Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks Exam PSE-StrataDC Topic 1 Question 52 Discussion

Actual exam question for Palo Alto Networks's Palo Alto Networks System Engineer - Strata Data Center exam
Question #: 52
Topic #: 1
[All Palo Alto Networks System Engineer - Strata Data Center Questions]

Is vulnerability analysis against images in the registry sufficient for security?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Peter
6 months ago
Hang on, I think option D is the way to go. We need to be thorough here. Check the images, check the registry, and don't forget the running containers. Gotta cover all our bases, you know? *scratches head* This stuff isn't for the faint of heart, that's for sure.
upvoted 0 times
...
Oretha
6 months ago
I'm with you, Anna. Analyzing the images in the registry sounds like a good way to ensure security. Plus, it's probably more efficient than checking every single container, am I right? *winks*
upvoted 0 times
...
Anna
6 months ago
Well, I think option C is the way to go. If the images are secure, then the containers should be too, right? I mean, they're just running those images, so why do we need to check the containers themselves?
upvoted 0 times
...
Launa
6 months ago
Hmm, this is a tricky one. I'm not sure if just analyzing the images in the registry is enough. Don't containers have their own unique vulnerabilities too? I feel like we need to look at the running containers as well.
upvoted 0 times
Madelyn
6 months ago
C) Yes, you are ensuring that the images the containers are based on are secure.
upvoted 0 times
...
Justine
6 months ago
That makes sense. We should cover all our bases for security.
upvoted 0 times
...
Fletcher
6 months ago
D) No, you need to do analysis in the CI system, in the registry, and against instantiated containers
upvoted 0 times
...
Serina
6 months ago
I see what you mean. So maybe it's best to focus on the running containers then.
upvoted 0 times
...
Paulina
6 months ago
B) No, you should do vulnerability analysis only against the running containers, which are vulnerable.
upvoted 0 times
...
Asuncion
6 months ago
Hmm, that's interesting. But wouldn't analyzing the running containers be more thorough?
upvoted 0 times
...
Joaquin
6 months ago
A) Yes, containers do not have unique vulnerabilities.
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77