
Microsoft Cybersecurity Architect Expert SC-100
Get started today
Ultimate access to all questions.
Your organization is planning to deploy a containerized application environment in Azure to support a new line of business applications. As the cybersecurity architect, you are tasked with defining a comprehensive security strategy for the container environment. The strategy must address secure container image management, runtime security, and monitoring and logging, while also considering Azure's shared responsibility model and compliance requirements. Which of the following approaches BEST ensures the security of the container environment in this scenario? (Choose one)
Your organization is planning to deploy a containerized application environment in Azure to support a new line of business applications. As the cybersecurity architect, you are tasked with defining a comprehensive security strategy for the container environment. The strategy must address secure container image management, runtime security, and monitoring and logging, while also considering Azure's shared responsibility model and compliance requirements. Which of the following approaches BEST ensures the security of the container environment in this scenario? (Choose one)
Simulated