A team wants to uncover weaknesses in its container orchestration setup using a specialized utility. They aim for thorough discovery while lessening potential disruptions. Which approach is BEST?
Use detailed debug output on the production system to collect extensive endpoint information
Initiate the scanner in passive mode from an external vantage point to gather resource details, then perform targeted testing in a controlled environment
Rely on ephemeral containers with relaxed authentication to investigate resources from inside the cluster
Implement the scanner on every node with elevated rights for broad coverage throughout the live environment
Starting the scan from outside the cluster in passive mode can help identify entry points without placing excessive burdens on the live setup. Once passive analysis is complete, moving into a targeted testing process allows deeper inspection. Approaches requiring high privileges across all nodes create unnecessary risk, and enabling verbose debugging on production systems can be disruptive. Relying on ephemeral containers without considering an external vantage point can miss perimeter exposures.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is passive mode in security scanning?
Open an interactive chat with Bash
Why is testing in a controlled environment important?
Open an interactive chat with Bash
What is the risk of using elevated rights for live scanning?