Foren » Discussions » CKS試験の準備方法|権威のあるCKS学習体験談試験|一番優秀なCertified Kubernetes Security Specialist (CKS)最新テスト

gywudosu
Avatar

JpexamのCKS試験参考書はあなたを一回で試験に合格させるだけでなく、CKS認定試験に関連する多くの知識を勉強させることもできます。Jpexamの問題集はあなたが身に付けるべき技能をすべて含んでいます。そうすると、あなたは自分自身の能力をよく高めることができ、仕事でよりよくそれらを適用することができます。Jpexam的CKS問題集は絶対あなたがよく試験に準備して、しかも自分を向上させる一番良い選択です。Jpexamがあなたに美しい未来を与えることができることを信じてください。 ユーザーが知識構造の完全なシステムを形成できるようにするためのCKSスタディガイド、テスト解釈の資格CKS試験、および有機的で合理的な取り決めをサポートするコースの練習、CKS新しいカリキュラムのセクションは、CKS試験準備を使用して論理的フレームワークの知識を構築して良好な状態を作成するユーザー向けに、問題を解決する方法を通じて統合し、結束とリンクの間の各セクションを密接にリンクできます。 >> CKS学習体験談 <<

ハイパスレートのCKS学習体験談 & 合格スムーズCKS最新テスト | ユニークなCKS日本語対策

CKS参考資料を使用したお客様からいい評価をもらいました。CKS参考資料は多くの人の絶対いい選択です。CKS参考資料の難点については、弊社の専門家ガ例を挙げて説明します。そうすれば、わかりやすく、覚えやすいです。弊社の CKS参考資料は実践に基づいて、専門的な知識の蓄積です。だから、CKS試験のために、弊社の商品を選ばれば、後悔することがないです。

Linux Foundation Certified Kubernetes Security Specialist (CKS) 認定 CKS 試験問題 (Q10-Q15):

質問 # 10
Enable audit logs in the cluster, To Do so, enable the log backend, and ensure that
1. logs are stored at /var/log/kubernetes/kubernetes-logs.txt.
2. Log files are retained for 5 days.
3. at maximum, a number of 10 old audit logs files are retained.
Edit and extend the basic policy to log:

  • A. 1. Cronjobs changes at RequestResponse

正解:A 解説:
2. Log the request body of deployments changes in the namespace kube-system.
3. Log all other resources in core and extensions at the Request level.
4. Don't log watch requests by the "system:kube-proxy" on endpoints or
質問 # 11
You can switch the cluster/configuration context using the following command: [[email protected]] $ kubectl config use-context test-account Task: Enable audit logs in the cluster.
To do so, enable the log backend, and ensure that:
1. logs are stored at /var/log/Kubernetes/logs.txt
2. log files are retained for 5 days
3. at maximum, a number of 10 old audit log files are retained
A basic policy is provided at /etc/Kubernetes/logpolicy/audit-policy.yaml. It only specifies what not to log. Note: The base policy is located on the cluster's master node.
Edit and extend the basic policy to log: 1. Nodes changes at RequestResponse level 2. The request body of persistentvolumes changes in the namespace frontend 3. ConfigMap and Secret changes in all namespaces at the Metadata level Also, add a catch-all rule to log all other requests at the Metadata level Note: Don't forget to apply the modified policy. 正解: 解説:
$ vim /etc/kubernetes/log-policy/audit-policy.yaml
- level: RequestResponse
userGroups: ["system:nodes"]
- level: Request
resources:
- group: "" # core API group
resources: ["persistentvolumes"]
namespaces: ["frontend"]
- level: Metadata
resources:
- group: ""
resources: ["configmaps", "secrets"]
- level: Metadata
$ vim /etc/kubernetes/manifests/kube-apiserver.yaml Add these
- --audit-policy-file=/etc/kubernetes/log-policy/audit-policy.yaml
- --audit-log-path=/var/log/kubernetes/logs.txt
- --audit-log-maxage=5
- --audit-log-maxbackup=10
Explanation
[[email protected]] $ ssh master1 [[email protected]] $ vim /etc/kubernetes/log-policy/audit-policy.yaml apiVersion: audit.k8s.io/v1 # This is required.
kind: Policy
# Don't generate audit events for all requests in RequestReceived stage.
omitStages:
- "RequestReceived"
rules:
# Don't log watch requests by the "system:kube-proxy" on endpoints or services
- level: None
users: ["system:kube-proxy"]
verbs: ["watch"]
resources:
- group: "" # core API group
resources: ["endpoints", "services"]
# Don't log authenticated requests to certain non-resource URL paths.
- level: None
userGroups: ["system:authenticated"]
nonResourceURLs:
- "/api" # Wildcard matching.
- "/version"
# Add your changes below
- level: RequestResponse
userGroups: ["system:nodes"] # Block for nodes
- level: Request
resources:
- group: "" # core API group
resources: ["persistentvolumes"] # Block for persistentvolumes
namespaces: ["frontend"] # Block for persistentvolumes of frontend ns
- level: Metadata
resources:
- group: "" # core API group
resources: ["configmaps", "secrets"] # Block for configmaps & secrets
- level: Metadata # Block for everything else
[[email protected]] $ vim /etc/kubernetes/manifests/kube-apiserver.yaml
apiVersion: v1
kind: Pod
metadata:
annotations:
kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint: 10.0.0.5:6443 labels:
component: kube-apiserver
tier: control-plane
name: kube-apiserver
namespace: kube-system
spec:
containers:
- command:
- kube-apiserver
- --advertise-address=10.0.0.5
- --allow-privileged=true
- --authorization-mode=Node,RBAC
- --audit-policy-file=/etc/kubernetes/log-policy/audit-policy.yaml #Add this
- --audit-log-path=/var/log/kubernetes/logs.txt #Add this
- --audit-log-maxage=5 #Add this
- --audit-log-maxbackup=10 #Add this
...
output truncated
Note: log volume & policy volume is already mounted in vim /etc/kubernetes/manifests/kube-apiserver.yaml so no need to mount it. Reference: https://kubernetes.io/docs/tasks/debug-application-cluster/audit/
質問 # 12*
Before Making any changes build the Dockerfile with tag base:v1
Now Analyze and edit the given Dockerfile(based on ubuntu 16:04)
Fixing two instructions present in the file, Check from Security Aspect and Reduce Size point of view.
Dockerfile:
FROM ubuntu:latest
RUN apt-get update -y
RUN apt install nginx -y
COPY entrypoint.sh /
RUN useradd ubuntu
ENTRYPOINT ["/entrypoint.sh"]
USER ubuntu
entrypoint.sh
#!/bin/bash
echo "Hello from CKS"
After fixing the Dockerfile, build the docker-image with the tag base:v2

  • A. To Verify: Check the size of the image before and after the build.

正解:A
質問 # 13
Create a PSP that will prevent the creation of privileged pods in the namespace.
Create a new PodSecurityPolicy named prevent-privileged-policy which prevents the creation of privileged pods.
Create a new ServiceAccount named psp-sa in the namespace default.
Create a new ClusterRole named prevent-role, which uses the newly created Pod Security Policy prevent-privileged-policy.
Create a new ClusterRoleBinding named prevent-role-binding, which binds the created ClusterRole prevent-role to the created SA psp-sa.
Also, Check the Configuration is working or not by trying to Create a Privileged pod, it should get failed. 正解: 解説:
Create a PSP that will prevent the creation of privileged pods in the namespace.
$ cat clusterrole-use-privileged.yaml
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: use-privileged-psp
rules:
- apiGroups: ['policy']
resources: ['podsecuritypolicies']
verbs: ['use']
resourceNames:
- default-psp
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: privileged-role-bind
namespace: psp-test
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: use-privileged-psp
subjects:
- kind: ServiceAccount
name: privileged-sa
$ kubectl -n psp-test apply -f clusterrole-use-privileged.yaml
After a few moments, the privileged Pod should be created.
Create a new PodSecurityPolicy named prevent-privileged-policy which prevents the creation of privileged pods.
apiVersion: policy/v1beta1
kind: PodSecurityPolicy
metadata:
name: example
spec:
privileged: false # Don't allow privileged pods!
# The rest fills in some required fields.
seLinux:
rule: RunAsAny
supplementalGroups:
rule: RunAsAny
runAsUser:
rule: RunAsAny
fsGroup:
rule: RunAsAny
volumes:
- ''
And create it with kubectl:
kubectl-admin create -f example-psp.yaml
Now, as the unprivileged user, try to create a simple pod:
kubectl-user create -f- <<EOF
apiVersion: v1
kind: Pod
metadata:
name: pause
spec:
containers:
- name: pause
image: k8s.gcr.io/pause
EOF
The output is similar to this:
Error from server (Forbidden): error when creating "STDIN": pods "pause" is forbidden: unable to validate against any pod security policy: [] Create a new ServiceAccount named psp-sa in the namespace default.
$ cat clusterrole-use-privileged.yaml
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: use-privileged-psp
rules:
- apiGroups: ['policy']
resources: ['podsecuritypolicies']
verbs: ['use']
resourceNames:
- default-psp
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: privileged-role-bind
namespace: psp-test
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: use-privileged-psp
subjects:
- kind: ServiceAccount
name: privileged-sa
$ kubectl -n psp-test apply -f clusterrole-use-privileged.yaml
After a few moments, the privileged Pod should be created.
Create a new ClusterRole named prevent-role, which uses the newly created Pod Security Policy prevent-privileged-policy.
apiVersion: policy/v1beta1
kind: PodSecurityPolicy
metadata:
name: example
spec:
privileged: false # Don't allow privileged pods!
# The rest fills in some required fields.
seLinux:
rule: RunAsAny
supplementalGroups:
rule: RunAsAny
runAsUser:
rule: RunAsAny
fsGroup:
rule: RunAsAny
volumes:
- '
'
And create it with kubectl:
kubectl-admin create -f example-psp.yaml
Now, as the unprivileged user, try to create a simple pod:
kubectl-user create -f- <<EOF
apiVersion: v1
kind: Pod
metadata:
name: pause
spec:
containers:
- name: pause
image: k8s.gcr.io/pause
EOF
The output is similar to this:
Error from server (Forbidden): error when creating "STDIN": pods "pause" is forbidden: unable to validate against any pod security policy: [] Create a new ClusterRoleBinding named prevent-role-binding, which binds the created ClusterRole prevent-role to the created SA psp-sa.
apiVersion: rbac.authorization.k8s.io/v1
# This role binding allows "jane" to read pods in the "default" namespace.
# You need to already have a Role named "pod-reader" in that namespace.
kind: RoleBinding
metadata:
name: read-pods
namespace: default
subjects:
# You can specify more than one "subject"
- kind: User
name: jane # "name" is case sensitive
apiGroup: rbac.authorization.k8s.io
roleRef:
# "roleRef" specifies the binding to a Role / ClusterRole
kind: Role #this must be Role or ClusterRole
name: pod-reader # this must match the name of the Role or ClusterRole you wish to bind to apiGroup: rbac.authorization.k8s.io apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata:
namespace: default
name: pod-reader
rules:
- apiGroups: [""] # "" indicates the core API group
resources: ["pods"]
verbs: ["get", "watch", "list"]
質問 # 14
SIMULATION
Create a RuntimeClass named untrusted using the prepared runtime handler named runsc.
Create a Pods of image alpine:3.13.2 in the Namespace default to run on the gVisor runtime class.
Verify: Exec the pods and run the dmesg, you will see output like this:-

  • A. Send us your feedback on it.

正解:A
質問 # 15
...... Jpexamを利用するのは君の合格率を100%保証いたします。Jpexamは多種なLinux Foundation認証試験を受ける方を正確な資料を提供者でございます。弊社の無料なCKSサンプルを遠慮なくダウンロードしてください。 CKS最新テスト: https://www.jpexam.com/CKS_exam.html 全てのLinux FoundationのCKS「Certified Kubernetes Security Specialist (CKS)」試験は非常に大切ですが、この情報技術が急速に発展している時代に、Jpexamはただその中の一つだけです、PCバージョンのCKSトレーニングトレント:Certified Kubernetes Security Specialist (CKS)は実際のテスト環境を模倣し、Jpexam時間制限のあるテストを実施できます、CKS試験学習資料を開発する専業チーム、最短時間でCKS試験に合格できるだけでなく、夢のあるCKS認定資格を取得して将来を明るくすることもできます、我々のCKS試験指導資料は、製品の購入時に特恵を講じることを好む大多数の人々の要求に応えるため、CKS練習試験問題を購入したすべてのお客様は一年間の無料更新サービスを提供します、Linux Foundation CKS学習体験談 これは心のヘルプだけではなく、試験に合格することで、明るい未来を持つこともできるようになります。 地球で何が起こっても、適切に評価し、それを私たちの思考に統合し、知識生産の実(https://www.jpexam.com/CKS_exam.html)践に組織化する必要があります、習慣化していた大好きな一人遊びを理由なく苦痛に感じるまで絶対我慢するはずがない、との変な自信が美樹を一つの回答に近づける。

試験の準備方法-実際的なCKS学習体験談試験-信頼的なCKS最新テスト

全てのLinux FoundationのCKS「Certified Kubernetes Security Specialist (CKS)」試験は非常に大切ですが、この情報技術が急速に発展している時代に、Jpexamはただその中の一つだけです、PCバージョンのCKSトレーニングトレント:Certified Kubernetes Security Specialist (CKS)は実際のテスト環境を模倣し、Jpexam時間制限のあるテストを実施できます。 CKS試験学習資料を開発する専業チーム、最短時間でCKS試験に合格できるだけでなく、夢のあるCKS認定資格を取得して将来を明るくすることもできます、我々のCKS試験指導資料は、製品の購入時に特恵を講じることを好む大多数の人々の要求に応えるため、CKS練習試験問題を購入したすべてのお客様は一年間の無料更新サービスを提供します。