![]() |
Inclavare Containers and Confidential Computing (Exam) | Alibaba |
Notice!
Always refer to the official Alibaba Documentaion for the most accurate and up-to-date information.
Exam Question
1. The next generation of Incalvare containers will be able to:
A. Have capability of running K8s confidential computing clustersB. Have relative completed K8s confidential computing clusters capabilityC. Have the capability of full functional and cross-platform of k8s confidential computing clusterD. Will be compatible with OCI runtime standards
2. MEE refers to:
A. Reserving Extra Memory for ProcessingB. Availability of Operating SystemC. Trusted memory with private processesD. The Engineering needed to encrypt memory
3. Attackers targeting an Enclave or an Encrypted File System target which
environment?
A. Development EnvironmentB. Deployment Environment
4. What year were inclavare containers established?
A. 2010B. 2013C. 2015D. 2019
5. The major cooperation partner working with Alibaba Cloud on SGX-based
confidential computing infrastructure is:
A. AmazonB. IntelC. IBMD. Oracle
6. One of the benefits of HyperEnclave, a unified Enclave platform, is:
A. Can Mitigate all side channel attacksB. Has total control over enclave launch & attestationC. Easily map to existing HW Enclaves and take advantage of future HW capabilitiesD. Runs confidential apps on existing hardware in their data centers
7. Which of the following is not a possible instruction from the User to the
CPU?
A. EREMOVEB. EMODPEC. EEXITD. ERESUME
8. Which of the following does SOFAEnclave not support?
A. Occlum LibOSB. OSXC. HyperEnclaveD. KubeTEE
9. Occlum Embedded Mode allows users to build partitioning-based SGX app
with Occlum.
TrueFalse
10. Enclave Page Cache is controlled by the CPU and cannot be accessed by
software.
TrueFalse
11. Attestation Based Enclave Configuration Service can RA-based enclave
service authentication but needs to use access keys.
TrueFalse
12. Alibaba Cloud is continuously committed to providing full data lifecycle
security protection capability on the top of only IaaS, offering
confidential computing capability.
TrueFalse
13. A possible application scenario of SGX is with IoT applications to
protect the communication between IoT edge devices and the cloud.
TrueFalse
14. Challenges of Confidential Computing include: (Number of correct
answers: 2)
A. Complex secrets deployment for EnclavesB. Open to a wide range of APIsC. Compatible with modern cluster orchestrationD. Bound to a specific programming language
15. Some characteristics of Kubernetes + TEE are: (Number of correct
answers: 2)
A. Don’t worry about any hardware thingsB. Does not offer SRE servicesC. Offers Enclave specific middleware servicesD. Cannot deploy the Enclave services