Certified Ethical Hacker (CEH) Practice Question

During a container-security engagement on a Kubernetes cluster, you gain an interactive shell inside a pod. The process hierarchy reveals the container is running in privileged mode, and a hostPath volume is mounted at /host that maps to the node's root filesystem (/). What single step would most effectively escalate your access to full root control of the underlying worker node?

  • Flush all iptables rules from inside the container to disable the host firewall and pivot later.

  • Delete the compromised pod so Kubernetes will reschedule it on another node and hope it runs with higher privileges.

  • Execute chroot /host /bin/bash (or use nsenter) to switch the root to the mounted filesystem and obtain a root shell on the node.

  • Use kubectl port-forward to expose the pod and then SSH into the node from outside the cluster.

Certified Ethical Hacker (CEH)
Cloud Computing
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot