Question
stringlengths
72
390
Answer
stringlengths
9
15
Which of these features does Cilium provide? **Select all answers that apply.** - a. Network policy enforcement - b. Visibility into traffic at L3/L4 and L7 - c. Networking between Kubernetes pods - d. Kubernetes secrets management
Answer: a, b, c
What is the name of the Cilium component that provides visibility into network traffic? - a. Hubble - b. Hobble - c. Grafana
Answer: a
Which of these are characteristics of eBPF? - a. It allows dynamic changes to the kernel - b. It can be used to drop network packets that are forbidden by the network policy - c. It enables high-performance networking with security and observability built-in
Answer: d
What are the different tools for installing Cilium components into a Kubernetes cluster? **Select all that apply.** - a. Helm - b. The Cilium CLI - c. Curl
Answer: a, b
A Cilium agent runs on every node in a Kubernetes cluster.  **True/False** - a. True - b. False
Answer: a
How many instances of the Hubble Relay run on each cluster? - a. One per node - b. One per pod - c. One per cluster
Answer: c
What is the Cilium CLI command for checking that connectivity and policy enforcement is working correctly? - a. kubectl connectivity test - b. cilium connectivity test - c. cilium policy test
Answer: b
Which network policy resource type does Cilium support? - a. Standard Kubernetes NetworkPolicy - b. CiliumNetworkPolicy - c. CiliumClusterNetworkPolicy - d. All of the above
Answer: d
It’s possible to export Layer 3 network policy using the networkpolicy.io’s visual policy editor as CiliumNetworkPolicy YAML files.  **True/False** - a. True - b. False
Answer: a
Which of the following is a true statement?  **Select all that apply.** - a. The CiliumNetworkPolicy resource supports service name-based egress policy for internal cluster communications - b. The standard Kubernetes NetworkPolicy resource supports L7 HTTP protocol rules limiting access to specific HTTP paths - c. The CiliumNetworkPolicy resource supports both TCP and ICMP egress policy
Answer: a
Hubble flows include packet dumps.  **True/False** - a. True - b. False
Answer: b
You can filter by packet verdict in the Hubble UI service map.  **True/False** - a. True - b. False
Answer: a
Which of the following statements are **TRUE**?  **Select all that apply.** - a. The Hubble Relay service provides cluster-wide network observability - b. It's not possible to filter flows by namespace using the Hubble CLI tool - c. Hubble flows include information about traffic direction - d. Hubble is optional and needs to be enabled when installing Cilium
Answer: a, c, d
After Istio is installed on a Kubernetes cluster, any workloads deployed to service mesh are automatically accompanied with sidecars. **True/False** a. True b. False
Answer: b.
How is outbound traffic from a service routed to the sidecar? - a. Programmers must revise their code to specifically target the proxy at localhost:15000. - b. iptables rules within a Pod are applied to transparently effect this change. - c. Operators must use the istioctl rewire-pod command to transparently effect this change.
Answer: b.
What identity framework does Istio base its application of workload identity? - a. Security Assertion Markup Language (SAML) - b. Open ID Connect (OIDC) - c. Secure Production Identity Framework for Everyone (SPIFFE) - d. JSON Web Tokens (JWT)
Answer: c.
The Istio framework offers the choice between manually configuring Envoy sidecars and letting the Istio control plane manage Envoy. **True/False** - a. True - b. False
Answer: b.
The _demo_ configuration profile installs only the Istio control plane and the ingress gateway. **True/False** - a. True - b. False
Answer: b.
Helm installation consists of the following Helm charts: - a. base, istiod, gateway - b. istiod, ingress-gateway, egress-gateway - c. istiod, gateways - d. base, control-plane, gateway
Answer: a.
In which section of the IstioOperator resource can we configure Kubernetes resource limits and requests: - a. global - b. meshConfig - c. components - d. We cannot configure limits and requests.
Answer: c.
Observability is a concept that is broader than traditional monitoring. **True/False** - a. True - b. False
Answer: a.
What are the three main components of modern observability? - a. Graphs, charts, and metrics - b. Logs, metrics, and traces - c. Logs, Garbage collection, and Threads
Answer: b.
With Istio, developers must expose their metrics to Prometheus directly from inside their applications. **True/False** - a. True - b. False
Answer: b.
Envoy sidecars can initiate and propagate B3 trace headers without any assistance from the running applications.  **True/False** - a. True - b. False
Answer: b.
Istio, Prometheus, Grafana, Jaeger, and Kiali are all open source projects. **True/False** - a. True - b. False
Answer: a.
The ingress and egress gateways in Istio are single instances of an Envoy proxy.  **True/False** - a. True - b. False
Answer: a.
In which resource can we configure outlier detection and load balancer settings? - a. VirtualService - b. DestinationRule - c. Gateway - d. ServiceEntry
Answer: b.
The traffic can be matched on multiple properties and to match the values, we can only use regular expressions. **True/False** - a. True - b. False
Answer: b.
When Envoy retries a failed request, the endpoint that caused the retry is no longer in the load balancing pool.  **True/False** - a. True - b. False
Answer: a.
Authorization is all about the principal.  **True/False** - a. True - b. False
Answer: b.
Which one of the following resources can we use to configure mTLS for inbound traffic? - a. PeerAuthentication - b. DestinationRule - c. VirtualService - d. AuthorizationPolicy
Answer: a.
What do Kubernetes pods use as their identity during runtime? - a. Kubernetes secrets - b. Service accounts - c. JWT tokens - d. Bearer tokens
Answer: b.
The clusters section in the Envoy configuration defines how the traffic is sent to the upstream service.  **True/False** - a. True - b. False
Answer: a.
Where in the Envoy configuration is the router filter defined? - a. Within the HTTP connection manager filter - b. Within the routes - c. Within the listener filter - d. Within the clusters
Answer: a.
We can apply the Envoy configuration patch only at the namespace level.  **True/False** - a. True - b. False
Answer: b.
When using the **oci://** scheme in the WasmPlugin resource, the Istio agent downloads compiled Wasm plugins from an OCI-compliant registry. **True/False** - a. True - b. False
Answer: a.
By default, Istio watches all workloads in all namespaces and updates sidecar proxy configuration whenever new workloads are added, removed, or updated.  **True/False** - a. True - b. False
Answer: a.
Which Istio resource can be used to provide the details about the namespace, labels, and service account to the VM workload? - a. WorkloadEntry - b. VirtualService - c. ServiceEntry - d. ServiceEntry
Answer: a.
The primary cluster in the multi-cluster deployment scenario runs the control plane.  **True/False** - a. True - b. False
Answer: a.
What is the east-west gateway used for? - a. Service communication within a single Kubernetes cluster - b. Communication between Istio control plane and services within one cluster - c. Communication between workloads in the cluster and VMs - d. Communication between workloads in the cluster and VMs, VM sidecars, and Istio’s control plane
Answer: d.
The process of deploying an Envoy proxy alongside each workload is called: - a. proxy bundling - b. sidecar injection - c. sidecar bundling - d. proxy injection
Answer: d.