ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 43 - SCS-C02 discussion

Report
Export

Developers in an organization have moved from a standard application deployment to containers. The Security Engineer is tasked with ensuring that the containers are secure. Which strategies will reduce the attack surface and enhance the security of the containers? (Select TWO.)

A.
Use the containers to automate security deployments.
Answers
A.
Use the containers to automate security deployments.
B.
Limit resource consumption (CPU, memory), networking connections, ports, and unnecessary container libraries.
Answers
B.
Limit resource consumption (CPU, memory), networking connections, ports, and unnecessary container libraries.
C.
Segregate containers by host, function, and data classification.
Answers
C.
Segregate containers by host, function, and data classification.
D.
Use Docker Notary framework to sign task definitions.
Answers
D.
Use Docker Notary framework to sign task definitions.
E.
Enable container breakout at the host kernel.
Answers
E.
Enable container breakout at the host kernel.
Suggested answer: A, C

Explanation:

these are the strategies that can reduce the attack surface and enhance the security of the containers. Containers are a method of packaging and running applications in isolated environments. Using containers to automate security deployments can help ensure that security patches and updates are applied consistently and quickly across the container fleet. Segregating containers by host, function, and data classification can help limit the impact of a compromise and enforce the principle of least privilege. The other options are either irrelevant or risky for securing containers.

asked 16/09/2024
Rajeev Parameswaran
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first