Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
OWASP Zed Attack Proxy (ZAP) is a tool used to find vulnerabilities in ________.
Home
Security in Containers
OWASP Zed Attack Proxy (ZAP) is a tool used to find vulnerabilities in ________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
(
20.8k
points)
OWASP Zed Attack Proxy (ZAP) is a tool used to find vulnerabilities in ________.
a) Libraries
b) Running applications
c) Source code
d) Docker images
owasp
zed-attack-proxy
containers
security
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Oct 5, 2022
by
Robindeniel
(
20.8k
points)
b) Running applications
Related questions
0
votes
Q: Tern is a tool used to find vulnerabilities in ___________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
(
20.8k
points)
vulnerabilities
tern
security
containers
0
votes
Q: While securing applications deployed with the traditional (non-container) approach, the source code is tested for vulnerabilities by using __________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
(
20.8k
points)
non-container
containers
security
0
votes
Q: While securing applications deployed with the traditional (non-container) approach, application runtime is tested for vulnerabilities by using _________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
(
20.8k
points)
security
containers
applications
0
votes
Q: Which of the following file is updated in a Linux machine to enable SELinux?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
(
20.8k
points)
security
containers
0
votes
Q: Docker uses which Linux Kernel feature to provide resource allocation functionality?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
(
20.8k
points)
docker
security
containers
0
votes
Q: Which of the following is not a default Linux namespace?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
(
20.8k
points)
security
containers
linux-namespace
0
votes
Q: Which of the following is not a valid action performed by Anchore (based on evaluation criteria)?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
(
20.8k
points)
anchor
security
containers
0
votes
Q: We can add or drop capabilities on a Docker container by using which of the following flags?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
(
20.8k
points)
security
containers
flags
0
votes
Q: Which of the following is not an alternative for Docker?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
(
20.8k
points)
docker
security
containers
0
votes
Q: While securing applications deployed with container approach, Docker images are scanned by using _________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
(
20.8k
points)
containers
security
0
votes
Q: Role-based access control helps prevent which OWASP Top 10 vulnerability?
asked
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
by
SakshiSharma
(
32.2k
points)
owasp
access-control
0
votes
Q: While securing applications deployed with container approach, security at Kernel level is enforced by using ________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
(
20.8k
points)
container
security
0
votes
Q: Which of the following services allows you to analyze EC2 Instances against pre-defined security templates to check for vulnerabilities?
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
(
31.7k
points)
aws
security
ec2
azure
cloud
0
votes
Q: Which of the following cloud service providers does not use Docker?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
(
20.8k
points)
security
docker
container
0
votes
Q: Your team needs a tool that can be used to correlate events from multiple resources into a central repository. Which of the following can be used for this purpose?
asked
Jun 1
in
Azure
by
sharadyadav1986
(
31.7k
points)
azure
security
center
...