I'm feeling pretty confident about this one. I think the correct answer is D - securing artifacts with policies and role-based access control. That seems like a key use case for an embedded registry within a larger system.
I'm a bit unsure between C and D. Both sound like they could be use cases for an embedded registry. I'll need to think through the differences between those two options.
Ah, I see. So it's probably not about managing source code changes or network settings, since those would be more general container management tasks. The options about security and desired state configuration seem more relevant.
Okay, let's see. I think the key here is to focus on the "embedded" part of the question. That suggests it's not a standalone registry, but one that's integrated into a larger system.
Cyndy
3 months agoIsidra
3 months agoReena
3 months agoLarae
4 months agoOdette
4 months agoAlesia
4 months agoSon
4 months agoJesusa
4 months agoParis
5 months agoPamella
5 months agoMatthew
5 months agoLachelle
5 months agoEmily
5 months agoCortney
5 months agoIlona
1 year agoReuben
1 year agoBerry
1 year agoAileen
1 year agoMozell
1 year agoLelia
1 year agoMerlyn
1 year agoRebbeca
1 year agoTeddy
1 year agoBlondell
1 year agoGarry
1 year agoValda
1 year agoMerlyn
1 year agoCorazon
1 year agoIrving
1 year agoAllene
1 year agoTammi
1 year ago