CompTIA CySA+ CS0-003 Practice Question
During a routine security audit, your organization's cybersecurity team discovered that one of the containerized applications was able to access resources on the host system that were beyond its allocated privileges. What is the MOST likely reason for this behavior?
Lack of sufficient logging within the container
Insufficient network segmentation
Out-of-date operating system on the host
Incorrect configuration of the container runtime settings