1.
___________ runs on each node and ensures containers are running in a pod.
Correct Answer
A. Kubelet
Explanation
The kubelet is responsible for running containers on each node in a Kubernetes cluster. It ensures that the containers specified in a pod are running and healthy. It communicates with the Kubernetes API server to receive instructions on which containers to run and monitors their status. The kubelet also performs tasks such as pulling container images, mounting volumes, and managing networking for the containers. Therefore, the kubelet is the component that runs on each node and ensures containers are running in a pod.
2.
_______ manages the assigning nodes to pods depending on resource availability.
Correct Answer
C. Scheduler
Explanation
The scheduler is responsible for managing the assignment of nodes to pods based on the availability of resources. It evaluates the resource requirements of each pod and determines the best node to schedule it on. This ensures efficient utilization of resources and optimal performance of the cluster.
3.
As soon a service starts, .......... daemon running on each node add a set of environment variables on the pod for each active service.
Correct Answer
B. Kubelet
Explanation
The kubelet is responsible for managing the state of each node in a Kubernetes cluster. When a service starts, the kubelet running on each node adds a set of environment variables on the pod for each active service. These environment variables provide important information and configuration details for the service to function correctly within the cluster.
4.
Replication Controllers and Deployment Controllers are part of
Correct Answer
C. Master Controller Manager
Explanation
The Master Controller Manager is responsible for managing different controllers in Kubernetes, such as Replication Controllers and Deployment Controllers. These controllers are crucial for ensuring the desired state of the cluster, managing the scaling and replication of pods, and handling updates and rollbacks. Therefore, the Master Controller Manager is the correct option as it encompasses the overall management of controllers in Kubernetes.
5.
___________________ is a special namespace that is used for special purposes like bootstrapping a cluster.
Correct Answer
A. Kube-public
Explanation
The kube-public namespace is a special namespace used for special purposes like bootstrapping a cluster. It is a publicly readable namespace that contains resources that should be accessible to all users and services in the cluster. This namespace is commonly used for storing cluster-wide resources that need to be accessed by multiple users or services, such as cluster-wide configuration maps or public secrets.
6.
Kubernetes uses _______________________ to connect to path 2 providers to offload the authentication to external services.
Correct Answer
E. Both A and D
Explanation
Both Option A, "Webhook Token Authentication," and Option D, "Authentication Proxy," are valid concepts in the context of Kubernetes authentication. They represent different approaches to handling authentication and can be used in different scenarios.
Webhook Token Authentication (Option A): This approach involves using webhooks to connect to external identity providers and validate authentication tokens. It allows Kubernetes to delegate authentication to external services.
Authentication Proxy (Option D): An authentication proxy can be used to handle authentication requests on behalf of Kubernetes. It may interact with external identity providers and enhance the authentication process.
The choice between these options may depend on specific use cases, requirements, and the desired architecture for handling authentication in a Kubernetes cluster. Both approaches can be part of a Kubernetes authentication setup, depending on the implementation chosen by the cluster administrator.
7.
To program additional authentication logic besides available authenticator modules, _______________ can be used.
Correct Answer
B. Authentication Proxy
Explanation
To program additional authentication logic besides available authenticator modules, an Authentication Proxy can be used. An Authentication Proxy acts as an intermediary between the user and the authentication system, allowing for the implementation of custom authentication logic. It can authenticate users based on various factors such as user credentials, device information, or location, and then communicate with the authentication system to verify the user's identity. By using an Authentication Proxy, developers have the flexibility to add their own authentication logic on top of the existing authenticator modules.
8.
Kubernetes is written in
Correct Answer
B. Go
Explanation
Kubernetes is written in Go. Go, also known as Golang, is a programming language developed by Google. It is known for its simplicity, efficiency, and strong support for concurrency. Go's fast execution speed and built-in features for networking and parallelism make it an ideal choice for developing highly scalable and efficient systems like Kubernetes. Additionally, Go's strong type system and garbage collection help ensure the reliability and stability of the Kubernetes codebase.
9.
An abstraction in Kubernetes that defines a logical set of pods and a policy to access them.
Correct Answer
B. Service
Explanation
A service in Kubernetes is an abstraction that defines a logical set of pods and a policy to access them. It acts as a stable endpoint to connect to a group of pods, providing load balancing and service discovery functionality. By defining a service, applications can easily communicate with each other without needing to know the specific IP addresses or ports of individual pods.
10.
To create a new deployment in Kubernetes, use the command.
Correct Answer
C. Kubectl run
Explanation
The correct answer is "kubectl run" because this command is used to create a new deployment in Kubernetes. It allows users to run a particular image on the cluster and manage it as a deployment. The "kubectl run" command is commonly used to quickly create and deploy containers in Kubernetes.
11.
The command to create Kubernetes service is
Correct Answer
A. Kubectl expose
Explanation
The correct answer is "kubectl expose" because this command is used to create a Kubernetes service. It allows the user to expose a deployment, replication controller, or pod as a new service. This command is essential for setting up networking within a Kubernetes cluster and making the service accessible to other pods or external clients.
12.
Kube-Episerver on Kubernetes master is designed to scale.
Correct Answer
B. Horizontally
Explanation
The correct answer is horizontally. This means that the Kube-Episerver on the Kubernetes master is designed to scale by adding more instances of the Kube-Episerver horizontally. Horizontal scaling involves adding more machines or instances to distribute the workload and increase capacity. This allows for better performance and handling of increased traffic or demand in a Kubernetes cluster.
13.
Following k8s resources do not associate with any namespace.
Correct Answer(s)
B. PersistentVolumes
D. Nodes
Explanation
PersistentVolumes and Nodes do not associate with any namespace in Kubernetes.
PersistentVolumes are storage resources that exist independently of any namespace and can be accessed by any pod in the cluster. They provide a way to store data that needs to persist beyond the lifetime of a pod.
Nodes, on the other hand, represent the worker machines in the cluster and are responsible for running pods. They are not associated with any specific namespace as they are part of the cluster infrastructure rather than an application or service running within a namespace.
14.
The Service Type _____________ works only if your cluster is setup to work with a cloud provider.
Correct Answer
C. LoadBalancer
Explanation
The LoadBalancer service type works only if your cluster is set up to work with a cloud provider. This is because a LoadBalancer service type requires the cloud provider's load balancer to distribute traffic to the service. If the cluster is not set up with a cloud provider, the load balancer functionality will not be available, and therefore the LoadBalancer service type cannot be used.
15.
This volume type can be used to share contents within containers in a pod, but will not persist beyond the life of a pod.
Correct Answer
A. EmptyDir
Explanation
Explanation: The emptyDir volume type in Kubernetes is designed to share content among containers within a pod. This volume is created when the pod starts and is deleted when the pod stops or is terminated. It does not persist beyond the lifecycle of the pod, making it suitable for temporary data storage or for sharing data between containers in the same pod. This characteristic makes emptyDir ideal for use cases where data persistence is not required after the pod's lifecycle ends.
16.
__________________ is responsible for health check of the pods running on individual nodes
Correct Answer
D. Kubelet
Explanation
The kubelet is responsible for the health check of the pods running on individual nodes. It is an agent that runs on each node in the cluster and ensures that the containers in the pods are running and healthy. The kubelet communicates with the Kubernetes API server to receive instructions about which pods to run and monitor. It also reports the status of the pods back to the API server.
17.
Cronjobs in Kubernetes run in
Correct Answer
A. UTC only
Explanation
Cronjobs in Kubernetes run in UTC only. This means that the scheduled tasks will be executed based on Coordinated Universal Time, which is a standardized time used worldwide. The use of UTC ensures consistency and avoids any confusion caused by different time zones.
18.
_________ service is automatically created for you k8s cluster creation and takes care of the internal routing of the cluster.
Correct Answer
B. ClusterIP
Explanation
A ClusterIP service is automatically created for you during k8s cluster creation and it takes care of the internal routing of the cluster. ClusterIP is a type of service in Kubernetes that assigns a virtual IP address to a set of pods. This IP address allows communication between the pods within the cluster, but it is not accessible from outside the cluster. ClusterIP services are used for internal communication and are not exposed to the external network.