator wants to enforce the use of a different container runtime depending on the application a workload belongs to.

Correct Answer:D
KCSA dumps exhibitKubernetes supports workload-specific runtimes viaRuntimeClass.
KCSA dumps exhibitAmutating admission controllercan enforce this automatically by:
KCSA dumps exhibitIntercepting workload creation requests.
KCSA dumps exhibitModifying the Pod spec to set runtimeClassName based on labels or policies.
KCSA dumps exhibitIncorrect options:
(A) Manual modification is not scalable or secure.
(B) kube-apiserver cannot enforce per-application runtime policies.
(C) A validating webhook can onlyreject, not modify, the runtime.
[References:, Kubernetes Documentation – RuntimeClass, CNCF Security Whitepaper – Admission controllers for enforcing runtime policies., ]

Question 5

Given a standard Kubernetes cluster architecture comprising a single control plane node (hosting bothetcdand the control plane as Pods) and three worker nodes, which of the following data flows crosses atrust boundary?

Correct Answer:B
KCSA dumps exhibit Trust boundariesexist where data flows between different security domains.
KCSA dumps exhibit In Kubernetes:
KCSA dumps exhibit Communication between thekubelet (node agent)and theAPI Server (control plane)crosses the
node-to-control-plane trust boundary.
KCSA dumps exhibit (A) Kubelet to container runtime is local, no boundary crossing.
KCSA dumps exhibit (C) Kubelet does not communicate directly with the controller manager.
KCSA dumps exhibit (D) API server does not talk directly to the container runtime; it delegates to kubelet.
KCSA dumps exhibit Therefore, (B) is the correct trust boundary crossing flow.
References:
CNCF Security Whitepaper – Kubernetes Threat Model: identifies node-to-control-plane communications (kubelet # API Server) as crossing trust boundaries.
Kubernetes Documentation – Cluster Architecture

Question 6

In the event that kube-proxy is in a CrashLoopBackOff state, what impact does it have on the Pods running on the same worker node?

Correct Answer:A
kube-proxy:manages cluster network routing rules (via iptables or IPVS). It enables Pods to communicate with Services and Pods across nodes.
If kube-proxy fails (CrashLoopBackOff), service IP routing and cluster-wide pod-to-pod networking breaks. Local Pod-to-Pod communication within the same node may still work, butcross-node communication fails.
Exact extract (Kubernetes Docs – kube-proxy):
"kube-proxy maintains network rules on nodes. These rules allow network communication to Pods from network sessions inside or outside of the cluster."
[References:, Kubernetes Docs — kube-proxy: https://kubernetes.io/docs/reference/command-line-tools-reference/kube-proxy/, ]

START KCSA EXAM