ECCouncil Related Exams
312-38 Exam
Which of the following network monitoring techniques requires extra monitoring software or hardware?
Michelle is a network security administrator working in an MNC company. She wants to set a
resource limit for CPU in a container. Which command-line allows Michelle to limit a container to 2
CPUs?