Computer Science Questions
Explore questions in the Computer Science category that you can ask Spark.E!
In version 4 clusters, the labels ensure what is deployed to the worker nodes only?
What is default setting of Pod Security Policy(PSP) of the IBM Cloud Kubernetes Service cluster
By default, __________ is how data is transported over an IBM Cloud Satellite link secured between source and destination resources.
----- is a network plug-in that is part of every Kubernetes Service cluster.
For Red Hat OpenShift on IBM Cloud Classic Infrastructure, which software-defined network can be used to act as a cluster firewall?
WHich pods are deployed to the edge nodes only?
There has been a change in administrators at your company. You want to make sure the administrator that left no longer has access to your cluster. How do you do this?
How to control who has access to the Private cloud service endpoint across different environments in Kubernetes service clusters?
Which pods are deployed to the gateway worker nodes?
What security policy is applied to VPC subnets that control traffic to and from a VPC cluster in Red Hat OpenShift on IBM Cloud?
What is the correct amount of worker nodes per zone that must be edge nodes in an ALB?
An engineer wants to enhance security of API service access. Which of the following correctly describes an appropriate measure to enhance security?
What network security option on the worker node endpoint controls traffic to and from a VPC cluster on Red Hat OpenShift on IBM Cloud?
What pod security policy should be assigned so that the team has only the required level of access and nothing extra when the application deployment team needs to deploy pods on the IBM Cloud Kubernetes service that can create host path volumes and can run with any user ID and group ID?
A client asked for help with controlling the access mechanism to a set of IKS clusters across different environments. Besides controlling access via IBM CloudIAM permissions to the IKS clusters, what other security configuration could be implemented to limit the risk of unauthorized access?
How can it be verified if a resource configuration of a new IKS cluster is following security best practices?
A production IKS cluster in a VPC has three worker nodes without any public exposure. The IKS cluster needs to access the IBM Cloud Container registry. Describe how this security control can be implemented.
What is the minimum permission required for a developer who wants to integrate the application's CD pipeline to the IKS cluster?
What is the minimum IBM Cloud IAM platform access required for a new SRE who is responsible for updating, adding/replacing worker nodes, and troubleshooting/reloading worker nodes of Red Hat OpenShift on the IBM Cloud cluster?
A client is running a firewall at their site and recently chose IKS in IBM Cloud but is unable to access their IKS cluster. List the correct sequence of commands to get the service endpoint and port number to add into the firewall in order to allow access.
