Screen Reader Mode Icon

Question Title

* 1. I understand the risks that containers present to my organization.

Question Title

* 2. Securing containers should be focused on

Question Title

* 3. Container sourcing (the registry value that indicates the containers code origin) and the container's identity is important for security

Question Title

* 4. Communication between containerized workloads is inherently secure

Question Title

* 5. A perimeter based security model will not secure a containerized application

Question Title

* 6. My experience with containers is

Question Title

* 7. Kubernetes has the security controls that are necessary for a containerized application.

Question Title

* 8. My work role is

Question Title

* 9. Container security should be part of a Zero Trust strategy

Question Title

* 10. Achieving compliance for containers is more difficult than compliance for legacy applications

0 of 10 answered
 

T