
Ultimate access to all questions.
When specifying security requirements for container orchestration, what are the essential security measures you would implement to ensure the integrity and confidentiality of containerized applications? Consider container image security, runtime security, and orchestration platform security.
A
Use secure container images, implement runtime security policies, and enforce orchestration platform security controls.
B
Use unverified container images, no runtime security policies, and minimal orchestration platform security.
C
Implement weak container image security, partial runtime security policies, and basic orchestration platform security.
D
Use token-based container image security, full runtime security policies, but no orchestration platform security.