- Why should you use an external authentication provider in Kubernetes, such as AAD?
- Why is disabling public access to Kubernetes Dashboard important?
- What is the reason for recommending the encryption of etcd data storage at rest?
- Can you run privileged containers on Windows machines?
- What are network policies in Kubernetes and what are the prerequisites to have them enabled?
- What is the main difference between Linux and Windows nodes when it comes to mounting secrets as volumes?
- Why is injecting secrets as environment variables considered less safe than using volumes, especially on Linux nodes?
You can find answers to these questions in Assessments of this book.