Linux Foundation CKA Online Practice
Questions and Exam Preparation
CKA Exam Details
Exam Code
:CKA
Exam Name
:Linux Foundation Certified Kubernetes Administrator (CKA)
Certification
:Linux Foundation Certifications
Vendor
:Linux Foundation
Total Questions
:83 Q&As
Last Updated
:Jan 11, 2026
Linux Foundation CKA Online Questions &
Answers
Question 1:
SIMULATION
Task
Schedule a Pod as follows: Name: kucc8 App Containers: 2 Container Name/Images:
nginx
consul
Check the answer in explanation. explanation:
Solution:
Question 2:
SIMULATION
port: 80
policyTypes:
Context
An existing Pod needs to be integrated into the Kubernetes built-in logging architecture (e.g. kubectl logs). Adding a streaming sidecar container is a good and common way to accomplish this requirement.
Task
Add a sidecar container named sidecar, using the busybox image, to the existing Pod big-corp-app. The new sidecar container has to run the following command:
Use a Volume, mounted at /var/log, to make the log file big-corp-app.log available to the sidecar container.
Check the answer in explanation. explanation:
Solution:
Question 3:
SIMULATION
You must connect to the correct host.
Failure to do so may result in a zero score.
[candidate@base] $ ssh cka000056
Task
Review and apply the appropriate NetworkPolicy from the provided YAML samples. Ensure that the chosen NetworkPolicy is not overly permissive, but allows communication between the frontend and backend Deployments, which run in the frontend and backend namespaces respectively. First, analyze the frontend and backend Deployments to determine the specific requirements for the NetworkPolicy that needs to be applied. Next, examine the NetworkPolicy YAML samples located in the ~/netpol folder. Failure to comply may result in a reduced score.
❗ Do not delete or modify the provided samples. Only apply one of them.
Finally, apply the NetworkPolicy that enables communication between the frontend and backend Deployments, without being overly permissive.
Check the answer in explanation. explanation:
1. SSH into the correct host
ssh cka000056
2. Analyze the Deployments
Check the labels and ports used by the frontend and backend apps: kubectl get deployments -A -o wide
An NGINX Deployment named nginx-static is running in the nginx-static namespace. It is configured using a ConfigMap named nginx-config. First, update the nginx-config ConfigMap to also allow TLSv1.2 connections. You may re-create, restart, or scale resources as necessary. You can use the following command to test the changes:
This command renders the manifest with CRD installation disabled, targeting the correct namespace and version.
Optional: Verify YAML file is generated
ls -l ~/argo-helm.yaml head ~/argo-helm.yaml
Question 6:
SIMULATION
You must connect to the correct host.
Failure to do so may result in a zero score.
[candidate@base] $ ssh Cka000047
Task
A MariaDB Deployment in the mariadb namespace has been deleted by mistake. Your task is to restore the Deployment ensuring data persistence. Follow these steps:
Create a PersistentVolumeClaim (PVC ) named mariadb in the mariadb namespace with the following specifications:
Access mode ReadWriteOnce
Storage 250Mi
You must use the existing retained PersistentVolume (PV ).
Failure to do so will result in a reduced score.
There is only one existing PersistentVolume .
Edit the MariaDB Deployment file located at ~/mariadb-deployment.yaml to use PVC you created in the previous step.
Apply the updated Deployment file to the cluster.
Ensure the MariaDB Deployment is running and stable.
Step 3: Confirm the PVC is bound to the existing retained PV
kubectl get pv kubectl get pvc -n mariadb
Ensure the PVC named mariadb is Bound to the only existing Retained PV.
Step 4: Edit the Deployment YAML file
Edit ~/mariadb-deployment.yaml and update the volume section to mount the PVC.
Add inside the spec:
spec:
containers:
-
name: mariadb
image: mariadb
volumeMounts:
-
name: mariadb-storage
mountPath: /var/lib/mysql
volumes:
-name: mariadb-storage
persistentVolumeClaim:
claimName: mariadb
Ensure this is placed under spec.template.spec in the deployment file.
Step 5: Apply the updated Deployment
kubectl apply -f ~/mariadb-deployment.yaml Step 6: Confirm the Deployment is running and stable kubectl get pods -n mariadb
kubectl describe pod -n mariadb kubectl get deployment mariadb -n mariadb All pods should be in Running state, and the PVC should remain Bound.
Question 7:
SIMULATION
You must connect to the correct host.
Failure to do so may result in a zero score.
[candidate@base] $ ssh cka000051
Context
You manage a WordPress application. Some Pods are not starting because resource requests are too high. Your task is to prepare a Linux system for Kubernetes. Docker is already installed, but you need to configure it for kubeadm.
Task
Complete these tasks to prepare the system for Kubernetes:
Set up cri-dockerd: Install the Debian package: ~/cri-dockerd_0.3.9.3-0.ubuntu-jammy_amd64.deb Debian packages are installed using dpkg. Enable and start the cri-docker service.
Configure these system parameters: Set net.bridge.bridge-nf-call-iptables to 1
Check the answer in explanation. explanation:
Step 1: SSH into the correct host
ssh cka000051 Required. Skipping this step results in a zero score.
Step 2: Install the cri-dockerd Debian package
sudo dpkg -i ~/cri-dockerd_0.3.9.3-0.ubuntu-jammy_amd64.deb If there are dependency issues, fix them with: sudo apt-get install -f
In the container spec, set the resource requests (under containers:) like this:
resources:
requests:
cpu: "2000m"
memory: "4096Mi"
If there are limits defined, make sure they are equal to or greater than requests.
Step 5: Save and Exit
In vi: press Esc, type :wq, and press Enter.
Step 6: Verify the Pods start successfully
kubectl get pods -n relative-fawn kubectl describe pod -n relative-fawn
Ensure all 3 WordPress pods are in Running state and not stuck in Pending.
Question 10:
SIMULATION
You must connect to the correct host.
Failure to do so may result in a zero score.
[candidate@base] $ ssh Cka000055
Task
Verify the cert-manager application which has been deployed to your cluster .
Using kubectl, create a list of all cert-manager Custom Resource Definitions (CRDs ) and save it to ~/resources.yaml .
You must use kubectl 's default output format.
Do not set an output format.
Failure to do so will result in a reduced score.
Using kubectl, extract the documentation for the subject specification field of the Certificate Custom Resource and save it to ~/subject.yaml.
Check the answer in explanation. explanation:
Explanation Task Summary
You need to: SSH into the correct node: cka000055 Use kubectl to list all cert-manager CRDs, and save that list to ~/resources.yaml Do not use any output format flags like -o yaml Extract the documentation for the spec.subject field of the Certificate custom resource and save it to ~/subject.yaml
Step-by-Step Instructions Step 1: SSH into the node
ssh cka000055
Step 2: List cert-manager CRDs and save to a file
First, identify all cert-manager CRDs:
kubectl get crds | grep cert-manager
Then extract them without specifying an output format:
kubectl get crds | grep cert-manager | awk '{print $1}' | xargs kubectl get crd > ~/resources.yaml
This saves the default kubectl get output to the required file without formatting flags.
Step 3: Get documentation for spec.subject in the Certificate CRD
Nowadays, the certification exams become more and more important and required by more and more
enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare
for the exam in a short time with less efforts? How to get a ideal result and how to find the
most reliable resources? Here on Vcedump.com, you will find all the answers.
Vcedump.com provide not only Linux Foundation exam questions,
answers and explanations but also complete assistance on your exam preparation and certification
application. If you are confused on your CKA exam preparations
and Linux Foundation certification application, do not hesitate to visit our
Vcedump.com to find your solutions here.