Which of the following security constraints component is mostly used for pod restriction, which implies that it establishes...

44. Which of the following security constraints component is mostly used for pod restriction, which implies that it establishes the constraints for a pod, such as what actions it may execute and what all items in the cluster it can access?

  1. Security content constraints (SCC)
  2. Service Account

Answer: A) Security content constraints (SCC)

Explanation:

The security content constraints (SCC) component is mostly used for pod restriction, which implies that it establishes the constraints for a pod, such as what actions it may execute and what all items in the cluster it can access.

Comments and Discussions!

Load comments ↻






Copyright © 2024 www.includehelp.com. All rights reserved.