10 KCNA questions with full explanations for every option, free to view on this page.
Container Orchestration
Q1. What does the CRI (Container Runtime Interface) do in Kubernetes?
Reveal answer and explanations
AEncrypts container traffic
Incorrect. Encryption is a separate security concern.
BDefines an interface between kubelet and container runtimes
Correct. CRI is a plugin interface that allows kubelet to work with different container runtimes like containerd, CRI-O, etc.
CManages container images on registry servers
Incorrect. The CRI doesn't manage registries.
DSchedules containers on nodes
Incorrect. The scheduler assigns Pods; kubelet uses CRI to start containers.
Container Orchestration
Q2. Why use multi-stage builds for container images?
Reveal answer and explanations
ATo support multiple container runtimes
Incorrect. Multi-stage builds are not primarily about supporting multiple container runtimes.
BTo enable parallel image builds
Incorrect. They may improve caching, but the key pattern is separating build and runtime contents.
CTo run multiple containers simultaneously
Incorrect. Container count at runtime is controlled by Pod or workload specs; multi-stage builds are about Dockerfile build stages and final image contents.
DTo reduce final image size by separating build dependencies from runtime dependencies
Correct. Multi-stage builds keep build dependencies out of the final image, reducing size and attack surface.
Container Orchestration
Q3. What is containerd?
Reveal answer and explanations
AA container image repository
Incorrect. Registries store images; containerd runs them.
BA networking plugin for containers
Incorrect. containerd doesn't handle networking.
CAn OCI-compliant container runtime that manages containers
Correct. containerd is an industry-standard OCI-compliant container runtime that manages container lifecycle.
DA Kubernetes distribution
Incorrect. containerd is a runtime, not a Kubernetes distribution.
Container Orchestration
Q4. One app can run from a static binary, while another needs CA certs and runtime libraries but no shell. How do scratch and distroless differ?
Reveal answer and explanations
ADistroless is empty, while scratch includes common Linux debugging tools
Incorrect. scratch is the empty starting point; distroless is not a debugging-tool image.
BScratch is only for stateful apps, while distroless is only for stateless apps
Incorrect. The distinction is image contents, not stateful versus stateless application design.
CScratch and distroless are identical names for the same base image
Incorrect. They are different approaches to minimal container base images.
Dscratch is empty; distroless adds runtime deps without shell/package manager
Correct. scratch is Docker's empty base image, while distroless images include only the runtime dependencies needed to run the application and omit package managers and shells.
Container Orchestration
Q5. What is the purpose of this Dockerfile instruction? ```dockerfile
FROM
```
Reveal answer and explanations
ATo expose ports from the container
Incorrect. `EXPOSE` documents container ports; `FROM` selects the base image layer for the build.
BTo specify the base image to build upon
Correct. FROM specifies the parent/base image that the new image builds on, starting the image layer chain.
CTo copy files into the image
Incorrect. COPY or ADD instructions copy files.
DTo set the working directory inside the image
Incorrect. WORKDIR sets the working directory.
Container Orchestration
Q6. An upgraded cluster no longer supports PodSecurityPolicy. What replaced PSP for built-in Pod admission controls?
Reveal answer and explanations
ASecurityContext settings without admission enforcement
Incorrect. SecurityContext fields define what a Pod requests, but a cluster still needs admission enforcement if it wants to require a Pod security profile.
BNetworkPolicy objects
Incorrect. NetworkPolicy controls traffic, not Pod security admission.
CRBAC RoleBindings by themselves
Incorrect. RBAC controls API permissions, not Pod spec security profiles by itself.
DPod Security Admission using Pod Security Standards
Correct. PodSecurityPolicy was removed, and Kubernetes uses Pod Security Admission with Pod Security Standards for built-in Pod security enforcement.
Container Orchestration
Q7. What is the difference between a container image layer and a container instance?
Reveal answer and explanations
AThey are the same thing
Incorrect. They serve different purposes.
BLayers only exist in registries; instances only exist on nodes
Incorrect. Layers exist in images (which are stored in registries and on nodes); instances run on nodes.
CLayers are immutable filesystem snapshots in an image; an instance is a running container from that image
Correct. Image layers are immutable stacked filesystems; a running container instance gets a read-write layer on top.
DA layer is a read-write copy; an instance is read-only
Incorrect. The properties are reversed.
Container Orchestration
Q8. What does container runtime sandboxing provide?
Reveal answer and explanations
AStronger isolation with gVisor, Kata, or lightweight VMs
Correct. Sandboxing runtimes add stronger isolation boundaries, often through user-space kernels or lightweight VMs.
BEncrypting every container-to-container connection by default
Incorrect. Network encryption is a separate concern from runtime sandboxing.
CLimiting network bandwidth for each Pod
Incorrect. Bandwidth limiting is not the definition of runtime sandboxing.
DUsing the same host kernel isolation without any extra runtime boundary
Incorrect. Standard host-kernel isolation is the baseline that sandboxing aims to strengthen.
Container Orchestration
Q9. What is the CNI (Container Network Interface)?
Reveal answer and explanations
AA service discovery mechanism
Incorrect. Service discovery is separate.
BA specification for container networking plugins
Correct. CNI is a specification defining how container networking plugins integrate with orchestrators.
CA tool for encrypting container communication
Incorrect. Encryption is separate from CNI.
DKubernetes built-in networking for Pods
Incorrect. Kubernetes requires CNI plugins; it's not built-in.
Container Orchestration
Q10. A baseline requires containers to write only to mounted volumes, not the image filesystem. Which SecurityContext setting supports this?
Reveal answer and explanations
ATo prevent writing to the /root directory
Incorrect. The setting applies to the container root filesystem, not just the /root directory.
BTo make the container's root filesystem immutable, allowing only emptyDir volumes to be written
Correct. readOnlyRootFilesystem makes the container root filesystem read-only, forcing writes to explicit writable mounts.
CTo disable container logging
Incorrect. It does not disable logging; applications can still write to mounted log destinations or stdout/stderr.
DTo encrypt the container's filesystem
Incorrect. Filesystem encryption is a separate storage/security control.
These questions are written against the current KCNA curriculum — not scraped exam dumps. The full KCNA library here has 120 questions; the broader platform covers the rest of the Golden Kubestronaut path.