Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

KCNA Kubernetes Certified Network Administrator #2

Rating
-
Sold
-
Pages
10
Uploaded on
05-02-2025
Written in
2024/2025

KCNA Kubernetes Certified Network Administrator #2

Institution
Course

Content preview

KCNA Kubernetes Certified Network Administrator
#2

1. In the context of cloud native environments, which persona primarily focus- es on optimizing cloud costs and
financial management?: FinOps
2. In Kubernetes, which command is used to run another command within an existing container?: kubectl exec
3. Which of these technologies is incompatible with the Kubernetes Container Runtime Interface (CRI)?:
VirtualBox
4. What is true about Pod-to-Pod communication within the same node in Kubernetes?: Pods use direct, NAT-less
networking for communication on the same node
5. In Kubernetes, which two types of resources are used to expose appli- cations to external traffic,
including options like ClusterIP, NodePort, and LoadBalancer?: Services and Ingress
6. In Kubernetes, which object is most suitable for deploying stateless appli- cations?: Deployment
7. Which of these options is a Service Mesh implementation specifically de- signed for Kubernetes, known for
its simplicity and ease of use?: Linkerd
8. In Kubernetes, which feature is effective for managing costs by allowing for the categorisation and
organisation of resources?: Labels
9. What is the reference implementation of the Open Container Initiative (OCI) runtime specification?: runc
10.For how long is the Kubernetes API guaranteed to be backward compatible following a release?: 1 year
11.What layer of a software architecture is primarily targeted by OpenTracing and OpenTelemetry for
monitoring and observability?: Application
12.In Kubernetes, which component is primarily responsible for managing a Node?: Kubelet
13.In cloud computing, which approach is best suited for simultaneously managing security threats and
optimising costs by identifying unusual activ- ities?: Cloud Anomaly Detection
14.In a Kubernetes cluster, which component is responsible for routing traffic for services and managing IP
rules?: Kube-Proxy
15.What are the three pillars of observability in a software system?: Logs, Metrics, Traces
16.What is the primary function of the kubectl top command in Kubernetes?-
: To display the resource usage of pods and nodes in the cluster
17.What is the primary purpose of kube-state-metrics in a Kubernetes clus- ter?: To generate and expose
cluster state data
18.In telemetry, which entity is primarily used to record and analyse the path that a request takes through
various services in a distributed system?: Traces






, KCNA Kubernetes Certified Network Administrator
#2

19.In a Kubernetes cluster, which component runs on every node to manage the lifecycle of containers?:
Kubelet
20.Which kubectl command is used to view the logs of a terminated container in a multi-container pod in
Kubernetes?: kubectl logs [pod-name] -c [contain-
er-name] -p
21.Which open-source tool is specifically designed for assessing the security posture of Kubernetes clusters
according to NSA and CISA guidelines?: - KubeScape
22.In the context of etcd used in Kubernetes, what is the significance of the
1.5MB size limit for etcd?: It is the recommended maximum size for an individual value stored in etcd
23.In a cloud-native environment, which persona is typically responsible for managing Service Level
Agreements (SLAs), Service Level Indicators (SLIs), and Service Level Objectives (SLOs)?: Site Reliability
Engineer (SRE)
24.Which Kubernetes distribution, known for its minimal resource require- ments and ease of installation, is
particularly well-suited for IoT and edge computing environments?: k3s
25. When a Pod is created in Kubernetes without specifying a Service Account, which default Service
Account is used?: default
26.In the context of Cloud Native Security, what is the correct order for the 4C's framework?: Cloud,
Clusters, Containers, Cloud
27.Which architectural pattern in cloud computing allows you to build and run applications and services
without managing infrastructure, typically billed based on usage rather than pre-allocated capacity?: Serverless
28.Which software is widely used in Kubernetes environments for cloud-na- tive storage orchestration?: Rook
29.In a Kubernetes environment, which software is widely used as a light- weight proxy to handle the traffic
management between microservices?: En- voy
30.In Kubernetes, which security-focused tool is commonly used for runtime security monitoring and detection
of anomalous activities within containers and pods?: Falco
31.Which of the following is a lightweight container runtime specifically de- signed for Kubernetes, conforming
to the Container Runtime Interface (CRI)?-
: CRI-O
32.Which open-source storage platform offers integrated block, file, and ob- ject storage, making it a versatile
choice for distributed environments?: Ceph
33.In Kubernetes, what is Ephemeral Storage with respect to a Pod?: Tempo- rary storage assigned to a Pod,
which is deleted when the Pod is removed

Written for

Course

Document information

Uploaded on
February 5, 2025
Number of pages
10
Written in
2024/2025
Type
Exam (elaborations)
Contains
Unknown

Subjects

$11.69
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
smartchoices Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
36
Member since
5 year
Number of followers
5
Documents
4499
Last sold
2 weeks ago

4.8

9 reviews

5
7
4
2
3
0
2
0
1
0

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions