Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks Exam PSE-StrataDC Topic 1 Question 76 Discussion

Actual exam question for Palo Alto Networks's PSE-StrataDC exam
Question #: 76
Topic #: 1
[All PSE-StrataDC Questions]

Is vulnerability analysis against images in the registry sufficient for security?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Vallie
2 months ago
Option B is a bit of a head-scratcher. Why would you only analyze the running containers? Gotta start with the images, that's the foundation.
upvoted 0 times
Geoffrey
30 days ago
D) No, you need to do analysis in the CI system, in the registry, and against instantiated containers
upvoted 0 times
...
Gussie
1 months ago
C) Yes, you are ensuring that the images the containers are based on are secure.
upvoted 0 times
...
Mabel
1 months ago
A) Yes, containers do not have unique vulnerabilities.
upvoted 0 times
...
...
Annabelle
2 months ago
I believe we need to do analysis in the CI system, registry, and against instantiated containers for comprehensive security.
upvoted 0 times
...
Louvenia
2 months ago
But by analyzing the images, we are ensuring the containers are based on secure images.
upvoted 0 times
...
Bernadine
2 months ago
I'm going with option D. You can't just rely on the registry, gotta check those running containers too. Don't want any surprises popping up in production!
upvoted 0 times
Felice
1 months ago
I see your point, but option A suggests containers don't have unique vulnerabilities.
upvoted 0 times
...
Adelle
1 months ago
I'm leaning towards option B, focusing on the running containers seems more practical.
upvoted 0 times
...
Jesusa
2 months ago
I think option C is enough, as long as the images are secure, the containers should be too.
upvoted 0 times
...
Bernardo
2 months ago
I agree, option D covers all the bases for security.
upvoted 0 times
...
...
Skye
2 months ago
Hah, option A is a real knee-slapper. Containers definitely have their own unique vulnerabilities, can't just assume the images are safe.
upvoted 0 times
Ryann
1 months ago
Option B) No, you should do vulnerability analysis only against the running containers, which are vulnerable.
upvoted 0 times
...
Art
1 months ago
Option A) Yes, containers do not have unique vulnerabilities.
upvoted 0 times
...
...
Torie
2 months ago
I disagree, you should do vulnerability analysis only against the running containers.
upvoted 0 times
...
Leeann
2 months ago
Option C sounds like the right choice. If the images are secure, then the containers should be secure too.
upvoted 0 times
...
Louvenia
2 months ago
I think vulnerability analysis against images in the registry is sufficient for security.
upvoted 0 times
...
Naomi
2 months ago
I think option D is the correct answer. You need to scan the images in the registry, during the CI process, and also the running containers to ensure comprehensive security.
upvoted 0 times
Beckie
1 months ago
No, you need to do analysis in the CI system, in the registry, and against instantiated containers
upvoted 0 times
...
Hillary
1 months ago
Yes, you are ensuring that the images the containers are based on are secure.
upvoted 0 times
...
Gwenn
1 months ago
You need to scan the images in the registry, during the CI process, and also the running containers to ensure comprehensive security.
upvoted 0 times
...
Marjory
2 months ago
I think option D is the correct answer.
upvoted 0 times
...
...

Save Cancel