Answer This grants full host permissions and device access, defeating container security. Bookmark Add to Set Notes Helpful (0) Share Want to bookmark, take notes, or join discussions? Sign in to access all features and personalize your learning experience. Sign In Create Account Source: SugharaIQ