Posted by: Pdfprep
Post Date: November 23, 2020
From Azure Security Center, you enable Azure Container Registry vulnerability scanning of the images in Registry1.
You perform the following actions:
• Push a Windows image named Image1 to Registry1.
• Push a Linux image named Image2 to Registry1.
• Push a Windows image named Image3 to Registry1.
• Modify Image1 and push the new image as Image4 to Registry1.
• Modify Image2 and push the new image as Image5 to Registry1.
Which two images will be scanned for vulnerabilities? Each correct answer presents a complete solution . NOTE: Each correct selection is worth one point.
A . Image4
B . Image2
C . Image1
D . Image3
E . Image5
Answer: B,C
Leave a Reply