- Which component can be used as a central point for managing and prevent vulnerabilities from being released?
- What are three methods for authorization within a Kubernetes cluster?
- Which parameter of a PodSecurityPolicy disallows the running of privileged containers?
- How do you list all secrets that you have access to in a cluster?