exam questions

Exam Professional Cloud Developer All Questions

View all questions & answers for the Professional Cloud Developer exam

Exam Professional Cloud Developer topic 1 question 115 discussion

Actual exam question from Google's Professional Cloud Developer
Question #: 115
Topic #: 1
[All Professional Cloud Developer Questions]

You are creating and running containers across different projects in Google Cloud. The application you are developing needs to access Google Cloud services from within Google Kubernetes Engine (GKE). What should you do?

  • A. Assign a Google service account to the GKE nodes.
  • B. Use a Google service account to run the Pod with Workload Identity.
  • C. Store the Google service account credentials as a Kubernetes Secret.
  • D. Use a Google service account with GKE role-based access control (RBAC).
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Blueocean
Highly Voted 2 years, 9 months ago
Option B https://cloud.google.com/kubernetes-engine/docs/concepts/workload-identity
upvoted 7 times
...
alpha_canary
Most Recent 6 months, 1 week ago
Selected Answer: B
https://cloud.google.com/kubernetes-engine/docs/concepts/workload-identity#:~:text=Workload%20Identity%20Federation%20for%20GKE%20is%20the%20recommended%20way%20for%20your%20workloads%20running%20on%20Google%20Kubernetes%20Engine%20(GKE)%20to%20access%20Google%20Cloud%20services%20in%20a%20secure%20and%20manageable%20way.
upvoted 1 times
...
__rajan__
1 year, 1 month ago
Selected Answer: B
The best way to access Google Cloud services from within Google Kubernetes Engine (GKE) is to use a Google service account to run the Pod with Workload Identity. Workload Identity allows your pods to authenticate to Google Cloud services using their Kubernetes service account credentials, without you having to expose any sensitive credentials in your code.
upvoted 1 times
...
purushi
1 year, 2 months ago
Selected Answer: B
Application images runs as a container within a POD as a process. So Pod should be identified as a principle here and it should have a service account to access other services within GKE cluster.
upvoted 2 times
...
omermahgoub
1 year, 9 months ago
Selected Answer: B
In summary, using Workload Identity allows you to authenticate your application to Google Cloud services using the same identity that runs the application, this makes it simple to manage the access and permissions to resources, and also ensures that your application only has the necessary permissions to access the services.
upvoted 2 times
...
omermahgoub
1 year, 9 months ago
The correct answer is B: Use a Google service account to run the Pod with Workload Identity. Workload Identity allows you to authenticate to Google Cloud services using the same identity that runs your application, instead of creating and managing a separate service account. This simplifies the process of granting permissions to your application, and ensures that it only has the necessary access to resources. When you assign a Google service account to GKE nodes (Option A), it can be difficult to manage the permissions needed by the application and also could be a security issue since it grants access to all the services that the service account has permissions to.
upvoted 1 times
omermahgoub
1 year, 9 months ago
Use a Google service account with GKE role-based access control (RBAC) (Option D) is not the recommended approach, while RBAC is good to restrict and manage access to resources, it's not the best fit for authenticating the workloads to access the Google Cloud services.
upvoted 1 times
...
omermahgoub
1 year, 9 months ago
Storing the Google service account credentials as a Kubernetes Secret (Option C) can be a security concern, since the credentials may be easily accessed by unauthorized parties.
upvoted 1 times
...
omermahgoub
1 year, 9 months ago
When you assign a Google service account to GKE nodes (Option A), it can be difficult to manage the permissions needed by the application and also could be a security issue since it grants access to all the services that the service account has permissions to.
upvoted 1 times
...
...
zellck
1 year, 10 months ago
Selected Answer: B
B is the answer. https://cloud.google.com/kubernetes-engine/docs/concepts/workload-identity#what_is Applications running on GKE might need access to Google Cloud APIs such as Compute Engine API, BigQuery Storage API, or Machine Learning APIs. Workload Identity allows a Kubernetes service account in your GKE cluster to act as an IAM service account. Pods that use the configured Kubernetes service account automatically authenticate as the IAM service account when accessing Google Cloud APIs. Using Workload Identity allows you to assign distinct, fine-grained identities and authorization for each application in your cluster.
upvoted 1 times
...
tomato123
2 years, 2 months ago
Selected Answer: B
B is correct
upvoted 2 times
...
akshaychavan7
2 years, 2 months ago
Selected Answer: B
I will go with option B.
upvoted 1 times
...
nqthien041292
2 years, 6 months ago
Selected Answer: B
Vote B
upvoted 1 times
...
jitu028
2 years, 6 months ago
Correct answer is B
upvoted 1 times
...
assuf
2 years, 9 months ago
vote B
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago