ISC2 CISSP Practice Question

During a migration to microservices, a healthcare provider plans to package each workload as a container and deploy them through a CI/CD pipeline onto an on-premises Kubernetes cluster. The chief security architect must minimize the likelihood that vulnerable or malicious code reaches production while still allowing rapid deployments. Which action represents the MOST effective security practice for this goal?

  • Implement automated container image scanning in the CI/CD pipeline

  • Use the 'latest' tag for all production container images

  • Run containers with root privileges to ensure application functionality

  • Share the host kernel across all container environments to maximize efficiency

ISC2 CISSP
Security Architecture and Engineering
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot