Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Linux Foundation Exam CKS Topic 1 Question 54 Discussion

Actual exam question for Linux Foundation's CKS exam
Question #: 54
Topic #: 1
[All CKS Questions]

Secrets stored in the etcd is not secure at rest, you can use the etcdctl command utility to find the secret value

for e.g:-

ETCDCTL_API=3 etcdctl get /registry/secrets/default/cks-secret --cacert="ca.crt" --cert="server.crt" --key="server.key"

Output

Using the Encryption Configuration, Create the manifest, which secures the resource secrets using the provider AES-CBC and identity, to encrypt the secret-data at rest and ensure all secrets are encrypted with the new configuration.

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Truman
1 days ago
Encrypting the secrets at rest is crucial for security. I'm glad they're providing a step-by-step on how to set that up. Can't wait to try it out!
upvoted 0 times
...
Niesha
17 days ago
Whoa, that's a handy trick to check the secrets in etcd! But I wonder if there's a more secure way to manage those secrets, ya know, without exposing them in the clear.
upvoted 0 times
Tracie
4 days ago
You can use encryption configuration to secure the secrets in etcd.
upvoted 0 times
...
...
Samira
19 days ago
That's true. We need to ensure all secrets are encrypted with the new configuration.
upvoted 0 times
...
Celestina
22 days ago
Yes, we can use the etcdctl command utility to find the secret value.
upvoted 0 times
...
Samira
26 days ago
I think storing secrets in etcd is not secure at rest.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77