
Answer-first summary for fast verification
Answer: Use secure container images, implement runtime security policies, and enforce orchestration platform security controls.
Option A ensures comprehensive security for container orchestration. Secure container images prevent vulnerabilities. Runtime security policies protect against attacks. Orchestration platform security controls ensure the overall integrity and confidentiality of the environment.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
When specifying security requirements for container orchestration, what are the essential security measures you would implement to ensure the integrity and confidentiality of containerized applications? Consider container image security, runtime security, and orchestration platform security.
A
Use secure container images, implement runtime security policies, and enforce orchestration platform security controls.
B
Use unverified container images, no runtime security policies, and minimal orchestration platform security.
C
Implement weak container image security, partial runtime security policies, and basic orchestration platform security.
D
Use token-based container image security, full runtime security policies, but no orchestration platform security.
No comments yet.