You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- content: "What is the purpose of Azure Policy in relation to Kubernetes clusters?"
18
-
choices:
19
-
- content: "Azure Policy is used to manage and report on the compliance state of your Kubernetes clusters from multiple places."
20
-
isCorrect: false
21
-
explanation: "Incorrect. Azure Policy allows for centralized management and reporting of compliance state."
22
-
- content: "Azure Policy is used to deploy policy definitions into the cluster as pod templates."
23
-
isCorrect: false
24
-
explanation: "Incorrect. Azure Policy deploys policy definitions as constraint templates and constraint custom resources."
25
-
- content: "Enables the automation and validation of the creation and teardown of environments to help deliver secure and stable application hosting platforms."
26
-
isCorrect: true
27
-
explanation: "Correct. Azure Policy applies at scale enforcements and safeguards on Kubernetes clusters in a centralized, consistent manner to ensure secure and stable application hosting platforms."
28
-
- content: "What is host based encryption in Azure Kubernetes Service (AKS)?"
29
-
choices:
30
-
- content: "Encryption of data at rest using server side encryption with platform managed keys"
31
-
isCorrect: false
32
-
explanation: "Incorrect. Server side encryption with platform managed keys is used by Azure Storage, not host based encryption in AKS."
33
-
- content: "Encryption of data at rest using customer managed keys for all disks"
34
-
isCorrect: false
35
-
explanation: "Incorrect. Host based encryption in AKS can use either platform managed keys or customer managed keys depending on the encryption type set on the disks."
36
-
- content: "Enables encryption of data at rest on the VM host of AKS agent nodes using platform or customer managed keys, and encrypts data flows to the Storage service"
37
-
isCorrect: true
38
-
explanation: "Correct. Host based encryption in AKS encrypts data at rest on the VM host of AKS agent nodes using platform or customer managed keys, and encrypts data flows to the Storage service. It can be enabled at cluster or node pool creation time and requires a specific VM set type and supported VM sizes."
39
-
- content: "What are the two Azure built-in roles that have the appropriate Azure RBAC policy assignment operations to assign a policy definition to your Kubernetes cluster?"
40
-
choices:
41
-
- content: "Resource Group Contributor and Reader"
42
-
isCorrect: false
43
-
explanation: "Incorrect. Resource Group Contributor and Reader do not have the appropriate Azure RBAC policy assignment operations to assign a policy definition to your Kubernetes cluster."
44
-
- content: "Virtual Machine Contributor and Network Contributor"
45
-
isCorrect: false
46
-
explanation: "Incorrect. Virtual Machine Contributor and Network Contributor do not have the appropriate Azure RBAC policy assignment operations to assign a policy definition to your Kubernetes cluster."
47
-
- content: "Resource Policy Contributor and Owner"
48
-
isCorrect: true
49
-
explanation: "Correct. Resource Policy Contributor and Owner have the appropriate Azure RBAC policy assignment operations to assign a policy definition to your Kubernetes cluster."
50
-
- content: "What is the purpose of Azure Policy in relation to Kubernetes clusters?"
51
-
choices:
52
-
- content: "Azure Policy is used to deploy policy definitions into the cluster as pod templates."
53
-
isCorrect: false
54
-
explanation: "Incorrect. Azure Policy deploys policy definitions as constraint templates and constraint custom resources."
55
-
- content: "Azure Policy is used to manage and report on the compliance state of your Kubernetes clusters from multiple places."
56
-
isCorrect: false
57
-
explanation: "Incorrect. Azure Policy allows for centralized management and reporting of compliance state."
58
-
- content: "Enables the automation and validation of the creation and teardown of environments to help deliver secure and stable application hosting platforms."
59
-
isCorrect: true
60
-
explanation: "Correct. Azure Policy applies at scale enforcements and safeguards on Kubernetes clusters in a centralized, consistent manner to ensure secure and stable application hosting platforms."
- content: "What is the purpose of Azure Policy in relation to Kubernetes clusters?"
22
+
choices:
23
+
- content: "Azure Policy is used to manage and report on the compliance state of your Kubernetes clusters from multiple places."
24
+
isCorrect: false
25
+
explanation: "Incorrect. Azure Policy allows for centralized management and reporting of compliance state."
26
+
- content: "Azure Policy is used to deploy policy definitions into the cluster as pod templates."
27
+
isCorrect: false
28
+
explanation: "Incorrect. Azure Policy deploys policy definitions as constraint templates and constraint custom resources."
29
+
- content: "Enables the automation and validation of the creation and teardown of environments to help deliver secure and stable application hosting platforms."
30
+
isCorrect: true
31
+
explanation: "Correct. Azure Policy applies at scale enforcements and safeguards on Kubernetes clusters in a centralized, consistent manner to ensure secure and stable application hosting platforms."
32
+
- content: "What is host based encryption in Azure Kubernetes Service (AKS)?"
33
+
choices:
34
+
- content: "Encryption of data at rest using server side encryption with platform managed keys"
35
+
isCorrect: false
36
+
explanation: "Incorrect. Server side encryption with platform managed keys is used by Azure Storage, not host based encryption in AKS."
37
+
- content: "Encryption of data at rest using customer managed keys for all disks"
38
+
isCorrect: false
39
+
explanation: "Incorrect. Host based encryption in AKS can use either platform managed keys or customer managed keys depending on the encryption type set on the disks."
40
+
- content: "Enables encryption of data at rest on the VM host of AKS agent nodes using platform or customer managed keys, and encrypts data flows to the Storage service"
41
+
isCorrect: true
42
+
explanation: "Correct. Host based encryption in AKS encrypts data at rest on the VM host of AKS agent nodes using platform or customer managed keys, and encrypts data flows to the Storage service. It can be enabled at cluster or node pool creation time and requires a specific VM set type and supported VM sizes."
43
+
- content: "What are the two Azure built-in roles that have the appropriate Azure RBAC policy assignment operations to assign a policy definition to your Kubernetes cluster?"
44
+
choices:
45
+
- content: "Resource Group Contributor and Reader"
46
+
isCorrect: false
47
+
explanation: "Incorrect. Resource Group Contributor and Reader do not have the appropriate Azure RBAC policy assignment operations to assign a policy definition to your Kubernetes cluster."
48
+
- content: "Virtual Machine Contributor and Network Contributor"
49
+
isCorrect: false
50
+
explanation: "Incorrect. Virtual Machine Contributor and Network Contributor do not have the appropriate Azure RBAC policy assignment operations to assign a policy definition to your Kubernetes cluster."
51
+
- content: "Resource Policy Contributor and Owner"
52
+
isCorrect: true
53
+
explanation: "Correct. Resource Policy Contributor and Owner have the appropriate Azure RBAC policy assignment operations to assign a policy definition to your Kubernetes cluster."
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/configure-azure-kubernetes-service-cluster/includes/1-introduction.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,3 +16,4 @@ After completing this module, you'll be able to:
16
16
## Goals
17
17
18
18
The goal of this module is to teach you how to use Azure Policy to enforce policies and safeguards on your Kubernetes clusters at scale. Azure Policy Ensures that your cluster is secure, compliant, and consistent across your organization.
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/configure-azure-kubernetes-service-cluster/includes/2-understand-azure-policy-kubernetes-clusters.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,3 +28,4 @@ The following recommendation applies only to AKS and the Azure Policy Add-on:
28
28
- Use system node pool with CriticalAddonsOnly taint to schedule Gatekeeper pods.
29
29
- Secure outbound traffic from your AKS clusters.
30
30
- If the cluster has aad-pod-identity enabled, Node Managed Identity (NMI) pods modify the nodes' iptables to intercept calls to the Azure Instance Metadata endpoint.
0 commit comments