Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks Exam PSE-StrataDC Topic 3 Question 86 Discussion

Actual exam question for Palo Alto Networks's PSE-StrataDC exam
Question #: 86
Topic #: 3
[All PSE-StrataDC Questions]

Is vulnerability analysis against images in the registry sufficient for security?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Rosita
1 days ago
I'm not sure about this one. The question seems to be asking about the scope of vulnerability analysis, but I'm not sure if just analyzing the images in the registry is sufficient.
upvoted 0 times
...
Audria
2 months ago
B makes no sense. Why would you only check the running containers and not the images they're based on? D is clearly the right choice.
upvoted 0 times
Maricela
5 days ago
No, you need to do analysis in the CI system, in the registry, and against instantiated containers.
upvoted 0 times
...
Diane
7 days ago
Yes, you are ensuring that the images the containers are based on are secure.
upvoted 0 times
...
Juan
2 months ago
B makes no sense. Why would you only check the running containers and not the images they're based on?
upvoted 0 times
...
...
Lettie
3 months ago
I think we need to do analysis in multiple stages, not just in the registry.
upvoted 0 times
...
Donte
3 months ago
I believe it's important to ensure the images the containers are based on are secure.
upvoted 0 times
...
Merilyn
3 months ago
Haha, A is a joke right? Containers definitely have their own unique vulnerabilities! D is the way to go.
upvoted 0 times
...
Deeann
3 months ago
C seems reasonable, but D is more comprehensive. You can't just rely on the registry, you need to check the running containers too.
upvoted 0 times
...
Elina
3 months ago
I disagree, we should do analysis against running containers too.
upvoted 0 times
...
Bernardine
3 months ago
D is the correct answer. You need to analyze vulnerabilities at every stage - in the CI system, in the registry, and in the running containers.
upvoted 0 times
Mitsue
7 days ago
No, you need to do analysis in the CI system, in the registry, and against instantiated containers.
upvoted 0 times
...
Micah
2 months ago
Yes, containers do not have unique vulnerabilities.
upvoted 0 times
...
...
Beckie
3 months ago
I think vulnerability analysis against images in the registry is sufficient.
upvoted 0 times
...

Save Cancel