A customer is deploying Defenders to a Fargate environment. It wants to understand the vulnerabilities in the image it is deploying.
How should the customer automate vulnerability scanning for images deployed to Fargate?
A . Set up a vulnerability scanner on the registry
B . Embed a Fargate Defender to automatically scan for vulnerabilities
C . Designate a Fargate Defender to serve a dedicated image scanner
D . Use Cloud Compliance to identify misconfigured AWS accounts
Answer: A
Explanation:
To automate vulnerability scanning for images deployed to Fargate, the customer should set up a vulnerability scanner on the container registry where the images are stored before they are deployed. By scanning the images in the registry, any vulnerabilities can be identified and addressed before the images are used to create Fargate tasks. This proactive approach to vulnerability management is crucial in cloud-native environments to ensure that deployed containers are free from known vulnerabilities.
Reference: https://blog.paloaltonetworks.com/prisma-cloud/securing-aws-fargate-tasks/
Latest PCCSE Dumps Valid Version with 85 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund