Q. Which of these best practices is recommended when working with secrets?
β
Correct Answer: (C)
Access secrets via mounted files only
Explanation: The most secure practice is to use mounted files for accessing secrets.