ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 80 - AI-102 discussion

Report
Export

DRAG DROP

You plan to use containerized versions of the Anomaly Detector API on local devices for testing and in on-premises datacenters.

You need to ensure that the containerized deployments meet the following requirements:

Prevent billing and API information from being stored in the command-line histories of the devices that run the container. Control access to the container images by using Azure role-based access control (Azure RBAC).

Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. (Choose four.)

NOTE: More than one order of answer choices is correct. You will receive credit for any of the correct orders you select.

Question 80
Correct answer: Question 80

Explanation:

Step 1: Pull the Anomaly Detector container image.

Step 2: Create a custom Dockerfile

Step 3: Push the image to an Azure container registry.

To push an image to an Azure Container registry, you must first have an image.

Step 4: Distribute the docker run script

Use the docker run command to run the containers.

Reference:

https://docs.microsoft.com/en-us/azure/container-registry/container-registry-intro

asked 26/09/2024
Deshawn Sharpe
38 questions
User
0 comments
Sorted by

Leave a comment first