Questions
Answer the following questions to test your knowledge of this chapter:
- What are data provenance and integrity? How are data provenance and data integrity different?
- What commands can a user run to verify the data provenance and integrity of a Helm chart? Which files are required to make this process possible?
- What considerations need to be taken into account to use and maintain secure container images?
- Why is it important to leverage resource requests and limits in your Helm chart? What other Kubernetes resources can be used to configure requests and limits?
- What is the Principle of Least Privilege? Which Kubernetes resources allow you to configure authorization and achieve the least privilege?
- Which flags can you use to authenticate to an HTTP(S) repository?
- Which flags can you use to authenticate to an OCI registry?