You have an Azure Container Registry named Registry1.
From Azure Security Center, you enable Azure Container Registry vulnerability scanning of the images in Registry1.
You perform the following actions:
✑ Push a Windows image named Image1 to Registry1.
✑ Push a Linux image named Image2 to Registry1.
✑ Push a Windows image named Image3 to Registry1.
✑ Modify Image1 and push the new image as Image4 to Registry1.
Modify Image2 and push the new image as Image5 to Registry1.
Which two images will be scanned for vulnerabilities? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
Oskarma
Highly Voted 2 years, 6 months agokoreshio
2 years, 6 months agoflafernan
1 year, 4 months agopekay
2 years agoRume
Highly Voted 3 years, 10 months agoJimmy500
Most Recent 10 months, 1 week agoxRiot007
9 months, 1 week ago[Removed]
1 year, 4 months agomorito
1 year, 4 months agoObama_boy
1 year, 4 months agoObama_boy
1 year, 4 months agoflafernan
1 year, 5 months agoTheProfessor
1 year, 5 months agoESAJRR
1 year, 7 months agoalfaAzure
1 year, 8 months agomajstor86
2 years, 1 month agodanlo
2 years, 4 months agoWMG
3 years agoSecurityAnalyst
3 years, 7 months agoOldJan
3 years, 8 months agoSandomj55
3 years, 8 months ago