exam questions

Exam KCNA All Questions

View all questions & answers for the KCNA exam

Exam KCNA topic 1 question 86 discussion

Actual exam question from Linux Foundation's KCNA
Question #: 86
Topic #: 1
[All KCNA Questions]

Which of the following capabilities are you allowed to add to a container using the Restricted policy?

  • A. CHOWN
  • B. SYS_CHROOT
  • C. SETUID
  • D. NET_BIND_SERVICE
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
shahy0
1 week, 1 day ago
Selected Answer: D
The Restricted policy in Kubernetes is designed to enforce strict security constraints on containers, but it does allow certain capabilities that are considered safe and necessary for common container operations. Among the capabilities listed, NET_BIND_SERVICE is typically allowed under the Restricted policy because it is often needed for binding to network ports below 1024, which is a common requirement for many applications
upvoted 1 times
...
d759fb3
2 weeks, 4 days ago
Selected Answer: B
The Restricted policy in Kubernetes is designed to be very secure, so it only allows a minimal set of capabilities. SYS_CHROOT is considered safe enough because: - It doesn't give elevated privileges - It's often needed for container operations - It can't be easily exploited
upvoted 1 times
...
yoyo2424
1 month, 2 weeks ago
Selected Answer: A
In Kubernetes, the Restricted policy is a security context that enforces tight constraints on what a container can do. When using the Restricted policy, the capabilities granted to containers are minimal and restricted to those necessary for basic functionality. The CHOWN capability is typically allowed in restricted environments because it is essential for many applications to modify file ownership within the container.
upvoted 1 times
...
2211094
1 month, 3 weeks ago
Selected Answer: D
D. NET_BIND_SERVICE The Restricted policy in Kubernetes is designed to limit the capabilities that can be added to containers to enhance security. Among the options provided, NET_BIND_SERVICE is the capability allowed under the Restricted policy.
upvoted 1 times
...
abitwrong
3 months ago
Selected Answer: D
Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability. Reference: https://kubernetes.io/docs/concepts/security/pod-security-standards/#:~:text=add%20back%20the-,NET_BIND_SERVICE,-capability.%20This
upvoted 1 times
...
Andrei_Z
5 months, 2 weeks ago
Selected Answer: D
https://kubernetes.io/docs/concepts/security/pod-security-standards/ Capabilities (v1.22+) Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability. This is Linux only policy in v1.25+ (.spec.os.name != "windows")
upvoted 2 times
...
alex78
10 months, 1 week ago
Selected Answer: D
https://docs.openshift.com/dedicated/authentication/managing-security-context-constraints.html
upvoted 3 times
...
fabianvera19822
10 months, 2 weeks ago
Option : A
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago