Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
While securing applications deployed with the traditional (non-container) approach, application runtime is tested for vulnerabilities by using _________.
Home
Security in Containers
While securing applications deployed with the traditional (non-container) approach, application...
0
votes
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
While securing applications deployed with the traditional (non-container) approach, application runtime is tested for vulnerabilities by using _________.
a) Sonar
b) Burp Suite
c) OWASP Dependency Check
d) OWASP Dependency Track
security
containers
applications
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Oct 5, 2022
by
Robindeniel
b) Burp Suite
Related questions
0
votes
Q: While securing applications deployed with the traditional (non-container) approach, the source code is tested for vulnerabilities by using __________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
non-container
containers
security
0
votes
Q: While securing applications deployed with container approach, Docker images are scanned by using _________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
containers
security
0
votes
Q: While securing applications deployed with container approach, security at Kernel level is enforced by using ________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
container
security
0
votes
Q: We can add or drop capabilities on a Docker container by using which of the following flags?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
containers
flags
0
votes
Q: Tern is a tool used to find vulnerabilities in ___________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
vulnerabilities
tern
security
containers
0
votes
Q: OWASP Zed Attack Proxy (ZAP) is a tool used to find vulnerabilities in ________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
owasp
zed-attack-proxy
containers
security
0
votes
Q: Which of the following is not a valid action performed by Anchore (based on evaluation criteria)?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
anchor
security
containers
0
votes
Q: Which of the following is not an alternative for Docker?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
docker
security
containers
0
votes
Q: Which of the following is not a default Linux namespace?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
containers
linux-namespace
0
votes
Q: Docker uses which Linux Kernel feature to provide resource allocation functionality?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
docker
security
containers
...