Which standard approach to security is augmented by the 4C's of Cloud Native security?
Answer : C
In a Kubernetes environment, what kind of Admission Controller can modify resource manifests when applied to the Kubernetes API to fix misconfigurations automatically?
Answer : C
What mechanism can I use to block unsigned images from running in my cluster?
Answer : A
What is the purpose of the Supplier Assessments and Reviews control in the NIST 800-53 Rev. 5 set of controls for Supply Chain Risk Management?
Answer : A
What is a multi-stage build?
Answer : D
How can a user enforce the Pod Security Standard without third-party tools?
Answer : B
On a client machine, what directory (by default) contains sensitive credential information?
Answer : B