An organization hosts microservices in containers. The security team aims to keep privileges minimal without losing essential functionality. Which approach meets these goals?
Launch containers with limited user access and enable extra capabilities if required
Allow additional permissions to support debugging tasks
Provide higher-level privileges to support faster runtimes
Adjust isolation settings for more direct management
Using a container with restricted access and adding minimal capabilities when needed helps curb unsafe behaviors while preserving standard operations. In contrast, broad or elevated permissions leave the environment vulnerable, and altering isolation settings can lead to unintended security gaps.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are containers in the context of microservices?
Open an interactive chat with Bash
Why is minimizing privileges in containerized environments important?
Open an interactive chat with Bash
What are extra capabilities in container security, and when should they be enabled?
Open an interactive chat with Bash
CompTIA Cloud+ CV0-004
Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access