ISC2 CISSP Practice Question

A healthcare organization is redesigning its application infrastructure to use containerization for improved scalability and deployment efficiency. The security architect is concerned about potential vulnerabilities in the containerized environment. Which of the following represents the MOST effective security practice when implementing containerization?

  • Use the 'latest' tag for all production container images

  • Share the host kernel across all container environments to maximize efficiency

  • Run containers with root privileges to ensure application functionality

  • Implement automated container image scanning in the CI/CD pipeline

ISC2 CISSP
Security Architecture and Engineering
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot