Which type of query is used for scanning Infrastructure as Code (laC) templates?
Anomaly policy uses which two logs to identify unusual network and user activity? (Choose two.)
An administrator sees that a runtime audit has been generated for a container.
The audit message is:
“/bin/ls launched and is explicitly blocked in the runtime rule. Full command: ls -latr”
Which protection in the runtime rule would cause this audit?