🎖️🏵️ Memorial Weekend Sale — 30% off🏵️🎖️

1 day, 15 hours remaining!
CompTIA Study Materials
AWS Study Materials
AWS Certified Developer Associate AWS Certified Developer Associate
AWS Certified Developer Associate DVA-C02
AWS Certified Solutions Architect Associate AWS Certified Solutions Architect Associate
AWS Certified Solutions Architect Associate SAA-C03
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Free CompTIA Security+ SY0-701 Practice Question

When architecting a new application that needs to be both secure and scalable, which containerization security best practice should be prioritized to ensure the least privilege and prevent unnecessary access to the host system?

  • Mounting all host volumes into containers with read-only access

  • Scheduling routine vulnerability scanning for containers and host systems

  • Running containers with non-privileged users and without unnecessary capabilities

  • Implementing strict resource limits on each running container

  • Segmenting container network traffic using virtual networks

This question is for objective:
Security Architecture
Your Score:
Security Architecture
Threats, Vulnerabilities, and Mitigations
Security Operations
Security Program Management and Oversight
General Security Concepts