Q.1 Which of these commands can be used to create configMaps?
A. kubectl add configmap <name> <source>
B. kubectl create configmap <name> <source>
C. kubectl apply configmap <source><name>
D. None of the options
Ans : kubectl create configmap <name> <source>
Q.2 Command used to create ConfigMaps of “port=8000” is
A. kubectl create configmap env-map –literal=port=”8000”
B. kubectl create configmap env-map –from-literal=port=”8000”
C. kubectl add configmap env-map –literal=port=”8000”
D. None of the options
Ans : kubectl create configmap env-map –from-literal=port=”8000”
Q.3 ConfigMaps can not be created from?
A. files
B. Directories
C. literals
D. None of the options
Ans : None of the options
Q.4 Pods Volumes are persistent though out the life cycle of a cluster.
A. True
B. False
Ans : False
Q.5 Pods provide volumes to containers.
A. True
B. False
Ans : True
Q.6 ConfigMaps help to couple data tightly into application logic.
A. True
B. False
Ans : False
Q.7 Command used to create ConfigMaps from file “fresco.ids” is.
A. kubectl create configmap fresco-config –from-fl=fresco.ids
B. kubectl create configmap fresco-config fresco.ids
C. kubectl create configmap fresco-config –from-file=fresco.ids
D. None of the options
Ans : kubectl create configmap fresco-config –from-file=fresco.ids
Q.8 Which of these can be used as volumes?
A. Secrets
B. awsElasticBlockStore
C. azureDisk
D. All the options
Ans : All the options
Q.9 Which of these can not be used as volumes?
A. Secrets
B. awsElasticBlockStore
C. azureDisk
D. None of the options
Ans : None of the options
Q.10 Why do we need volumes?
A. Persistence
B. Kubernetes pods are mortal and persistence
C. Kubernetes pods are mortal
D. None of the options
Ans : Kubernetes pods are mortal and persistence
Q.11 ConfigMaps can be created from?
A. Directories
B. literals
C. files
D. All the options
Ans : All the options
Q.12 Use of volumes.
A. Data sharing
B. Data persistence
C. both data persistence and sharing
D. None of the options
Ans : both data persistence and sharing
Q.13 Multiple nodes can be connected to same volume.
A. True
B. False
Ans : True
Q.14 ConfigMaps can be used as Volumes.
A. True
B. False
Ans : True
Q.15 It is not possible to pass configmaps as environmental variables.
A. True
B. False
Ans : False
Q.16 ConfigMaps help to couple data tightly into application logic.
A. True
B. False
Ans : False
Q.17 Secrets can be created from yaml definition as well.
A. True
B. False
Ans : True
Q.18 It is mandatory to create ConfigMaps before using them in pod definition.
A. True
B. False
Ans : True
Q.19 “stringData” field in secret definition is used to _____
A. encrypt strngs
B. pass strings to kubernetes master
C. encode secret automatically
D. None of the options
Ans : pass strings to kubernetes master
Q.20 Persistent Volumes are provided by ________.
A. pods
B. Kubernetes master
C. nodes
D. admin
Ans : admin
Q.21 To created Secrets manually you need to _________.
A. encrypt data before passing
B. Encode data to base64
C. None of the options
Ans : Encode data to base64
Q.22 Which of these abstractions is used directly by pods and defined as a part of pod definition.
A. Persistent Volume Claim
B. Persistent Volume
C. both persistent volume and volume claim
D. None of the options
Ans : both persistent volume and volume claim
Q.23 Process of verifying the user is known as ________.
A. Admin management
B. Authorization
C. Access Control
D. Authentication
Ans : Authentication
Q.24 Which command is used to start minikube with “RBAC” enabled?
A. minikube start –extra-config=apiserver.Authorization.Mode=RBAC
B. minikube start –extra-config=Authorization.Mode=RBAC
C. minikube start RBAC=true
D. minikube start –Authorization.Mode=RBAC
Ans : minikube start –extra-config=apiserver.Authorization.Mode=RBAC
Q.25 “configMapKeyRef” in pod definition takes following arguments.
A. name and labels
B. name and key
C. key and value
D. None of the options
Ans : name and key
Q.26 Service accounts are usually used by______
A. processes
B. Users
C. kubernetes nodes
D. None of the options
Ans : kubernetes nodes
Q.27 Prometheus uses this endpoint to collect data from pods.
A. /data
B. /metric
C. /metrics
D. /
Ans : /metric
Q.28 Storage classes are use to provide?
A. constant provisioning
B. dynamic provisioning
C. static provisioning
D. structural provisioning
Ans : constant provisioning
Q.29 Prometheus is a ______.
A. Kubernetes node
B. Monitoring tool
C. Kubernetes native metric tool
D. None of the options
Ans : Monitoring tool
Q.30 This is a Valid “subject”.
A. Kube API
B. User
C. Nodes
D. Processes
Ans : Kube API
Q.31 Is it possible to mount secrets to pods?
A. True
B. False
Ans : True
Q.32 PVCs consume Pvs.
A. True
B. False
Ans : True
Q.33 Which of these authorization modes is supported by kubernetes?
A. Node
B. RBAC
C. ABAB
D. All the options
Ans : All the options
Q.34 Service accounts created by kubernetes automatically for each namespace is called__________.
A. Kube-svc
B. defect
C. Kube-account
D. default
Ans : default
Q.35 Volume Provisioning types are?
A. static and structural
B. static and constant
C. static and dynamic
D. structural and dynamic
Ans : static and dynamic
Q.36 We use following command to enter inside a running container.
A. kubectl exec <pod name> sh
B. kubectl run -it <pod name> sh
C. kubectl exec -it <pod name> sh
D. None of the options
Ans : kubectl exec -it <pod name> sh
Q.37 You can create secrets from these/this source(s).
A. files
B. Directories
C. both files and directories
D. None of the options
Ans : both files and directories
Q.38 This defines rights to be given to a subject.
A. Role
B. RoleBinding
C. None of the options
Ans : RoleBinding