Download Kubernetes and Cloud Native Associate.KCNA.Pass4Success.2026-01-25.64q.tqb

Vendor: Linux Foundation
Exam Code: KCNA
Exam Name: Kubernetes and Cloud Native Associate
Date: Jan 25, 2026
File Size: 4 MB

How to open TQB files?

Files with TQB (Taurus Question Bank) extension can be opened by Taurus Exam Studio.

Demo Questions

Question 1
What framework does Kubernetes use to authenticate users with JSON Web Tokens?
  1. OpenID Connect
  2. OpenID Container
  3. OpenID Cluster
  4. OpenID CNCF
Correct answer: A
Explanation:
Kubernetes commonly authenticates users using OpenID Connect (OIDC) when JSON Web Tokens (JWTs) are involved, so A is correct. OIDC is an identity layer on top of OAuth 2.0 that standardizes how clients obtain identity information and how JWTs are issued and validated.In Kubernetes, authentication happens at the API server. When OIDC is configured, the API server validates incoming bearer tokens (JWTs) by checking token signature and claims against the configured OIDC issuer and client settings. Kubernetes can use OIDC claims (such as sub, email, groups) to map the authenticated identity to Kubernetes RBAC subjects. This is how enterprises integrate clusters with identity providers such as Okta, Dex, Azure AD, or other OIDC-compliant IdPs.Options B, C, and D are fabricated phrases and not real frameworks. Kubernetes documentation explicitly references OIDC as a supported method for token-based user authentication (alongside client certificates, bearer tokens, static token files, and webhook authentication). The key point is that Kubernetes does not ''invent'' JWT auth; it integrates with standard identity providers through OIDC so clusters can participate in centralized SSO and group-based authorization.Operationally, OIDC authentication is typically paired with:RBAC for authorization (''what you can do'')Audit logging for traceabilityShort-lived tokens and rotation practices for securityGroup claim mapping to simplify permission managementSo, the verified framework Kubernetes uses with JWTs for user authentication is OpenID Connect.
Kubernetes commonly authenticates users using OpenID Connect (OIDC) when JSON Web Tokens (JWTs) are involved, so A is correct. OIDC is an identity layer on top of OAuth 2.0 that standardizes how clients obtain identity information and how JWTs are issued and validated.
In Kubernetes, authentication happens at the API server. When OIDC is configured, the API server validates incoming bearer tokens (JWTs) by checking token signature and claims against the configured OIDC issuer and client settings. Kubernetes can use OIDC claims (such as sub, email, groups) to map the authenticated identity to Kubernetes RBAC subjects. This is how enterprises integrate clusters with identity providers such as Okta, Dex, Azure AD, or other OIDC-compliant IdPs.
Options B, C, and D are fabricated phrases and not real frameworks. Kubernetes documentation explicitly references OIDC as a supported method for token-based user authentication (alongside client certificates, bearer tokens, static token files, and webhook authentication). The key point is that Kubernetes does not ''invent'' JWT auth; it integrates with standard identity providers through OIDC so clusters can participate in centralized SSO and group-based authorization.
Operationally, OIDC authentication is typically paired with:
RBAC for authorization (''what you can do'')
Audit logging for traceability
Short-lived tokens and rotation practices for security
Group claim mapping to simplify permission management
So, the verified framework Kubernetes uses with JWTs for user authentication is OpenID Connect.
Question 2
To specify a Kubernetes object which language is used?
  1. JSON
  2. Go
  3. YAML
  4. Node
  5. Python
Correct answer: C
Explanation:
https://kubernetes.io/docs/concepts/overview/working-with-objects/kubernetes-objects/
https://kubernetes.io/docs/concepts/overview/working-with-objects/kubernetes-objects/
Question 3
Which of the following is used to request storage in Kubernetes?
  1. PersistentVolume 'PV'
  2. PersistentVolumeClaim 'PVC'
  3. Container Storage Interface 'CSI'
  4. StorageClasses
Correct answer: B
Explanation:
https://kubernetes.io/docs/concepts/storage/persistent-volumes/
https://kubernetes.io/docs/concepts/storage/persistent-volumes/
Question 4
What kind of limitation cgroups allows?
  1. Prioritization
  2. Resource limiting
  3. Accounting
  4. None of the options
  5. Control
  6. Server cpu and memory
Correct answer: A, B, C, E
Question 5
Flux is built using which toolkit?
  1. CI/CD
  2. DevSecOps
  3. GitOps
  4. DevOps
Correct answer: C
Explanation:
https://fluxcd.io/
https://fluxcd.io/
Question 6
What is Open Container Initiative 'OCI'?
  1. A protocol for communicating with the kubernetes api
  2. The governing body of the Cloud Native Computing Foundation 'CNCF'
  3. An open standard for managing service mesh in kubernetes
  4. An organization that creates open standards for containers
Correct answer: D
Explanation:
https://opencontainers.org/
https://opencontainers.org/
Question 7
Which style of operations are preferred for kubernetes and cloud-native applications?
  1. Imperative
  2. None of the above
  3. Declarative
Correct answer: C
Explanation:
https://kubernetes.io/docs/tasks/manage-kubernetes-objects/declarative-config/#trade-offs
https://kubernetes.io/docs/tasks/manage-kubernetes-objects/declarative-config/#trade-offs
Question 8
Which command is used to expose Kubernetes service
  1. kubectl expose
  2. kubectl create
  3. kubectl run
Correct answer: A
Explanation:
https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#expose
https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#expose
Question 9
How should folks new to the cloud native ecosystem, go about learning the different aspects of the ecosystem?
  1. by signing up the CNCF slack
  2. by reading the Kubernetes documentation
  3. by looking at the cloud native landscape
  4. by looking at the cloud native trail-map
Correct answer: D
Explanation:
https://github.com/cncf/landscape#trail-map
https://github.com/cncf/landscape#trail-map
Question 10
An application that is nearing its usage limit. To increase the amount of users it can handle, you allo-cate additional memory resources to each instance of the application. What type of scaling is this?
  1. Horizontal Scaling
  2. Cluster Autoscaling
  3. Recursive Scaling
  4. Vertical Scaling
Correct answer: D
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!