I'm feeling pretty confident about this one. I think the correct answer is D - securing artifacts with policies and role-based access control. That seems like a key use case for an embedded registry within a larger system.
I'm a bit unsure between C and D. Both sound like they could be use cases for an embedded registry. I'll need to think through the differences between those two options.
Ah, I see. So it's probably not about managing source code changes or network settings, since those would be more general container management tasks. The options about security and desired state configuration seem more relevant.
Okay, let's see. I think the key here is to focus on the "embedded" part of the question. That suggests it's not a standalone registry, but one that's integrated into a larger system.
Cyndy
5 months agoIsidra
5 months agoReena
5 months agoLarae
5 months agoOdette
6 months agoAlesia
6 months agoSon
6 months agoJesusa
6 months agoParis
6 months agoPamella
6 months agoMatthew
6 months agoLachelle
6 months agoEmily
6 months agoCortney
7 months agoIlona
2 years agoReuben
1 year agoBerry
1 year agoAileen
2 years agoMozell
2 years agoLelia
1 year agoMerlyn
1 year agoRebbeca
2 years agoTeddy
2 years agoBlondell
2 years agoGarry
2 years agoValda
1 year agoMerlyn
1 year agoCorazon
2 years agoIrving
2 years agoAllene
2 years agoTammi
2 years ago