正解:B,C,D
For CI policy in image scanning with Jenkins or twistcli, options related to scoping include specifying credentials for accessing and scanning the images, setting conditions such as applying the rule only when vendor fixes are available to prioritize remediation efforts, and establishing failure thresholds to determine the severity levels that will cause the build to fail. These options focus on integrating security into the CI/CD pipeline, ensuring images are scanned for vulnerabilities, and enforcing security standards without hindering the development process. This approach aligns with best practices in DevSecOps by embedding security early in the development lifecycle, allowing for early detection and mitigation of vulnerabilities.