exam questions

Exam Professional Cloud Developer All Questions

View all questions & answers for the Professional Cloud Developer exam

Exam Professional Cloud Developer topic 1 question 171 discussion

Actual exam question from Google's Professional Cloud Developer
Question #: 171
Topic #: 1
[All Professional Cloud Developer Questions]

You are developing an application that consists of several microservices running in a Google Kubernetes Engine cluster. One microservice needs to connect to a third-party database running on-premises. You need to store credentials to the database and ensure that these credentials can be rotated while following security best practices. What should you do?

  • A. Store the credentials in a sidecar container proxy, and use it to connect to the third-party database.
  • B. Configure a service mesh to allow or restrict traffic from the Pods in your microservice to the database.
  • C. Store the credentials in an encrypted volume mount, and associate a Persistent Volume Claim with the client Pod.
  • D. Store the credentials as a Kubernetes Secret, and use the Cloud Key Management Service plugin to handle encryption and decryption.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
__rajan__
7 months ago
Selected Answer: D
D is correct.
upvoted 1 times
...
purushi
8 months, 3 weeks ago
Selected Answer: D
Storing credentials as a Kubernetes secret + KMS for encryption and decryption of the DB credentials are the best answer.
upvoted 2 times
...
mrvergara
1 year, 2 months ago
Selected Answer: D
Storing sensitive information such as database credentials in Kubernetes Secrets is a common and secure way to manage sensitive information in a cluster. The Cloud Key Management Service (KMS) can be used to further protect the secrets by encrypting and decrypting them, ensuring that they are protected both at rest and in transit. This combination of Kubernetes Secrets and Cloud KMS provides a secure way to manage and rotate credentials while following security best practices. Options A and B are not recommended, as they do not provide a secure and centralized way to manage and rotate credentials. Option C is not recommended because storing secrets in an encrypted volume mount is not as secure as using a Key Management Service, as the encryption keys must still be managed and protected within the cluster.
upvoted 1 times
...
TNT87
1 year, 4 months ago
https://cloud.google.com/kubernetes-engine/docs/how-to/encrypting-secrets#reencrypt-secrets Answer D
upvoted 3 times
...
zellck
1 year, 4 months ago
Selected Answer: D
D is the answer. https://cloud.google.com/kubernetes-engine/docs/how-to/encrypting-secrets By default, Google Kubernetes Engine (GKE) encrypts customer content stored at rest, including Secrets. GKE handles and manages this default encryption for you without any additional action on your part. Application-layer secrets encryption provides an additional layer of security for sensitive data, such as Secrets, stored in etcd. Using this functionality, you can use a key managed with Cloud KMS to encrypt data at the application layer. This encryption protects against attackers who gain access to an offline copy of etcd.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago