Skip to content
Published on

[Golden Kubestronaut] KCSA Extra 30 Practice Questions - Advanced Cloud Native Security

Authors

KCSA Extra 30 Practice Questions

These 30 additional questions cover the key KCSA exam domains: supply chain security, runtime security, zero trust networking, image verification, policy engines, and Pod security.


Question 1. SLSA Framework

What is the primary purpose of the SLSA (Supply-chain Levels for Software Artifacts) framework?

  • A) Optimizes container runtime performance
  • B) Defines security levels to ensure the integrity of the software supply chain
  • C) Manages Kubernetes cluster network policies
  • D) Reduces container image sizes
Answer and Explanation

Answer: B) Defines security levels to ensure the integrity of the software supply chain

SLSA is a security framework designed to prevent software supply chain attacks, defining security levels from Build Level 0 to Level 3. It requires provenance tracking of build processes, tamper prevention, and isolated build environments.


Question 2. Sigstore Project

Which is NOT a core component of Sigstore?

  • A) Cosign - container image signing
  • B) Fulcio - short-lived certificate issuing CA
  • C) Rekor - transparency log
  • D) Falco - runtime threat detection
Answer and Explanation

Answer: D) Falco - runtime threat detection

Sigstore consists of Cosign (image/artifact signing), Fulcio (short-lived certificate issuance for keyless signing), and Rekor (signature transparency log). Falco is a runtime security tool and a separate CNCF project.


Question 3. in-toto Framework

What does in-toto protect?

  • A) Runtime container memory access
  • B) The entire software supply chain process through layouts and links for step-by-step verification
  • C) Kubernetes API server authentication
  • D) Network traffic encryption
Answer and Explanation

Answer: B) The entire software supply chain process through layouts and links for step-by-step verification

in-toto protects the entire software supply chain process. Layouts define the expected steps of the supply chain, and link metadata records the actual execution of each step to detect tampering.


Question 4. Falco Runtime Security

What is the primary mechanism Falco uses to detect system events?

  • A) Static analysis of container images
  • B) Real-time monitoring of system calls through eBPF or kernel modules
  • C) Polling Kubernetes API for resource changes
  • D) Capturing and analyzing network packets
Answer and Explanation

Answer: B) Real-time monitoring of system calls through eBPF or kernel modules

Falco uses eBPF probes or kernel modules to monitor system calls in real-time and detects abnormal behavior (e.g., unexpected shell execution, sensitive file access) based on YAML-based rules.


Question 5. Tetragon

What differentiates Cilium Tetragon?

  • A) Container image build automation
  • B) Applies security policies at the kernel level using eBPF and can immediately terminate processes
  • C) Static analysis of Kubernetes manifests
  • D) Automatic SSL certificate renewal
Answer and Explanation

Answer: B) Applies security policies at the kernel level using eBPF and can immediately terminate processes

Tetragon is an eBPF-based security observability and runtime enforcement tool from the Cilium project. Unlike Falco, which focuses on detection, Tetragon can directly kill processes at the kernel level, providing runtime enforcement capabilities.


Question 6. Zero Trust Networking

What is the core principle of the Zero Trust security model?

  • A) The internal network is always trustworthy
  • B) Verify every request regardless of network location and grant least privilege
  • C) Firewalls alone provide sufficient security
  • D) Using a VPN makes all traffic safe
Answer and Explanation

Answer: B) Verify every request regardless of network location and grant least privilege

The Zero Trust model follows the principle of "Never Trust, Always Verify." It requires authentication, authorization, and encryption for all requests even within the network perimeter, applying the principle of least privilege.


Question 7. SPIFFE/SPIRE

What is the core concept of SPIFFE (Secure Production Identity Framework for Everyone)?

  • A) DNS-based service discovery
  • B) Assigns unified IDs (SPIFFE IDs) to workloads and authenticates through SVIDs
  • C) Container image scanning
  • D) Network segmentation
Answer and Explanation

Answer: B) Assigns unified IDs (SPIFFE IDs) to workloads and authenticates through SVIDs

SPIFFE is a standard that assigns platform-independent IDs (in spiffe://trust-domain/path format) to workloads. SPIRE is the reference implementation that issues X.509 SVIDs or JWT SVIDs, enabling mTLS authentication between workloads.


Question 8. Vault and Kubernetes Integration

What is the most common authentication method when integrating HashiCorp Vault with Kubernetes?

  • A) Username/password
  • B) Kubernetes Auth Method (ServiceAccount token-based)
  • C) SSH key authentication
  • D) LDAP authentication
Answer and Explanation

Answer: B) Kubernetes Auth Method (ServiceAccount token-based)

Vault's Kubernetes Auth Method uses the Pod's ServiceAccount token to authenticate with Vault. Secrets can be injected into Pods via the Vault Agent Injector or CSI Provider, enabling dynamic secret management.


Question 9. Cosign Image Signing

What does "Keyless Signing" mean when signing container images with cosign?

  • A) Deploying images without signatures
  • B) Using OIDC-based identity to sign with short-lived certificates without long-term key management
  • C) Not encrypting the image
  • D) Only using a public key to sign
Answer and Explanation

Answer: B) Using OIDC-based identity to sign with short-lived certificates without long-term key management

Keyless Signing obtains a short-lived signing certificate from Fulcio CA through OIDC authentication (e.g., Google, GitHub), signs the artifact, and records it in the Rekor transparency log. This eliminates the need for long-term private key management.


Question 10. Notation (Notary v2)

What is the primary role of Notation (Notary v2)?

  • A) Kubernetes cluster backup
  • B) A standard tool for signing and verifying OCI artifacts
  • C) Pod network policy management
  • D) Log collection and analysis
Answer and Explanation

Answer: B) A standard tool for signing and verifying OCI artifacts

Notation is a CLI tool and library for signing and verifying OCI images and artifacts. It supports a plugin extension model and can integrate with KMS services like Azure Key Vault and AWS Signer.


Question 11. SBOM (Software Bill of Materials)

What is the primary purpose of SBOM?

  • A) Tracks container CPU usage
  • B) Provides a list of all components (libraries, dependencies) included in software to support vulnerability management
  • C) Monitors network traffic
  • D) Manages Kubernetes resource quotas
Answer and Explanation

Answer: B) Provides a list of all components (libraries, dependencies) included in software to support vulnerability management

SBOM is a "bill of materials" for software that documents all included components and their versions. When new CVEs are discovered, SBOMs enable rapid identification of affected software.


Question 12. CycloneDX vs SPDX

What do CycloneDX and SPDX have in common?

  • A) Both are container runtimes
  • B) Both are SBOM format standards
  • C) Both are service mesh implementations
  • D) Both are Kubernetes deployment tools
Answer and Explanation

Answer: B) Both are SBOM format standards

CycloneDX (OWASP) and SPDX (Linux Foundation) are both standard formats for creating SBOMs. SPDX focuses on license compliance, while CycloneDX is optimized for security and vulnerability analysis.


Question 13. Admission Controller Overview

What is the correct execution order of Kubernetes Admission Controllers?

  • A) Mutating -> Validating -> Object Persistence
  • B) Validating -> Mutating -> Object Persistence
  • C) Object Persistence -> Mutating -> Validating
  • D) Mutating -> Object Persistence -> Validating
Answer and Explanation

Answer: A) Mutating -> Validating -> Object Persistence

After authentication and authorization, Kubernetes API requests first pass through MutatingAdmissionWebhooks to modify resources, then ValidatingAdmissionWebhooks for validation, and finally are persisted to etcd.


Question 14. Kyverno Policy Engine

What differentiates Kyverno from OPA/Gatekeeper?

  • A) Uses the Rego language
  • B) Defines policies in YAML, providing mutation and generation capabilities in addition to validation
  • C) Only works outside Kubernetes
  • D) Has no policy auditing capability
Answer and Explanation

Answer: B) Defines policies in YAML, providing mutation and generation capabilities in addition to validation

Kyverno is a Kubernetes-native policy engine that defines policies in YAML and CEL. It supports validate, mutate, generate, and verifyImages rule types.


Question 15. OPA/Gatekeeper

What language is used to define policies in OPA (Open Policy Agent) Gatekeeper?

  • A) YAML
  • B) JSON
  • C) Rego
  • D) Python
Answer and Explanation

Answer: C) Rego

OPA is a general-purpose policy engine that uses Rego, a declarative query language, to define policies. Gatekeeper integrates OPA with Kubernetes, with policy logic written in Rego within ConstraintTemplates.


Question 16. Pod Security Standards

What are the three policy levels of Kubernetes Pod Security Standards?

  • A) Low, Medium, High
  • B) Privileged, Baseline, Restricted
  • C) Open, Default, Strict
  • D) Allow, Warn, Deny
Answer and Explanation

Answer: B) Privileged, Baseline, Restricted

Pod Security Standards define three levels: Privileged (unrestricted), Baseline (minimal restrictions to prevent known privilege escalation), and Restricted (maximum security applying Pod hardening best practices).


Question 17. Pod Security Admission

What are the three modes used in Pod Security Admission?

  • A) allow, block, audit
  • B) enforce, audit, warn
  • C) accept, reject, log
  • D) permit, deny, monitor
Answer and Explanation

Answer: B) enforce, audit, warn

Pod Security Admission supports three modes: enforce (reject violations), audit (record violations in audit logs), and warn (display warning messages for violations). They are applied via namespace labels.


Question 18. PodSecurityPolicy Deprecation

What is the most appropriate reason for removing PodSecurityPolicy (PSP) from Kubernetes?

  • A) It was too slow in performance
  • B) Complex usage, confusing RBAC bindings, and unpredictable scope of application
  • C) It lacked security features
  • D) It only supported a single cloud provider
Answer and Explanation

Answer: B) Complex usage, confusing RBAC bindings, and unpredictable scope of application

PSP had unintuitive binding mechanisms through RBAC, and it was difficult to predict which PSP applied to which Pod. It was removed in Kubernetes 1.25, replaced by Pod Security Admission, Kyverno, and OPA/Gatekeeper.


Question 19. Network Policy

Which statement about Kubernetes NetworkPolicy is correct?

  • A) Without NetworkPolicy, all traffic is blocked
  • B) Without NetworkPolicy, all traffic is allowed; once applied, only explicitly allowed traffic passes
  • C) NetworkPolicy only controls inter-node communication
  • D) All CNI plugins support NetworkPolicy
Answer and Explanation

Answer: B) Without NetworkPolicy, all traffic is allowed; once applied, only explicitly allowed traffic passes

By default, Kubernetes allows all Pod-to-Pod communication. When NetworkPolicy is applied, only explicitly allowed ingress/egress traffic passes for selected Pods. Note that the CNI plugin must support NetworkPolicy.


Question 20. Secret Management

Which statement about Kubernetes Secret's default storage method is correct?

  • A) Encrypted with AES-256 by default in etcd
  • B) Only Base64-encoded in etcd by default; EncryptionConfiguration must be configured separately for encryption
  • C) Secrets are stored only in memory and never written to disk
  • D) Secrets are automatically stored in Vault
Answer and Explanation

Answer: B) Only Base64-encoded in etcd by default; EncryptionConfiguration must be configured separately for encryption

Kubernetes Secrets are stored Base64-encoded in etcd by default. This is not encryption, so anyone with etcd access can read the secrets. For encryption at rest, configure EncryptionConfiguration or use a KMS provider.


Question 21. Image Scanning

Which is NOT a container image vulnerability scanning tool?

  • A) Trivy
  • B) Grype
  • C) Clair
  • D) Helm
Answer and Explanation

Answer: D) Helm

Trivy (Aqua Security), Grype (Anchore), and Clair (Quay) are all container image vulnerability scanning tools. Helm is a Kubernetes package manager unrelated to security scanning.


Question 22. RBAC Least Privilege Principle

What is the correct approach when applying the principle of least privilege with RBAC?

  • A) Grant cluster-admin role to all ServiceAccounts
  • B) Create Roles containing only necessary resources and verbs, and use minimum-scope RoleBindings
  • C) Only use ClusterRoles, never namespace Roles
  • D) Use wildcards (*) to allow access to all resources
Answer and Explanation

Answer: B) Create Roles containing only necessary resources and verbs, and use minimum-scope RoleBindings

The principle of least privilege means granting only the minimum necessary permissions. Create Roles that allow only specific verbs on specific resources and apply them with namespace-scoped RoleBindings. Avoid wildcard usage and cluster-admin abuse.


Question 23. mTLS (Mutual TLS)

What is the role of mTLS in a service mesh?

  • A) Compresses inter-service communication
  • B) Both server and client authenticate each other with certificates and encrypt communication
  • C) Encrypts DNS queries
  • D) Performs load balancing
Answer and Explanation

Answer: B) Both server and client authenticate each other with certificates and encrypt communication

mTLS (mutual TLS) performs bidirectional authentication where both server and client present certificates. Service meshes like Istio and Linkerd automatically apply mTLS between services through sidecar proxies.


Question 24. Audit Logging

Which Kubernetes audit log level records the most detailed information?

  • A) None
  • B) Metadata
  • C) Request
  • D) RequestResponse
Answer and Explanation

Answer: D) RequestResponse

Kubernetes audit logging supports four levels: None (no logging), Metadata (request metadata only), Request (metadata + request body), and RequestResponse (metadata + request + response body). RequestResponse is the most detailed.


Question 25. SecurityContext

Which is NOT a configurable item in Pod-level SecurityContext?

  • A) runAsUser
  • B) fsGroup
  • C) networkPolicy
  • D) runAsNonRoot
Answer and Explanation

Answer: C) networkPolicy

Pod SecurityContext can configure runAsUser, runAsNonRoot, runAsGroup, fsGroup, supplementalGroups, sysctls, and seccompProfile. NetworkPolicy is a separate Kubernetes resource unrelated to SecurityContext.


Question 26. AppArmor and Seccomp

What is the role of a Seccomp profile?

  • A) Controls filesystem access
  • B) Filters system calls that a container can use
  • C) Restricts network traffic
  • D) Limits CPU usage
Answer and Explanation

Answer: B) Filters system calls that a container can use

Seccomp (Secure Computing Mode) filters the system calls a process can make using allow lists or block lists. In Kubernetes, you can apply RuntimeDefault or custom profiles through seccompProfile.


Question 27. Image Policy

How can you enforce running only trusted images in Kubernetes?

  • A) Use the latest tag for all images
  • B) Apply policies through Admission Controllers (Kyverno, OPA) to only allow signed images
  • C) Only pull images from public registries
  • D) Set imagePullPolicy to Never
Answer and Explanation

Answer: B) Apply policies through Admission Controllers (Kyverno, OPA) to only allow signed images

Kyverno's verifyImages rules or OPA/Gatekeeper's ConstraintTemplates can enforce that only images with verified cosign or Notation signatures are deployed. This is a key element of supply chain security.


Question 28. ServiceAccount Security

What changed in ServiceAccount token management after Kubernetes 1.24?

  • A) ServiceAccount tokens were completely removed
  • B) Auto-mounted permanent tokens are no longer created; short-lived tokens via TokenRequest API are recommended
  • C) All Pods automatically mount cluster-admin tokens
  • D) ServiceAccounts no longer exist
Answer and Explanation

Answer: B) Auto-mounted permanent tokens are no longer created; short-lived tokens via TokenRequest API are recommended

Since Kubernetes 1.24, Secrets are no longer automatically created with ServiceAccounts. Instead, time-limited short-lived tokens issued through the TokenRequest API are recommended, enhancing security.


Question 29. Container Isolation

What security benefit do gVisor and Kata Containers provide?

  • A) Network encryption
  • B) Reduce container escape risk by not sharing the kernel or adding extra isolation layers
  • C) Image signature verification
  • D) Enhanced RBAC policies
Answer and Explanation

Answer: B) Reduce container escape risk by not sharing the kernel or adding extra isolation layers

gVisor provides a user-space kernel (application kernel) that intercepts direct system calls to the host kernel. Kata Containers run containers inside lightweight VMs for hardware-level isolation. Both are selected through RuntimeClass.


Question 30. Comprehensive Security Best Practices

Which does NOT align with a Defense in Depth strategy?

  • A) Image scanning + signature verification
  • B) NetworkPolicy + mTLS
  • C) RBAC + Pod Security Standards
  • D) Running all workloads as root with privileged mode
Answer and Explanation

Answer: D) Running all workloads as root with privileged mode

Defense in Depth layers multiple security controls so that if one layer fails, others provide protection. It combines image security, network security, access control, and runtime security. Running as root with privileged mode contradicts security best practices.


Summary

These 30 questions are designed for in-depth study of the core KCSA exam domains: Supply Chain Security, Runtime Security, Platform Security, Network Security, and Compliance and Security Frameworks. The actual exam requires understanding not only Kubernetes security mechanisms but also the broader CNCF security ecosystem.