exam questions

Exam Professional Cloud Architect All Questions

View all questions & answers for the Professional Cloud Architect exam

Exam Professional Cloud Architect topic 1 question 170 discussion

Actual exam question from Google's Professional Cloud Architect
Question #: 170
Topic #: 1
[All Professional Cloud Architect Questions]

One of your primary business objectives is being able to trust the data stored in your application. You want to log all changes to the application data.
How can you design your logging system to verify authenticity of your logs?

  • A. Write the log concurrently in the cloud and on premises
  • B. Use a SQL database and limit who can modify the log table
  • C. Digitally sign each timestamp and log entry and store the signature
  • D. Create a JSON dump of each log entry and store it in Google Cloud Storage
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
get2dd
Highly Voted 3 years, 4 months ago
Correct answer is C (verified from Question Bank in Whizlabs.com) Feedback C (Correct answer) - Digitally sign each timestamp and log entry and store the signature. Answer A, B, and D don’t have any added value to verify the authenticity of your logs. Besides, Logs are mostly suitable for exporting to Cloud storage, BigQuery, and PubSub. SQL database is not the best way to be exported to nor store log data. Simplified Explanation To verify the authenticity of your logs if they are tampered with or forged, you can use a certain algorithm to generate digest by hashing each timestamp or log entry and then digitally sign the digest with a private key to generate a signature. Anybody with your public key can verify that signature to confirm that it was made with your private key and they can tell if the timestamp or log entry was modified. You can put the signature files into a folder separate from the log files. This separation enables you to enforce granular security policies.
upvoted 31 times
...
JoeShmoe
Highly Voted 4 years, 7 months ago
C is correct and common practice
upvoted 24 times
...
666Amitava666
Most Recent 2 months, 1 week ago
Selected Answer: C
Digitally sign each timestamp and log entry and store the signature
upvoted 1 times
...
omermahgoub
1 year, 6 months ago
I would recommend option C, digitally signing each timestamp and log entry and storing the signature. Digitally signing a log entry involves creating a cryptographic hash of the log entry and a timestamp, and then encrypting the hash using a private key. The encrypted hash, known as the signature, can be stored along with the log entry in a secure manner. To verify the authenticity of the log entry, you can use the public key associated with the private key used to create the signature to decrypt the signature and recreate the hash. If the recreated hash matches the original hash, it indicates that the log entry has not been tampered with and is authentic.
upvoted 4 times
omermahgoub
1 year, 6 months ago
Writing the log concurrently in the cloud and on premises, would not necessarily help to verify the authenticity of the logs, so A is not an option B, using a SQL database and limiting who can modify the log table, could help to prevent unauthorized modification of the logs, but it would not necessarily provide a way to verify the authenticity of the logs if they are modified by an authorized user. Option D, creating a JSON dump of each log entry and storing it in Google Cloud Storage, would not necessarily help to verify the authenticity of the logs.
upvoted 1 times
...
...
AzureDP900
1 year, 8 months ago
Digitally signing is correct. C is right option!
upvoted 2 times
...
GMats
2 years, 6 months ago
C is correct.You can use deterministic algorithm to validate hash values.
upvoted 1 times
...
vincy2202
2 years, 6 months ago
Selected Answer: C
C is the correct answer
upvoted 1 times
...
joe2211
2 years, 7 months ago
Selected Answer: C
vote C
upvoted 2 times
...
MaxNRG
2 years, 8 months ago
C – Digitally sign each timestamp and log entry and store the signature. This is fun Q where all options are technically correct. But, the point is to find most efficient. Since, Q asks about verification of log entry - then you don't need to dub it. Using of much shorter timestamp-hash pair will address the request. So, when reading log from original source, you also read hash for this timestamp and then verify the entry's body. BTW, this is one of general purpose questions, which is not directly related to GCP. Just checks your attentiveness A - is about duplication, can work, but redundant; B / D - both have similar design, but don’t allow verification of entry. No cross-checking of entry. E.g. person having access to log can change it in one place. C - storing log in one place, and hash-code in another. So, even if "trusted" person has modified original log, then it will break correspondence with hash code in other storage. That storage should be available only for authentication program (via service account).
upvoted 5 times
Neo_ACE
2 years, 8 months ago
If you attended recently, Please update some new questions too. It would be great help
upvoted 2 times
...
Wonka
2 years, 5 months ago
@MaxNRG, very clearly articulated elimination technique. BTW are these questions appearing in actual exam?
upvoted 1 times
...
...
aviratna
3 years ago
C is correct
upvoted 1 times
...
Amrit00009
3 years, 1 month ago
C seems like the right answer
upvoted 1 times
...
victory108
3 years, 1 month ago
C. Digitally sign each timestamp and log entry and store the signature
upvoted 1 times
...
Amber25
3 years, 1 month ago
C (Correct answer) - Digitally sign each timestamp and log entry and store the signature. Other options are possible to export logs but won't be able to verify authenticity of logs
upvoted 2 times
...
un
3 years, 1 month ago
C is correct
upvoted 1 times
...
mrhege
3 years, 2 months ago
I'm on the fence between C and D. C is a good practice but D can do the job as well as versioned objects might be able to do job at some level... Now, C tells that only the signature would be stored which is obviously not enough, but the owner of versioned objects might be tampered too... IDK
upvoted 1 times
...
lynx256
3 years, 3 months ago
IMO - C is ok
upvoted 1 times
...
Ausias18
3 years, 3 months ago
Answers is C
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago