Kubernetes: Ultimate Guide Interview Question-Answer

Q.1 Which of these commands can be used to create configMaps?

       A. kubectl add configmap <name> <source>

       B. kubectl create configmap <name> <source>

       C. kubectl apply configmap <source><name>

       D. None of the options

Ans : kubectl create configmap <name> <source>


Q.2 Command used to create ConfigMaps of “port=8000” is

       A. kubectl create configmap env-map –literal=port=”8000”

       B. kubectl create configmap env-map –from-literal=port=”8000”

       C. kubectl add configmap env-map –literal=port=”8000”

       D. None of the options

Ans : kubectl create configmap env-map –from-literal=port=”8000”


Q.3 ConfigMaps can not be created from?

       A. files

       B. Directories

       C. literals

       D. None of the options

Ans : None of the options


Q.4 Pods Volumes are persistent though out the life cycle of a cluster.

       A. True

       B. False

Ans : False


Q.5 Pods provide volumes to containers.

       A. True

       B. False

Ans : True


Q.6 ConfigMaps help to couple data tightly into application logic.

       A. True

       B. False

Ans : False


Q.7 Command used to create ConfigMaps from file “fresco.ids” is.

       A. kubectl create configmap fresco-config –from-fl=fresco.ids

       B. kubectl create configmap fresco-config fresco.ids

       C. kubectl create configmap fresco-config –from-file=fresco.ids

       D. None of the options

Ans : kubectl create configmap fresco-config –from-file=fresco.ids


Q.8 Which of these can be used as volumes?

       A. Secrets

       B. awsElasticBlockStore

       C. azureDisk

       D. All the options

Ans : All the options


Q.9 Which of these can not be used as volumes?

       A. Secrets

       B. awsElasticBlockStore

       C. azureDisk

       D. None of the options

Ans : None of the options


Q.10 Why do we need volumes?

       A. Persistence

       B. Kubernetes pods are mortal and persistence

       C. Kubernetes pods are mortal

       D. None of the options

Ans : Kubernetes pods are mortal and persistence


Q.11 ConfigMaps can be created from?

       A. Directories

       B. literals

       C. files

       D. All the options

Ans : All the options


Q.12 Use of volumes.

       A. Data sharing

       B. Data persistence

       C. both data persistence and sharing

       D. None of the options

Ans : both data persistence and sharing


Q.13 Multiple nodes can be connected to same volume.

       A. True

       B. False

Ans : True


Q.14 ConfigMaps can be used as Volumes.

       A. True

       B. False

Ans : True


Q.15 It is not possible to pass configmaps as environmental variables.

       A. True

       B. False

Ans : False


Q.16 ConfigMaps help to couple data tightly into application logic.

       A. True

       B. False

Ans : False


Q.17 Secrets can be created from yaml definition as well.

       A. True

       B. False

Ans : True


Q.18 It is mandatory to create ConfigMaps before using them in pod definition.

       A. True

       B. False

Ans : True


Q.19 “stringData” field in secret definition is used to _____

       A. encrypt strngs

       B. pass strings to kubernetes master

       C. encode secret automatically

       D. None of the options

Ans : pass strings to kubernetes master


Q.20 Persistent Volumes are provided by ________.

       A. pods

       B. Kubernetes master

       C. nodes

       D. admin

Ans : admin


Q.21 To created Secrets manually you need to _________.

       A. encrypt data before passing

       B. Encode data to base64

       C. None of the options

Ans : Encode data to base64


Q.22 Which of these abstractions is used directly by pods and defined as a part of pod definition.

       A. Persistent Volume Claim

       B. Persistent Volume

       C. both persistent volume and volume claim

       D. None of the options

Ans : both persistent volume and volume claim


Q.23 Process of verifying the user is known as ________.

       A. Admin management

       B. Authorization

       C. Access Control

       D. Authentication

Ans : Authentication


Q.24 Which command is used to start minikube with “RBAC” enabled?

       A. minikube start –extra-config=apiserver.Authorization.Mode=RBAC

       B. minikube start –extra-config=Authorization.Mode=RBAC

       C. minikube start RBAC=true

       D. minikube start –Authorization.Mode=RBAC

Ans : minikube start –extra-config=apiserver.Authorization.Mode=RBAC


Q.25 “configMapKeyRef” in pod definition takes following arguments.

       A. name and labels

       B. name and key

       C. key and value

       D. None of the options

Ans : name and key


Q.26 Service accounts are usually used by______

       A. processes

       B. Users

       C. kubernetes nodes

       D. None of the options

Ans : kubernetes nodes


Q.27 Prometheus uses this endpoint to collect data from pods.

       A. /data

       B. /metric

       C. /metrics

       D. /

Ans : /metric


Q.28 Storage classes are use to provide?

       A. constant provisioning

       B. dynamic provisioning

       C. static provisioning

       D. structural provisioning

Ans : constant provisioning


Q.29 Prometheus is a ______.

       A. Kubernetes node

       B. Monitoring tool

       C. Kubernetes native metric tool

       D. None of the options

Ans : Monitoring tool


Q.30 This is a Valid “subject”.

       A. Kube API

       B. User

       C. Nodes

       D. Processes

Ans : Kube API


Q.31 Is it possible to mount secrets to pods?

       A. True

       B. False

Ans : True


Q.32 PVCs consume Pvs.

       A. True

       B. False

Ans : True


Q.33 Which of these authorization modes is supported by kubernetes?

       A. Node

       B. RBAC

       C. ABAB

       D. All the options

Ans : All the options


Q.34 Service accounts created by kubernetes automatically for each namespace is called__________.

       A. Kube-svc

       B. defect

       C. Kube-account

       D. default

Ans : default


Q.35 Volume Provisioning types are?

       A. static and structural

       B. static and constant

       C. static and dynamic

       D. structural and dynamic

Ans : static and dynamic


Q.36 We use following command to enter inside a running container.

       A. kubectl exec <pod name> sh

       B. kubectl run -it <pod name> sh

       C. kubectl exec -it <pod name> sh

       D. None of the options

Ans : kubectl exec -it <pod name> sh


Q.37 You can create secrets from these/this source(s).

       A. files

       B. Directories

       C. both files and directories

       D. None of the options

Ans : both files and directories


Q.38 This defines rights to be given to a subject.

       A. Role

       B. RoleBinding

       C. None of the options

Ans : RoleBinding


Leave a Comment