Which statement about Tanzu Mission Control policies is correct?
A. Policies can be configured using a tag selector to restrict the scope of the policy.
B. Policies can only be applied to clustergroups.
C. Policies allow management and operation of the security posture of Kubernetes clusters, and other organizational objects.
D. Policies can be enforced using Kubernetes resources (NetworkPolicy, ResourceQuota etc) or using the Kyverno admission controller.
Which tool can be used to backup and restore workloads on clusters provisioned by the VMware Tanzu Kubernetes Grid Service?
A. Site Recovery Manager
B. Restic
C. VMware vSohere Data Protection
D. Velero Plugin for VMware vSphere
Which two methods can be used to install Fluent Bit on a VMware Tanzu Kubernetes Grid cluster? (Choose two.)
A. Install Fluent Bit using Tanzu CLI login plugin
B. Install Fluent Bit using VMware Tanzu Kubernetes Grid Installer Interface
C. Install Fluent Bit from VMware Tanzu Mission Control
D. Install Fluent Bit from VMware vSphere Client
E. Install Fluent Bit using Tanzu CLI package plugin
Which two are valid options for obtaining kubectl config file in Tanzu Kubernetes environment? (Choose two.)
A. Use the command tubeccl vsphere login
B. Download from vSphere Ul
C. Download on the Supervisor Cluster Webpage
D. Access from vCenter Server Appliance Management Interface
E. Access from VMware Tanzu Mission Control
Which kinds of objects does the Kubernetes RBAC API declare?
A. CloudPolicyObject
B. Role, ClusterRole, RoleBinding and ClusterRoleBinding
C. Container type and Container object
D. ClusterObject and ClusterNode
Where can an administrator register the vSphere management cluster in VMware Tanzu Mission Control?
A. In the VMware Tanzu Mission Control web console or CLI
B. In the vSphere Management Cluster with Jcubeccl
C. In the vSphere Client - Workload Cluster settings
D. In the vSphere Namespace with Jcubeccl
A Tanzu Mission Control administrator would like to enforce the following container controls:
1.
Only allows container images that match the specified names or tags.
2.
Ensure that the container image is not tampered with.
Which type of policy can be used?
A. Access
B. Security
C. Image Security
D. Image Registry
E. Network
What is the Kubernetes component that is responsible for workload creation?
A. API Sep/er
B. Scheduler
C. etcd
D. Kubelel