Watch this video on YouTube
You are required to ensure that all running containers in your Kubernetes cluster are scanned for vulnerabilities. Which of the following methods would be the most suitable to achieve this?