Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Docker uses which Linux Kernel feature to provide resource allocation functionality?
Home
Security in Containers
Docker uses which Linux Kernel feature to provide resource allocation functionality?
0
votes
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
Docker uses which Linux Kernel feature to provide resource allocation functionality?
a) SELinux
b) Cgroups
c) Namespaces
d) Seccomp
docker
security
containers
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Oct 5, 2022
by
Robindeniel
b) Cgroups
Your comment on this answer:
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Related questions
0
votes
Q: Which of the following is not an alternative for Docker?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
docker
security
containers
0
votes
Q: Which of the following file is updated in a Linux machine to enable SELinux?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
containers
0
votes
Q: Which of the following is not a default Linux namespace?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
containers
linux-namespace
0
votes
Q: We can add or drop capabilities on a Docker container by using which of the following flags?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
containers
flags
0
votes
Q: While securing applications deployed with container approach, Docker images are scanned by using _________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
containers
security
0
votes
Q: Which of the following cloud service providers does not use Docker?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
docker
container
0
votes
Q: Which of the following is not a valid action performed by Anchore (based on evaluation criteria)?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
anchor
security
containers
0
votes
Q: Tern is a tool used to find vulnerabilities in ___________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
vulnerabilities
tern
security
containers
0
votes
Q: OWASP Zed Attack Proxy (ZAP) is a tool used to find vulnerabilities in ________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
owasp
zed-attack-proxy
containers
security
0
votes
Q: While securing applications deployed with the traditional (non-container) approach, the source code is tested for vulnerabilities by using __________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
non-container
containers
security
...