File size: 7,850 Bytes
a28c20d
e824361
 
 
 
 
b809b77
e824361
 
 
 
a28c20d
e824361
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
a28c20d
e824361
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
a28c20d
e824361
 
 
 
a28c20d
e824361
 
 
 
 
 
a28c20d
e824361
 
 
 
a28c20d
e824361
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
 
 
 
 
a28c20d
e824361
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
Question, Answer
"Which of these features does Cilium provide?
**Select all answers that apply.**
- a. Network policy enforcement
- b. Visibility into traffic at L3/L4 and L7
- c. Networking between Kubernetes pods
- d. Kubernetes secrets management","Answer: a, b, c"
"What is the name of the Cilium component that provides visibility into network traffic?

- a. Hubble
- b. Hobble
- c. Grafana","Answer: a"
"Which of these are characteristics of eBPF?
- a. It allows dynamic changes to the kernel
- b. It can be used to drop network packets that are forbidden by the network policy
- c. It enables high-performance networking with security and observability built-in","Answer: d"
"What are the different tools for installing Cilium components into a Kubernetes cluster?
**Select all that apply.**

- a. Helm
- b. The Cilium CLI
- c. Curl","Answer: a, b"
"A Cilium agent runs on every node in a Kubernetes cluster. 

**True/False**

- a. True
- b. False","Answer: a"
"How many instances of the Hubble Relay run on each cluster?

- a. One per node
- b. One per pod
- c. One per cluster","Answer: c"
"What is the Cilium CLI command for checking that connectivity and policy enforcement is working correctly?

- a. kubectl connectivity test
- b. cilium connectivity test
- c. cilium policy test","Answer: b"
"Which network policy resource type does Cilium support?

- a. Standard Kubernetes NetworkPolicy
- b. CiliumNetworkPolicy
- c. CiliumClusterNetworkPolicy
- d. All of the above","Answer: d"
"It’s possible to export Layer 3 network policy using the networkpolicy.io’s visual policy editor as CiliumNetworkPolicy YAML files. 

**True/False**

- a. True
- b. False","Answer: a"
"Which of the following is a true statement? 
**Select all that apply.**

- a. The CiliumNetworkPolicy resource supports service name-based egress policy for internal cluster communications
- b. The standard Kubernetes NetworkPolicy resource supports L7 HTTP protocol rules limiting access to specific HTTP paths
- c. The CiliumNetworkPolicy resource supports both TCP and ICMP egress policy","Answer: a"
"Hubble flows include packet dumps. 
**True/False**

- a. True
- b. False","Answer: b"
"You can filter by packet verdict in the Hubble UI service map. 
**True/False**

- a. True
- b. False","Answer: a"
"Which of the following statements are **TRUE**? 
**Select all that apply.**

- a. The Hubble Relay service provides cluster-wide network observability
- b. It's not possible to filter flows by namespace using the Hubble CLI tool
- c. Hubble flows include information about traffic direction
- d. Hubble is optional and needs to be enabled when installing Cilium","Answer: a, c, d"
"After Istio is installed on a Kubernetes cluster, any workloads deployed to service mesh are automatically accompanied with sidecars.

**True/False**
a. True
b. False","Answer: b."
"How is outbound traffic from a service routed to the sidecar?

- a. Programmers must revise their code to specifically target the proxy at localhost:15000.
- b. iptables rules within a Pod are applied to transparently effect this change.
- c. Operators must use the istioctl rewire-pod command to transparently effect this change.","Answer: b."
"What identity framework does Istio base its application of workload identity?

- a. Security Assertion Markup Language (SAML)
- b. Open ID Connect (OIDC)
- c. Secure Production Identity Framework for Everyone (SPIFFE)
- d. JSON Web Tokens (JWT)","Answer: c."
"The Istio framework offers the choice between manually configuring Envoy sidecars and letting the Istio control plane manage Envoy.

**True/False**

- a. True
- b. False","Answer: b."
"The _demo_ configuration profile installs only the Istio control plane and the ingress gateway.

**True/False**

- a. True
- b. False","Answer: b."
"Helm installation consists of the following Helm charts:

- a. base, istiod, gateway
- b. istiod, ingress-gateway, egress-gateway
- c. istiod, gateways
- d. base, control-plane, gateway","Answer: a."
"In which section of the IstioOperator resource can we configure Kubernetes resource limits and requests:

- a. global
- b. meshConfig
- c. components
- d. We cannot configure limits and requests.","Answer: c."
"Observability is a concept that is broader than traditional monitoring.

**True/False**

- a. True
- b. False","Answer: a."
"What are the three main components of modern observability?

- a. Graphs, charts, and metrics
- b. Logs, metrics, and traces
- c. Logs, Garbage collection, and Threads","Answer: b."
"With Istio, developers must expose their metrics to Prometheus directly from inside their applications.

**True/False**

- a. True
- b. False","Answer: b."
"Envoy sidecars can initiate and propagate B3 trace headers without any assistance from the running applications. 

**True/False**

- a. True
- b. False","Answer: b."
"Istio, Prometheus, Grafana, Jaeger, and Kiali are all open source projects.

**True/False**

- a. True
- b. False","Answer: a."
"The ingress and egress gateways in Istio are single instances of an Envoy proxy. 

**True/False**

- a. True
- b. False","Answer: a."
"In which resource can we configure outlier detection and load balancer settings?

- a. VirtualService
- b. DestinationRule
- c. Gateway
- d. ServiceEntry","Answer: b."
"The traffic can be matched on multiple properties and to match the values, we can only use regular expressions.

**True/False**

- a. True
- b. False","Answer: b."
"When Envoy retries a failed request, the endpoint that caused the retry is no longer in the load balancing pool. 

**True/False**

- a. True
- b. False","Answer: a."
"Authorization is all about the principal. 

**True/False**

- a. True
- b. False","Answer: b."
"Which one of the following resources can we use to configure mTLS for inbound traffic?

- a. PeerAuthentication
- b. DestinationRule
- c. VirtualService
- d. AuthorizationPolicy","Answer: a."
"What do Kubernetes pods use as their identity during runtime?

- a. Kubernetes secrets
- b. Service accounts
- c. JWT tokens
- d. Bearer tokens","Answer: b."
"The clusters section in the Envoy configuration defines how the traffic is sent to the upstream service. 

**True/False**

- a. True
- b. False","Answer: a."
"Where in the Envoy configuration is the router filter defined?

- a. Within the HTTP connection manager filter
- b. Within the routes
- c. Within the listener filter
- d. Within the clusters","Answer: a."
"We can apply the Envoy configuration patch only at the namespace level. 

**True/False**

- a. True
- b. False","Answer: b."
"When using the **oci://** scheme in the WasmPlugin resource, the Istio agent downloads compiled Wasm plugins from an OCI-compliant registry.

**True/False**

- a. True
- b. False","Answer: a."
"By default, Istio watches all workloads in all namespaces and updates sidecar proxy configuration whenever new workloads are added, removed, or updated. 

**True/False**

- a. True
- b. False","Answer: a."
"Which Istio resource can be used to provide the details about the namespace, labels, and service account to the VM workload?

- a. WorkloadEntry
- b. VirtualService
- c. ServiceEntry
- d. ServiceEntry","Answer: a."
"The primary cluster in the multi-cluster deployment scenario runs the control plane. 

**True/False**

- a. True
- b. False","Answer: a."
"What is the east-west gateway used for?

- a. Service communication within a single Kubernetes cluster
- b. Communication between Istio control plane and services within one cluster
- c. Communication between workloads in the cluster and VMs
- d. Communication between workloads in the cluster and VMs, VM sidecars, and Istio’s control plane","Answer: d."
"The process of deploying an Envoy proxy alongside each workload is called:

- a. proxy bundling
- b. sidecar injection
- c. sidecar bundling
- d. proxy injection","Answer: d."