Register
5:00
Stop
CISSP - Software Development Security - Container Security
Beginner
1/5
A company has adopted a Container Security solution for their applications. The solution monitors and alerts for any suspicious activities within the container. What is the most appropriate approach for monitoring this solution during an internal penetration test?
a.
Focus only on external penetration test
b.
Disable the Container Security solution during the test
c.
Ignore security alerts during the test
d.
Inspect the monitoring solution's logs
Beginner