5:00
Stop
CISSP - Software Development Security - Container Security
Beginner
1/5
A company has adopted a Container Security solution for their applications. The solution monitors and alerts for any suspicious activities within the container. What is the most appropriate approach for monitoring this solution during an internal penetration test?
Beginner