Multiple Choice
Developers in an organization have moved from a standard application deployment to containers. The Security Engineer is tasked with ensuring that containers are secure. Which strategies will reduce the attack surface and enhance the security of the containers? (Choose two.)
A) Use the containers to automate security deployments.
B) Limit resource consumption (CPU, memory) , networking connections, ports, and unnecessary container libraries.
C) Segregate container by host, function, and data classification.
D) Use Docker Notary framework to sign task definitions.
E) Enable container breakout at the host kernel.
Correct Answer:

Verified
Correct Answer:
Verified
Q97: A company is developing a highly resilient
Q98: An AWS account includes two S3 buckets:
Q99: Auditors for a health care company have
Q100: A company has two AWS accounts, each
Q101: A company's Chief Security Officer has requested
Q103: The InfoSec team has mandated that in
Q104: A Security Engineer must implement mutually authenticated
Q105: To meet regulatory requirements, a Security Engineer
Q106: A company has several production AWS accounts
Q107: A company has a customer master key