A security engineer Identifies a vulnerability m a containerized application. The vulnerability can be exploited by a privileged process to read tie content of the host's memory. The security engineer reviews the following Dockerfile to determine a solution to mitigate similar exploits: Which of the following is the best solution to prevent similar exploits by privileged processes?
A cross -site request forgery vulnerability exploited a web application that was hosted in a public laaS network. A security engineer determined that deploying a WAF in blocking mode at a CDN would prevent the application from being exploited again. However, a week after implementing the WAF, the application was exploited again. Which of the following should the security engineer do to make the WAF control effective?
A cloud engineer wants containers to run the latest version of a container base image to reduce the number of vulnerabilities. The applications in use requite Python 3.10 and ate not compatible with any other version. The containers' images are created every time a new version is released from the source image. Given the container Dockerfile below: Which of the following actions will achieve the objectives with the least effort?
An engineer wants lo scale several cloud workloads on demand. Which of the following approaches is the most suitable?
A software engineer is integrating an application lo The cloud that is web socket based. Which of the following applications is the engineer most likely deploying?
An engineer made a change to an application and needs to select a deployment strategy that meets the following requirements: • Is simple and fast • Can be performed on two Identical platforms Which of the following strategies should the engineer use?