I think Option D is the correct answer. Identifying unknown vulnerabilities that can't be found in CVE lists is a major benefit of this security approach.
Option B seems the most straightforward benefit to me. Removing vulnerabilities baked into containers is a clear advantage of network runtime security.
Giovanna
2 months agoFelicidad
20 days agoLorita
24 days agoSena
29 days agoMelodie
2 months agoAudra
2 months agoCoral
12 days agoDemetra
14 days agoGregoria
29 days agoDeeanna
2 months agoJosefa
2 months agoSanda
2 months agoMee
2 months agoAracelis
2 months agoLuis
2 months ago