Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks Exam PSE-StrataDC Topic 1 Question 76 Discussion

Actual exam question for Palo Alto Networks's PSE-StrataDC exam
Question #: 76
Topic #: 1
[All PSE-StrataDC Questions]

Is vulnerability analysis against images in the registry sufficient for security?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Vallie
19 days ago
Option B is a bit of a head-scratcher. Why would you only analyze the running containers? Gotta start with the images, that's the foundation.
upvoted 0 times
Mabel
4 days ago
A) Yes, containers do not have unique vulnerabilities.
upvoted 0 times
...
...
Annabelle
23 days ago
I believe we need to do analysis in the CI system, registry, and against instantiated containers for comprehensive security.
upvoted 0 times
...
Louvenia
26 days ago
But by analyzing the images, we are ensuring the containers are based on secure images.
upvoted 0 times
...
Bernadine
27 days ago
I'm going with option D. You can't just rely on the registry, gotta check those running containers too. Don't want any surprises popping up in production!
upvoted 0 times
Jesusa
11 days ago
I think option C is enough, as long as the images are secure, the containers should be too.
upvoted 0 times
...
Bernardo
13 days ago
I agree, option D covers all the bases for security.
upvoted 0 times
...
...
Skye
30 days ago
Hah, option A is a real knee-slapper. Containers definitely have their own unique vulnerabilities, can't just assume the images are safe.
upvoted 0 times
Ryann
7 days ago
Option B) No, you should do vulnerability analysis only against the running containers, which are vulnerable.
upvoted 0 times
...
Art
8 days ago
Option A) Yes, containers do not have unique vulnerabilities.
upvoted 0 times
...
...
Torie
1 months ago
I disagree, you should do vulnerability analysis only against the running containers.
upvoted 0 times
...
Leeann
1 months ago
Option C sounds like the right choice. If the images are secure, then the containers should be secure too.
upvoted 0 times
...
Louvenia
1 months ago
I think vulnerability analysis against images in the registry is sufficient for security.
upvoted 0 times
...
Naomi
1 months ago
I think option D is the correct answer. You need to scan the images in the registry, during the CI process, and also the running containers to ensure comprehensive security.
upvoted 0 times
Hillary
22 hours ago
Yes, you are ensuring that the images the containers are based on are secure.
upvoted 0 times
...
Gwenn
6 days ago
You need to scan the images in the registry, during the CI process, and also the running containers to ensure comprehensive security.
upvoted 0 times
...
Marjory
25 days ago
I think option D is the correct answer.
upvoted 0 times
...
...

Save Cancel