Questions
As we conclude, here is a list of questions for you to test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:
- From ASC, you enable Azure Defender for container registries for the vulnerability assessment of images in a container registry. You have pushed two container images into the registry – a Windows image and a Linux image. Which of these images will be scanned for vulnerabilities?
a. The Windows image only
b. The Linux image only
c. Both the Windows and Linux images
d. None of the images
- You have an Azure AD tenant, named spicycrabs.xyz, and an AKS cluster called AKS1. You discover that developers cannot sign in with their Azure AD credentials to create Kubernetes resources on AKS1. What can you do to address this while minimizing administrative efforts?
a. Update the settings of AKS1 to enable Azure AD integration.
b. Recreate AKS1 with Azure AD integration enabled.
c. From AKS1...