Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks Exam PSE-StrataDC Topic 1 Question 52 Discussion

Actual exam question for Palo Alto Networks's Palo Alto Networks System Engineer - Strata Data Center exam
Question #: 52
Topic #: 1
[All Palo Alto Networks System Engineer - Strata Data Center Questions]

Is vulnerability analysis against images in the registry sufficient for security?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Peter
24 days ago
Hang on, I think option D is the way to go. We need to be thorough here. Check the images, check the registry, and don't forget the running containers. Gotta cover all our bases, you know? *scratches head* This stuff isn't for the faint of heart, that's for sure.
upvoted 0 times
...
Oretha
25 days ago
I'm with you, Anna. Analyzing the images in the registry sounds like a good way to ensure security. Plus, it's probably more efficient than checking every single container, am I right? *winks*
upvoted 0 times
...
Anna
26 days ago
Well, I think option C is the way to go. If the images are secure, then the containers should be too, right? I mean, they're just running those images, so why do we need to check the containers themselves?
upvoted 0 times
...
Launa
27 days ago
Hmm, this is a tricky one. I'm not sure if just analyzing the images in the registry is enough. Don't containers have their own unique vulnerabilities too? I feel like we need to look at the running containers as well.
upvoted 0 times
Madelyn
6 days ago
C) Yes, you are ensuring that the images the containers are based on are secure.
upvoted 0 times
...
Justine
7 days ago
That makes sense. We should cover all our bases for security.
upvoted 0 times
...
Fletcher
8 days ago
D) No, you need to do analysis in the CI system, in the registry, and against instantiated containers
upvoted 0 times
...
Serina
9 days ago
I see what you mean. So maybe it's best to focus on the running containers then.
upvoted 0 times
...
Paulina
10 days ago
B) No, you should do vulnerability analysis only against the running containers, which are vulnerable.
upvoted 0 times
...
Asuncion
11 days ago
Hmm, that's interesting. But wouldn't analyzing the running containers be more thorough?
upvoted 0 times
...
Joaquin
12 days ago
A) Yes, containers do not have unique vulnerabilities.
upvoted 0 times
...
...

Save Cancel