This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Choose the best response for each of the questions that follow.
Which solution best mitigates the risk of long-lived credentials stored in Kubernetes secrets?
Use workload identities to issue short-lived tokens tied to pod identities.
Encrypt Kubernetes secrets at rest using cloud key management services.
Store secrets in configuration files with restricted access.
What is a key benefit of using Azure Arc in a multicloud Kubernetes environment?
Enables consistent policy enforcement across AKS and EKS clusters.
Automatically encrypts all data in transit between clusters.
Replaces the need for cloud-native monitoring tools.
Which threat vector is most associated with insecure CI/CD pipelines?
Injection of malicious code during automated deployments.
Unauthorized access to encrypted database columns.
Excessive use of role-based access control (RBAC).
What is the primary advantage of using Always Encrypted in Azure SQL?
Protects data in use by keeping encryption keys outside the database.
Filters query results based on user roles.
Redacts sensitive data in query results.
You must answer all questions before checking your work.
Was this page helpful?
Need help with this topic?
Want to try using Ask Learn to clarify or guide you through this topic?