Month End Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ac4s65

Your company deploys applications m Docket containers.

Your company deploys applications m Docket containers.

You want to detect known exploits in the Docket images used to provision the Docker containers.

You need to integrate image scanning into the application lifecycle. The solution must expose the exploits as early as possible during the application lifecycle.

What should you configure?

A.

a task executed in the continuous deployment pipeline and a scheduled task against a running production container.

B.

a task executed in the continuous integration pipeline and a scheduled task that analyzes the production container.

C.

a task executed in the continuous integration pipeline and a scheduled task that analyzes the image registry

D.

manual tasks performed during the planning phase and the deployment phase

AZ-400 PDF/Engine
  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions
buy now AZ-400 pdf
Get 65% Discount on All Products, Use Coupon: "ac4s65"