Web Technologies
Android
Angular
BootStrap
ECMAScript
HTML
Image Processing
JavaScript
MVC
Onsen UI
React JS
SOAP UI
Vue.js
Cloud/DevOps Technologies
Amazon EC2
Ansible
Augmented Reality
AWS
Azure
Big Data
Cache Teachniques
Cassandra
Commercial Insurance
Cloud
CD
CI
Data Handling
Data using R
Data Science
DevOps
Gradle
Hadoop
HBase
HDFS
Hive
IOT
Jenkins
Machine Learning
MangoDB
NGINX
SOAP UI
Latest Technologies
5G Network
Agile
Android
Arduino
Augmented Reality
Commercial Insurance
C#
C++
Cyber Security
Data Handling
Data using R
Data Science
DBMS
Design-Pattern
Fortify
Ethical Hacking
Framework
GIT
GIT Slack
Image Processing
Java
Jenkins
Jira
JUnit
Kibana
Linux
MangoDB
Oracle
PHP
Python
QTP
R Language
Regression Analysis
Robotic
Salesforce
SAP
Selenium
Service Discovery
Service Now
Spark SQL
Testing
TOGAF
Research Method
Virtual Reality
Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Docker uses which Linux Kernel feature to provide resource allocation functionality?
Home
Security in Containers
Docker uses which Linux Kernel feature to provide resource allocation functionality?
0
votes
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
(
19.9k
points)
Docker uses which Linux Kernel feature to provide resource allocation functionality?
a) SELinux
b) Cgroups
c) Namespaces
d) Seccomp
docker
security
containers
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Oct 5, 2022
by
Robindeniel
(
19.9k
points)
b) Cgroups
Related questions
0
votes
Which of the following is not an alternative for Docker?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
(
19.9k
points)
docker
security
containers
0
votes
Which of the following file is updated in a Linux machine to enable SELinux?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
(
19.9k
points)
security
containers
0
votes
Which of the following is not a default Linux namespace?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
(
19.9k
points)
security
containers
linux-namespace
0
votes
We can add or drop capabilities on a Docker container by using which of the following flags?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
(
19.9k
points)
security
containers
flags
0
votes
While securing applications deployed with container approach, Docker images are scanned by using _________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
(
19.9k
points)
containers
security
0
votes
Which of the following cloud service providers does not use Docker?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
(
19.9k
points)
security
docker
container
0
votes
Which of the following is not a valid action performed by Anchore (based on evaluation criteria)?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
(
19.9k
points)
anchor
security
containers
0
votes
Tern is a tool used to find vulnerabilities in ___________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
(
19.9k
points)
vulnerabilities
tern
security
containers
0
votes
OWASP Zed Attack Proxy (ZAP) is a tool used to find vulnerabilities in ________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
(
19.9k
points)
owasp
zed-attack-proxy
containers
security
0
votes
While securing applications deployed with the traditional (non-container) approach, the source code is tested for vulnerabilities by using __________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
(
19.9k
points)
non-container
containers
security
...