Kubernetes Objective Questions and Answers

Test your skills with Kubernetes objective questions with answers and detailed explanations. Covers RBAC, Pod Security, network policies, secrets management, image security, supply chain security, runtime protection, and cluster hardening.

This Kubernetes Security quiz contains carefully curated objective questions with correct answers and clear explanations. It is designed for DevOps engineers, platform teams, SREs, and cloud security learners to test your skills across cluster hardening, workload security, identity & access, network policies, secrets management, and modern supply chain security best practices.

Practice Kubernetes MCQs with Detailed Explanations

Answer at least 12 questions to submit.

1.
Which Kubernetes feature enforces fine-grained access control to API resources using roles and bindings?
Easy
2.
Which Pod Security Standard replaces PodSecurityPolicy in newer Kubernetes versions?
Medium
3.
Which component is responsible for authenticating requests to the Kubernetes API server?
Medium
4.
What is the primary security risk of running containers with the --privileged flag?
Medium
5.
Which Kubernetes object is used to limit east-west traffic between pods?
Medium
6.
Which practice best protects secrets at rest in Kubernetes?
Medium
7.
Which control helps prevent privilege escalation inside a container?
Medium
8.
What is the security benefit of using readOnlyRootFilesystem in a Pod spec?
Medium
9.
Which supply chain security measure verifies container image integrity before deployment?
Medium
10.
Which Kubernetes feature can block images with critical vulnerabilities from being deployed?
Medium
11.
Which configuration reduces the blast radius of a compromised pod?
Medium
12.
What is the main risk of mounting the Docker socket into a container?
High
13.
Which runtime security approach detects anomalous behavior inside running containers?
Medium
14.
Which Kubernetes resource limits resource exhaustion attacks from a noisy neighbor pod?
Medium
15.
Which component should be secured with mutual TLS in a production cluster?
High
Answered: 0 / 15