Which statement applies to vulnerability management policies?
Host and serverless rules support blocking, whereas container rules do not.
Rules explain the necessary actions when vulnerabilities are found in the resources of a customer environment.
Policies for containers, hosts, and serverless functions are not separate.
Rules are evaluated in an undefined order.
Submit