Which isolation level best ensures that tenants cannot access each other's data in a multi-tenant MLOps platform?
Think about physical separation to prevent accidental or malicious data access.
Dedicated databases per tenant provide the strongest isolation by physically separating data, preventing cross-tenant access.
Given the command kubectl get pods -n tenant-a, what is the expected output if the namespace tenant-a exists but has no pods?
kubectl get pods -n tenant-a
Consider what Kubernetes shows when a namespace exists but has no pods.
Kubernetes returns 'No resources found' when the namespace exists but contains no pods.
Which YAML snippet correctly sets a CPU limit of 2 cores and memory limit of 4Gi for a tenant namespace tenant-b in Kubernetes?
ResourceQuota keys for limits must be prefixed with limits.
ResourceQuota requires keys like limits.cpu and limits.memory to set limits on CPU and memory usage.
An MLOps platform uses shared storage with access control lists (ACLs) for tenant data isolation. Tenant C reports they can see files belonging to Tenant D. What is the most likely cause?
Focus on permissions controlling file access.
If ACLs are misconfigured, tenants can access each other's files despite namespace or quota settings.
Arrange the steps in the correct order to deploy isolated ML models for multiple tenants using Kubernetes namespaces and resource quotas.
Think about setting up the environment before deploying workloads and securing communication last.
Namespaces must be created first, then resource quotas applied, followed by deploying pods, and finally network policies to isolate traffic.