Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CNPA Exam Dumps - Certified Cloud Native Platform Engineering Associate

Go to page:
Question # 4

A developer is tasked with securing a Kubernetes cluster and needs to implement Role-Based Access Control (RBAC) to manage user permissions. Which of the following statements about RBAC in Kubernetes is correct?

A.

RBAC does not support namespace isolation and applies globally across the cluster.

B.

RBAC allows users to have unrestricted roles and access to all resources in the cluster.

C.

RBAC is only applicable to Pods and does not extend to other Kubernetes resources.

D.

RBAC uses roles and role bindings to grant permissions to users for specific resources and actions.

Full Access
Question # 5

A platform team is deciding whether to invest engineering time into automating cluster autoscaling. Which of the following best justifies making this automation a priority?

A.

Cluster autoscaling is a repetitive task that increases toil when done manually.

B.

Manual upgrade tasks help platform teams stay familiar with system internals.

C.

Most engineers prefer doing upgrade tasks manually and prefer to review each one.

D.

Automation tools are better than manual processes, regardless of context.

Full Access
Question # 6

A software development team is struggling to adopt a new cloud native platform efficiently. How can a centralized developer portal, such as Backstage, help improve their adoption process?

A.

Provides a single access point for all platform services and documentation.

B.

Provides tutorials on unrelated programming languages.

C.

Offers a place for developers to share their personal projects and code snippets.

D.

Limits access to platform tools to only senior developers.

Full Access
Question # 7

In the context of platform engineering and the effective delivery of platform software, which of the following statements describes the role of CI/CD pipelines in relation to Software Bill of Materials (SBOM) and security scanning?

A.

SBOM generation and security scanning are particularly valuable for application software. While platform software may have different security considerations, these practices are highly beneficial within CI/CD pipelines for applications.

B.

CI/CD pipelines should integrate SBOM generation and security scanning as automated steps within the build and test phases to ensure early detection of vulnerabilities and maintain a clear inventory of components.

C.

CI/CD pipelines are designed to accelerate the delivery of platform software, and adding SBOM generation and security scanning would slow down the process, so these activities are better suited for periodic audits conducted outside of the pipeline.

D.

CI/CD pipelines are primarily for automating deployments; SBOM generation and security scanning are separate, manual processes performed after deployment.

Full Access
Question # 8

Which metric measures a cloud native platform's impact on developer productivity and deployment speed?

A.

Monitor overall cloud infrastructure cost and resource consumption.

B.

Track average time from code commits to successful production deployment.

C.

Evaluate total security vulnerabilities detected during platform usage.

D.

Measure total cloud resource utilization across all development teams.

Full Access
Go to page: