Which two actions help limit the attack surface of your Docker container? (Choose two.)
A . Run only a single service in each container.
B . Run all services in a single image.
C . Use version tags for base images and dependencies.
D . Use Kali Linux as a base image.
E . Download images over HTTPS supporting sites.