New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks PSE-StrataDC Exam - Topic 3 Question 86 Discussion

Actual exam question for Palo Alto Networks's PSE-StrataDC exam
Question #: 86
Topic #: 3
[All PSE-StrataDC Questions]

Is vulnerability analysis against images in the registry sufficient for security?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Dalene
2 months ago
Wait, are images really that secure on their own?
upvoted 0 times
...
Roxane
2 months ago
Totally agree, you need to check all stages, not just images.
upvoted 0 times
...
Ernest
3 months ago
Yes, but it’s not enough to rely solely on image analysis.
upvoted 0 times
...
Sheron
3 months ago
I disagree, running containers can have different vulnerabilities.
upvoted 0 times
...
Apolonia
3 months ago
Vulnerability analysis on images is a good start.
upvoted 0 times
...
Ashley
3 months ago
I definitely recall that comprehensive analysis is crucial, so I think option D makes the most sense here.
upvoted 0 times
...
Kanisha
4 months ago
I'm a bit unsure, but I feel like ensuring the images are secure is a good start, right?
upvoted 0 times
...
Nakisha
4 months ago
I think I saw a practice question that emphasized the importance of analyzing both the registry and the running instances.
upvoted 0 times
...
Ceola
4 months ago
I remember studying that just checking the images isn't enough since vulnerabilities can still exist in running containers.
upvoted 0 times
...
Talia
4 months ago
I disagree. Analyzing the registry is a good start, but we need a more comprehensive approach. We should be doing vulnerability analysis at multiple stages - in the CI system, in the registry, and against the running containers.
upvoted 0 times
...
Alton
4 months ago
I'm pretty confident on this one. If we ensure the images in the registry are secure, then the containers based on those images should be secure as well. Analyzing the registry should be enough.
upvoted 0 times
...
Shawana
5 months ago
Hmm, I think the key here is that containers can have unique vulnerabilities beyond just the base image. We need to analyze the running containers too, not just the registry.
upvoted 0 times
...
Rosita
5 months ago
I'm not sure about this one. The question seems to be asking about the scope of vulnerability analysis, but I'm not sure if just analyzing the images in the registry is sufficient.
upvoted 0 times
...
Audria
7 months ago
B makes no sense. Why would you only check the running containers and not the images they're based on? D is clearly the right choice.
upvoted 0 times
Maricela
5 months ago
No, you need to do analysis in the CI system, in the registry, and against instantiated containers.
upvoted 0 times
...
Diane
5 months ago
Yes, you are ensuring that the images the containers are based on are secure.
upvoted 0 times
...
Juan
6 months ago
B makes no sense. Why would you only check the running containers and not the images they're based on?
upvoted 0 times
...
...
Lettie
7 months ago
I think we need to do analysis in multiple stages, not just in the registry.
upvoted 0 times
...
Donte
7 months ago
I believe it's important to ensure the images the containers are based on are secure.
upvoted 0 times
...
Merilyn
7 months ago
Haha, A is a joke right? Containers definitely have their own unique vulnerabilities! D is the way to go.
upvoted 0 times
...
Deeann
7 months ago
C seems reasonable, but D is more comprehensive. You can't just rely on the registry, you need to check the running containers too.
upvoted 0 times
...
Elina
7 months ago
I disagree, we should do analysis against running containers too.
upvoted 0 times
...
Bernardine
8 months ago
D is the correct answer. You need to analyze vulnerabilities at every stage - in the CI system, in the registry, and in the running containers.
upvoted 0 times
Mitsue
5 months ago
No, you need to do analysis in the CI system, in the registry, and against instantiated containers.
upvoted 0 times
...
Micah
7 months ago
Yes, containers do not have unique vulnerabilities.
upvoted 0 times
...
...
Beckie
8 months ago
I think vulnerability analysis against images in the registry is sufficient.
upvoted 0 times
...

Save Cancel