Google Cloud Professional Cloud Security Engineer Practice Exam

Disable ads (and more) with a membership for a one time $4.99 payment

Prepare for the Google Cloud Professional Cloud Security Engineer Exam with our interactive quiz. Study with flashcards and multiple-choice questions, complete with hints and explanations. Ace your exam with confidence!

Practice this question and more.


What should be the configuration for Pods that need to avoid being scheduled on non-in-scope Nodes?

  1. Use affinity rules for scheduling Pods

  2. Specify tolerations to match the taints of in-scope Nodes

  3. Utilize a controller for Pod lifecycle management

  4. Apply network segmentation for security

The correct answer is: Specify tolerations to match the taints of in-scope Nodes

Specifying tolerations to match the taints of in-scope Nodes is the best configuration approach for ensuring that Pods are scheduled only on designated Nodes that meet specific criteria. Taints and tolerations are key concepts in Kubernetes that facilitate this level of control. When Nodes are tainted, they are marked in such a way that Pods that do not have corresponding tolerations will not be scheduled on these Nodes. By explicitly defining tolerations in the Pod specification that match the taints applied to in-scope Nodes, you impose a condition that allows scheduling only on those selected Nodes. This mechanism effectively prevents Pods from being scheduled on non-compliant Nodes, which is crucial for maintaining a secure and optimized cluster environment. The other options also involve management of Pod scheduling and security but do not specifically address the requirement of ensuring Pod placement strictly on in-scope Nodes. While affinity rules could help influence Pod placement based on Node characteristics, they may not restrict Pods from being scheduled on undesired Nodes as effectively as using taints and tolerations. Utilizing a controller could assist in lifecycle management but does not directly impact where Pods are scheduled. Lastly, applying network segmentation deals primarily with network security rather than the scheduling of Pods on specific Nodes.