I think Option D is the correct answer. Identifying unknown vulnerabilities that can't be found in CVE lists is a major benefit of this security approach.
Option B seems the most straightforward benefit to me. Removing vulnerabilities baked into containers is a clear advantage of network runtime security.
Giovanna
1 months agoLorita
4 days agoSena
9 days agoMelodie
1 months agoAudra
1 months agoGregoria
9 days agoDeeanna
2 months agoJosefa
2 months agoSanda
2 months agoMee
2 months agoAracelis
28 days agoLuis
1 months ago