You have an Azure Container Registry named Registry1.
From Azure Security Center, you enable Azure Container Registry vulnerability scanning of the images in Registry1.
You perform the following actions:
✑ Push a Windows image named Image1 to Registry1.
✑ Push a Linux image named Image2 to Registry1.
✑ Push a Windows image named Image3 to Registry1.
✑ Modify Image1 and push the new image as Image4 to Registry1.
Modify Image2 and push the new image as Image5 to Registry1.
Which two images will be scanned for vulnerabilities? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
Oskarma
Highly Voted 2 years, 8 months agokoreshio
2 years, 8 months agoflafernan
1 year, 6 months agopekay
2 years, 2 months agoRume
Highly Voted 3 years, 11 months agoca7859c
Most Recent 1 week, 5 days agoca7859c
3 weeks, 3 days agokhamrumunnu
3 weeks, 6 days agoJimmy500
12 months agoxRiot007
11 months ago[Removed]
1 year, 6 months agomorito
1 year, 6 months agoObama_boy
1 year, 6 months agoObama_boy
1 year, 6 months agoflafernan
1 year, 7 months agoTheProfessor
1 year, 7 months agoESAJRR
1 year, 8 months agoalfaAzure
1 year, 9 months agomajstor86
2 years, 3 months agodanlo
2 years, 6 months agoWMG
3 years, 2 months ago