
Ultimate access to all questions.
In specifying security requirements for a containerized application, what are the essential security measures you would implement to ensure the security of the containers and the data they handle? Consider container image security, runtime security, and data encryption.
A
Use secure container images, implement runtime security policies, and encrypt data at rest and in transit.
B
Use unverified container images, no runtime security policies, and no data encryption.
C
Implement weak container image security, partial runtime security policies, and basic data encryption.
D
Use token-based container image security, full runtime security policies, but no data encryption.