You have a request ? Contact Us Join Us

Inclavare Containers and Confidential Computing (Exam)

Answer Alibaba Inclavare Containers and Confidential Computing Exam
Estimated read time: 4 min
Alibaba: Inclavare Containers and Confidential Computing (Exam)
Inclavare Containers and Confidential Computing (Exam) | Alibaba


Notice!
Always refer to the official Alibaba Documentaion for the most accurate and up-to-date information.

Exam Question

1. The next generation of Incalvare containers will be able to:
A. Have capability of running K8s confidential computing clusters
B. Have relative completed K8s confidential computing clusters capability
C. Have the capability of full functional and cross-platform of k8s confidential computing cluster
D. Will be compatible with OCI runtime standards

2. MEE refers to:
A. Reserving Extra Memory for Processing
B. Availability of Operating System
C. Trusted memory with private processes
D. The Engineering needed to encrypt memory

3. Attackers targeting an Enclave or an Encrypted File System target which environment?
A. Development Environment
B. Deployment Environment

4. What year were inclavare containers established?
A. 2010
B. 2013
C. 2015
D. 2019

5. The major cooperation partner working with Alibaba Cloud on SGX-based confidential computing infrastructure is:
A. Amazon
B. Intel
C. IBM
D. Oracle

6. One of the benefits of HyperEnclave, a unified Enclave platform, is:
A. Can Mitigate all side channel attacks
B. Has total control over enclave launch & attestation
C. Easily map to existing HW Enclaves and take advantage of future HW capabilities
D. Runs confidential apps on existing hardware in their data centers

7. Which of the following is not a possible instruction from the User to the CPU?
A. EREMOVE
B. EMODPE
C. EEXIT
D. ERESUME

8. Which of the following does SOFAEnclave not support?
A. Occlum LibOS
B. OSX
C. HyperEnclave
D. KubeTEE

9. Occlum Embedded Mode allows users to build partitioning-based SGX app with Occlum.
True
False

10. Enclave Page Cache is controlled by the CPU and cannot be accessed by software.
True
False

11. Attestation Based Enclave Configuration Service can RA-based enclave service authentication but needs to use access keys.
True
False

12. Alibaba Cloud is continuously committed to providing full data lifecycle security protection capability on the top of only IaaS, offering confidential computing capability.
True
False

13. A possible application scenario of SGX is with IoT applications to protect the communication between IoT edge devices and the cloud.
True
False

14. Challenges of Confidential Computing include: (Number of correct answers: 2)
A. Complex secrets deployment for Enclaves
B. Open to a wide range of APIs
C. Compatible with modern cluster orchestration
D. Bound to a specific programming language

15. Some characteristics of Kubernetes + TEE are: (Number of correct answers: 2)
A. Don’t worry about any hardware things
B. Does not offer SRE services
C. Offers Enclave specific middleware services
D. Cannot deploy the Enclave services

Related Articles

Post a Comment

Cookie Consent
We serve cookies on this site to analyze traffic, remember your preferences, and optimize your experience.
Oops!
It seems there is something wrong with your internet connection. Please connect to the internet and start browsing again.
AdBlock Detected!
We have detected that you are using adblocking plugin in your browser.
The revenue we earn by the advertisements is used to manage this website, we request you to whitelist our website in your adblocking plugin.