- Published on
[Golden Kubestronaut] KCSA Extra 30 Practice Questions - Advanced Cloud Native Security
- Authors

- Name
- Youngju Kim
- @fjvbn20031
- KCSA Extra 30 Practice Questions
- Question 1. SLSA Framework
- Question 2. Sigstore Project
- Question 3. in-toto Framework
- Question 4. Falco Runtime Security
- Question 5. Tetragon
- Question 6. Zero Trust Networking
- Question 7. SPIFFE/SPIRE
- Question 8. Vault and Kubernetes Integration
- Question 9. Cosign Image Signing
- Question 10. Notation (Notary v2)
- Question 11. SBOM (Software Bill of Materials)
- Question 12. CycloneDX vs SPDX
- Question 13. Admission Controller Overview
- Question 14. Kyverno Policy Engine
- Question 15. OPA/Gatekeeper
- Question 16. Pod Security Standards
- Question 17. Pod Security Admission
- Question 18. PodSecurityPolicy Deprecation
- Question 19. Network Policy
- Question 20. Secret Management
- Question 21. Image Scanning
- Question 22. RBAC Least Privilege Principle
- Question 23. mTLS (Mutual TLS)
- Question 24. Audit Logging
- Question 25. SecurityContext
- Question 26. AppArmor and Seccomp
- Question 27. Image Policy
- Question 28. ServiceAccount Security
- Question 29. Container Isolation
- Question 30. Comprehensive Security Best Practices
- Summary
KCSA Extra 30 Practice Questions
These 30 additional questions cover the key KCSA exam domains: supply chain security, runtime security, zero trust networking, image verification, policy engines, and Pod security.
Question 1. SLSA Framework
What is the primary purpose of the SLSA (Supply-chain Levels for Software Artifacts) framework?
- A) Optimizes container runtime performance
- B) Defines security levels to ensure the integrity of the software supply chain
- C) Manages Kubernetes cluster network policies
- D) Reduces container image sizes
Answer and Explanation
Answer: B) Defines security levels to ensure the integrity of the software supply chain
SLSA is a security framework designed to prevent software supply chain attacks, defining security levels from Build Level 0 to Level 3. It requires provenance tracking of build processes, tamper prevention, and isolated build environments.
Question 2. Sigstore Project
Which is NOT a core component of Sigstore?
- A) Cosign - container image signing
- B) Fulcio - short-lived certificate issuing CA
- C) Rekor - transparency log
- D) Falco - runtime threat detection
Answer and Explanation
Answer: D) Falco - runtime threat detection
Sigstore consists of Cosign (image/artifact signing), Fulcio (short-lived certificate issuance for keyless signing), and Rekor (signature transparency log). Falco is a runtime security tool and a separate CNCF project.
Question 3. in-toto Framework
What does in-toto protect?
- A) Runtime container memory access
- B) The entire software supply chain process through layouts and links for step-by-step verification
- C) Kubernetes API server authentication
- D) Network traffic encryption
Answer and Explanation
Answer: B) The entire software supply chain process through layouts and links for step-by-step verification
in-toto protects the entire software supply chain process. Layouts define the expected steps of the supply chain, and link metadata records the actual execution of each step to detect tampering.
Question 4. Falco Runtime Security
What is the primary mechanism Falco uses to detect system events?
- A) Static analysis of container images
- B) Real-time monitoring of system calls through eBPF or kernel modules
- C) Polling Kubernetes API for resource changes
- D) Capturing and analyzing network packets
Answer and Explanation
Answer: B) Real-time monitoring of system calls through eBPF or kernel modules
Falco uses eBPF probes or kernel modules to monitor system calls in real-time and detects abnormal behavior (e.g., unexpected shell execution, sensitive file access) based on YAML-based rules.
Question 5. Tetragon
What differentiates Cilium Tetragon?
- A) Container image build automation
- B) Applies security policies at the kernel level using eBPF and can immediately terminate processes
- C) Static analysis of Kubernetes manifests
- D) Automatic SSL certificate renewal
Answer and Explanation
Answer: B) Applies security policies at the kernel level using eBPF and can immediately terminate processes
Tetragon is an eBPF-based security observability and runtime enforcement tool from the Cilium project. Unlike Falco, which focuses on detection, Tetragon can directly kill processes at the kernel level, providing runtime enforcement capabilities.
Question 6. Zero Trust Networking
What is the core principle of the Zero Trust security model?
- A) The internal network is always trustworthy
- B) Verify every request regardless of network location and grant least privilege
- C) Firewalls alone provide sufficient security
- D) Using a VPN makes all traffic safe
Answer and Explanation
Answer: B) Verify every request regardless of network location and grant least privilege
The Zero Trust model follows the principle of "Never Trust, Always Verify." It requires authentication, authorization, and encryption for all requests even within the network perimeter, applying the principle of least privilege.
Question 7. SPIFFE/SPIRE
What is the core concept of SPIFFE (Secure Production Identity Framework for Everyone)?
- A) DNS-based service discovery
- B) Assigns unified IDs (SPIFFE IDs) to workloads and authenticates through SVIDs
- C) Container image scanning
- D) Network segmentation
Answer and Explanation
Answer: B) Assigns unified IDs (SPIFFE IDs) to workloads and authenticates through SVIDs
SPIFFE is a standard that assigns platform-independent IDs (in spiffe://trust-domain/path format) to workloads. SPIRE is the reference implementation that issues X.509 SVIDs or JWT SVIDs, enabling mTLS authentication between workloads.
Question 8. Vault and Kubernetes Integration
What is the most common authentication method when integrating HashiCorp Vault with Kubernetes?
- A) Username/password
- B) Kubernetes Auth Method (ServiceAccount token-based)
- C) SSH key authentication
- D) LDAP authentication
Answer and Explanation
Answer: B) Kubernetes Auth Method (ServiceAccount token-based)
Vault's Kubernetes Auth Method uses the Pod's ServiceAccount token to authenticate with Vault. Secrets can be injected into Pods via the Vault Agent Injector or CSI Provider, enabling dynamic secret management.
Question 9. Cosign Image Signing
What does "Keyless Signing" mean when signing container images with cosign?
- A) Deploying images without signatures
- B) Using OIDC-based identity to sign with short-lived certificates without long-term key management
- C) Not encrypting the image
- D) Only using a public key to sign
Answer and Explanation
Answer: B) Using OIDC-based identity to sign with short-lived certificates without long-term key management
Keyless Signing obtains a short-lived signing certificate from Fulcio CA through OIDC authentication (e.g., Google, GitHub), signs the artifact, and records it in the Rekor transparency log. This eliminates the need for long-term private key management.
Question 10. Notation (Notary v2)
What is the primary role of Notation (Notary v2)?
- A) Kubernetes cluster backup
- B) A standard tool for signing and verifying OCI artifacts
- C) Pod network policy management
- D) Log collection and analysis
Answer and Explanation
Answer: B) A standard tool for signing and verifying OCI artifacts
Notation is a CLI tool and library for signing and verifying OCI images and artifacts. It supports a plugin extension model and can integrate with KMS services like Azure Key Vault and AWS Signer.
Question 11. SBOM (Software Bill of Materials)
What is the primary purpose of SBOM?
- A) Tracks container CPU usage
- B) Provides a list of all components (libraries, dependencies) included in software to support vulnerability management
- C) Monitors network traffic
- D) Manages Kubernetes resource quotas
Answer and Explanation
Answer: B) Provides a list of all components (libraries, dependencies) included in software to support vulnerability management
SBOM is a "bill of materials" for software that documents all included components and their versions. When new CVEs are discovered, SBOMs enable rapid identification of affected software.
Question 12. CycloneDX vs SPDX
What do CycloneDX and SPDX have in common?
- A) Both are container runtimes
- B) Both are SBOM format standards
- C) Both are service mesh implementations
- D) Both are Kubernetes deployment tools
Answer and Explanation
Answer: B) Both are SBOM format standards
CycloneDX (OWASP) and SPDX (Linux Foundation) are both standard formats for creating SBOMs. SPDX focuses on license compliance, while CycloneDX is optimized for security and vulnerability analysis.
Question 13. Admission Controller Overview
What is the correct execution order of Kubernetes Admission Controllers?
- A) Mutating -> Validating -> Object Persistence
- B) Validating -> Mutating -> Object Persistence
- C) Object Persistence -> Mutating -> Validating
- D) Mutating -> Object Persistence -> Validating
Answer and Explanation
Answer: A) Mutating -> Validating -> Object Persistence
After authentication and authorization, Kubernetes API requests first pass through MutatingAdmissionWebhooks to modify resources, then ValidatingAdmissionWebhooks for validation, and finally are persisted to etcd.
Question 14. Kyverno Policy Engine
What differentiates Kyverno from OPA/Gatekeeper?
- A) Uses the Rego language
- B) Defines policies in YAML, providing mutation and generation capabilities in addition to validation
- C) Only works outside Kubernetes
- D) Has no policy auditing capability
Answer and Explanation
Answer: B) Defines policies in YAML, providing mutation and generation capabilities in addition to validation
Kyverno is a Kubernetes-native policy engine that defines policies in YAML and CEL. It supports validate, mutate, generate, and verifyImages rule types.
Question 15. OPA/Gatekeeper
What language is used to define policies in OPA (Open Policy Agent) Gatekeeper?
- A) YAML
- B) JSON
- C) Rego
- D) Python
Answer and Explanation
Answer: C) Rego
OPA is a general-purpose policy engine that uses Rego, a declarative query language, to define policies. Gatekeeper integrates OPA with Kubernetes, with policy logic written in Rego within ConstraintTemplates.
Question 16. Pod Security Standards
What are the three policy levels of Kubernetes Pod Security Standards?
- A) Low, Medium, High
- B) Privileged, Baseline, Restricted
- C) Open, Default, Strict
- D) Allow, Warn, Deny
Answer and Explanation
Answer: B) Privileged, Baseline, Restricted
Pod Security Standards define three levels: Privileged (unrestricted), Baseline (minimal restrictions to prevent known privilege escalation), and Restricted (maximum security applying Pod hardening best practices).
Question 17. Pod Security Admission
What are the three modes used in Pod Security Admission?
- A) allow, block, audit
- B) enforce, audit, warn
- C) accept, reject, log
- D) permit, deny, monitor
Answer and Explanation
Answer: B) enforce, audit, warn
Pod Security Admission supports three modes: enforce (reject violations), audit (record violations in audit logs), and warn (display warning messages for violations). They are applied via namespace labels.
Question 18. PodSecurityPolicy Deprecation
What is the most appropriate reason for removing PodSecurityPolicy (PSP) from Kubernetes?
- A) It was too slow in performance
- B) Complex usage, confusing RBAC bindings, and unpredictable scope of application
- C) It lacked security features
- D) It only supported a single cloud provider
Answer and Explanation
Answer: B) Complex usage, confusing RBAC bindings, and unpredictable scope of application
PSP had unintuitive binding mechanisms through RBAC, and it was difficult to predict which PSP applied to which Pod. It was removed in Kubernetes 1.25, replaced by Pod Security Admission, Kyverno, and OPA/Gatekeeper.
Question 19. Network Policy
Which statement about Kubernetes NetworkPolicy is correct?
- A) Without NetworkPolicy, all traffic is blocked
- B) Without NetworkPolicy, all traffic is allowed; once applied, only explicitly allowed traffic passes
- C) NetworkPolicy only controls inter-node communication
- D) All CNI plugins support NetworkPolicy
Answer and Explanation
Answer: B) Without NetworkPolicy, all traffic is allowed; once applied, only explicitly allowed traffic passes
By default, Kubernetes allows all Pod-to-Pod communication. When NetworkPolicy is applied, only explicitly allowed ingress/egress traffic passes for selected Pods. Note that the CNI plugin must support NetworkPolicy.
Question 20. Secret Management
Which statement about Kubernetes Secret's default storage method is correct?
- A) Encrypted with AES-256 by default in etcd
- B) Only Base64-encoded in etcd by default; EncryptionConfiguration must be configured separately for encryption
- C) Secrets are stored only in memory and never written to disk
- D) Secrets are automatically stored in Vault
Answer and Explanation
Answer: B) Only Base64-encoded in etcd by default; EncryptionConfiguration must be configured separately for encryption
Kubernetes Secrets are stored Base64-encoded in etcd by default. This is not encryption, so anyone with etcd access can read the secrets. For encryption at rest, configure EncryptionConfiguration or use a KMS provider.
Question 21. Image Scanning
Which is NOT a container image vulnerability scanning tool?
- A) Trivy
- B) Grype
- C) Clair
- D) Helm
Answer and Explanation
Answer: D) Helm
Trivy (Aqua Security), Grype (Anchore), and Clair (Quay) are all container image vulnerability scanning tools. Helm is a Kubernetes package manager unrelated to security scanning.
Question 22. RBAC Least Privilege Principle
What is the correct approach when applying the principle of least privilege with RBAC?
- A) Grant cluster-admin role to all ServiceAccounts
- B) Create Roles containing only necessary resources and verbs, and use minimum-scope RoleBindings
- C) Only use ClusterRoles, never namespace Roles
- D) Use wildcards (*) to allow access to all resources
Answer and Explanation
Answer: B) Create Roles containing only necessary resources and verbs, and use minimum-scope RoleBindings
The principle of least privilege means granting only the minimum necessary permissions. Create Roles that allow only specific verbs on specific resources and apply them with namespace-scoped RoleBindings. Avoid wildcard usage and cluster-admin abuse.
Question 23. mTLS (Mutual TLS)
What is the role of mTLS in a service mesh?
- A) Compresses inter-service communication
- B) Both server and client authenticate each other with certificates and encrypt communication
- C) Encrypts DNS queries
- D) Performs load balancing
Answer and Explanation
Answer: B) Both server and client authenticate each other with certificates and encrypt communication
mTLS (mutual TLS) performs bidirectional authentication where both server and client present certificates. Service meshes like Istio and Linkerd automatically apply mTLS between services through sidecar proxies.
Question 24. Audit Logging
Which Kubernetes audit log level records the most detailed information?
- A) None
- B) Metadata
- C) Request
- D) RequestResponse
Answer and Explanation
Answer: D) RequestResponse
Kubernetes audit logging supports four levels: None (no logging), Metadata (request metadata only), Request (metadata + request body), and RequestResponse (metadata + request + response body). RequestResponse is the most detailed.
Question 25. SecurityContext
Which is NOT a configurable item in Pod-level SecurityContext?
- A) runAsUser
- B) fsGroup
- C) networkPolicy
- D) runAsNonRoot
Answer and Explanation
Answer: C) networkPolicy
Pod SecurityContext can configure runAsUser, runAsNonRoot, runAsGroup, fsGroup, supplementalGroups, sysctls, and seccompProfile. NetworkPolicy is a separate Kubernetes resource unrelated to SecurityContext.
Question 26. AppArmor and Seccomp
What is the role of a Seccomp profile?
- A) Controls filesystem access
- B) Filters system calls that a container can use
- C) Restricts network traffic
- D) Limits CPU usage
Answer and Explanation
Answer: B) Filters system calls that a container can use
Seccomp (Secure Computing Mode) filters the system calls a process can make using allow lists or block lists. In Kubernetes, you can apply RuntimeDefault or custom profiles through seccompProfile.
Question 27. Image Policy
How can you enforce running only trusted images in Kubernetes?
- A) Use the latest tag for all images
- B) Apply policies through Admission Controllers (Kyverno, OPA) to only allow signed images
- C) Only pull images from public registries
- D) Set imagePullPolicy to Never
Answer and Explanation
Answer: B) Apply policies through Admission Controllers (Kyverno, OPA) to only allow signed images
Kyverno's verifyImages rules or OPA/Gatekeeper's ConstraintTemplates can enforce that only images with verified cosign or Notation signatures are deployed. This is a key element of supply chain security.
Question 28. ServiceAccount Security
What changed in ServiceAccount token management after Kubernetes 1.24?
- A) ServiceAccount tokens were completely removed
- B) Auto-mounted permanent tokens are no longer created; short-lived tokens via TokenRequest API are recommended
- C) All Pods automatically mount cluster-admin tokens
- D) ServiceAccounts no longer exist
Answer and Explanation
Answer: B) Auto-mounted permanent tokens are no longer created; short-lived tokens via TokenRequest API are recommended
Since Kubernetes 1.24, Secrets are no longer automatically created with ServiceAccounts. Instead, time-limited short-lived tokens issued through the TokenRequest API are recommended, enhancing security.
Question 29. Container Isolation
What security benefit do gVisor and Kata Containers provide?
- A) Network encryption
- B) Reduce container escape risk by not sharing the kernel or adding extra isolation layers
- C) Image signature verification
- D) Enhanced RBAC policies
Answer and Explanation
Answer: B) Reduce container escape risk by not sharing the kernel or adding extra isolation layers
gVisor provides a user-space kernel (application kernel) that intercepts direct system calls to the host kernel. Kata Containers run containers inside lightweight VMs for hardware-level isolation. Both are selected through RuntimeClass.
Question 30. Comprehensive Security Best Practices
Which does NOT align with a Defense in Depth strategy?
- A) Image scanning + signature verification
- B) NetworkPolicy + mTLS
- C) RBAC + Pod Security Standards
- D) Running all workloads as root with privileged mode
Answer and Explanation
Answer: D) Running all workloads as root with privileged mode
Defense in Depth layers multiple security controls so that if one layer fails, others provide protection. It combines image security, network security, access control, and runtime security. Running as root with privileged mode contradicts security best practices.
Summary
These 30 questions are designed for in-depth study of the core KCSA exam domains: Supply Chain Security, Runtime Security, Platform Security, Network Security, and Compliance and Security Frameworks. The actual exam requires understanding not only Kubernetes security mechanisms but also the broader CNCF security ecosystem.