0
0
AWScloud~20 mins

Deploying workloads on EKS in AWS - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
EKS Deployment Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
service_behavior
intermediate
2:00remaining
EKS Pod Scheduling Behavior

You deploy a pod with a nodeSelector that matches no nodes in your EKS cluster. What will happen to the pod?

AThe pod will remain in Pending state indefinitely until a matching node is available.
BThe pod will be scheduled on any available node ignoring the nodeSelector.
CThe pod will be immediately deleted by the Kubernetes control plane.
DThe pod will run but with reduced resource limits.
Attempts:
2 left
💡 Hint

Think about how Kubernetes respects nodeSelector constraints when scheduling pods.

Configuration
intermediate
2:00remaining
IAM Role for Service Account (IRSA) Setup

You want to allow a pod in EKS to access AWS S3 securely without using node IAM roles. Which configuration is required?

ACreate an IAM user and embed its access keys in the pod container.
BAttach the S3 permissions directly to the EC2 worker node IAM role.
CAdd AWS credentials as environment variables in the pod spec.
DCreate an IAM role with S3 permissions and annotate the Kubernetes service account with its ARN.
Attempts:
2 left
💡 Hint

Consider how IRSA allows pods to assume IAM roles securely.

Architecture
advanced
2:00remaining
High Availability for EKS Control Plane

Which statement best describes the availability of the EKS control plane?

AYou must deploy multiple control plane nodes manually in different AZs.
BEKS control plane runs on a single EC2 instance in one AZ.
CEKS control plane is managed by AWS and runs across multiple Availability Zones automatically.
DYou need to configure a load balancer to distribute traffic to control plane nodes.
Attempts:
2 left
💡 Hint

Think about how AWS manages the control plane for EKS clusters.

security
advanced
2:00remaining
Securing EKS Worker Nodes

What is the best practice to minimize security risks on EKS worker nodes?

ARun all pods as root user to avoid permission issues.
BUse the latest Amazon EKS-optimized AMI with minimal privileges and enable automatic security updates.
CAllow all inbound traffic to worker nodes for easier debugging.
DDisable the Kubernetes network policies to improve network performance.
Attempts:
2 left
💡 Hint

Consider how to reduce attack surface and keep nodes secure.

Best Practice
expert
2:00remaining
Scaling EKS Worker Nodes Efficiently

You want to optimize cost and performance by scaling EKS worker nodes based on workload demand. Which approach is best?

AUse Cluster Autoscaler with multiple node groups having different instance types and spot instances.
BManually add or remove EC2 instances in the worker node Auto Scaling Group.
CSet a fixed number of worker nodes and scale pods only.
DUse a single large instance type for all workloads to simplify management.
Attempts:
2 left
💡 Hint

Think about how to balance cost and availability with autoscaling.