ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 37 - SC-100 discussion

Report
Export

You are designing the security standards for containerized applications onboarded to Azure. You are evaluating the use of Microsoft Defender for Containers. In which two environments can you use Defender for Containers to scan for known vulnerabilities?

Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

A.

Linux containers deployed to Azure Container Registry

Answers
A.

Linux containers deployed to Azure Container Registry

B.

Linux containers deployed to Azure Kubernetes Service (AKS)

Answers
B.

Linux containers deployed to Azure Kubernetes Service (AKS)

C.

Windows containers deployed to Azure Container Registry

Answers
C.

Windows containers deployed to Azure Container Registry

D.

Windows containers deployed to Azure Kubernetes Service (AKS)

Answers
D.

Windows containers deployed to Azure Kubernetes Service (AKS)

E.

Linux containers deployed to Azure Container Instances

Answers
E.

Linux containers deployed to Azure Container Instances

Suggested answer: A, C

Explanation:

https://docs.microsoft.com/en-us/learn/modules/design-strategy-for-secure-paas-iaas-saas- services/9-specify-security-requirements-for-containers https://docs.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-introduction#view-vulnerabilities-for-running-images

asked 05/10/2024
Dennis Valencia
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first