I believe only C and D are examples of exploited vulnerabilities but maybe just D can affect several running application containers at once?
ASLR
https://blog.morphisec.com/aslr-what-it-is-and-what-it-isnt/
https://en.wikipedia.org/wiki/Address_space_layout_randomization
https://www.abatchy.com/2017/06/exploit-dev-101-bypassing-aslr-on.html
https://medium.com/@notsoshant/windows-exploitation-aslr-bypass-ms07-017-8760378e3e84
Sandbox
https://unit42.paloaltonetworks.com/making-containers-more-isolated-an-overview-of-sandboxed-container-technologies/
https://www.trendmicro.com/vinfo/us/security/news/security-technology/how-can-advanced-sandboxing-techniques-thwart-elusive-malware
Doing some more research, I would go for C - Sandbox Escape.
https://securityboulevard.com/2019/02/container-escape-vulnerability-puts-cloud-infrastructure-at-risk/
"A serious vulnerability in runC, a tool used to spawn and run Linux containers, allows attackers to break out of containerized environments and gain full access to the underlying servers.
RunC is a container runtime that makes use of Linux’s built-in capabilities to create sandboxes in which applications can run. A server can have hundreds of applications or microservices, each running in its own container."
This section is not available anymore. Please use the main Exam Page.PT0-001 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
boblee
Highly Voted 4 years, 10 months agoMikeHunt
Highly Voted 5 years agokloug
Most Recent 2 years, 2 months agomiabe
2 years, 9 months agoCock
3 years, 2 months agomecore
4 years, 12 months agomr_robot
5 years agomr_robot
5 years agomr_robot
5 years agodeathfrom
5 years ago