ExamGecko
Ask Question

Google Professional Cloud DevOps Engineer Practice Test 1

Add to Whishlist
00:00:00
Show Answer
Report Issue   Restart test

Question 1 / 40

You are creating a CI/CD pipeline to perform Terraform deployments of Google Cloud resources Your CI/CD tooling is running in Google Kubernetes Engine (GKE) and uses an ephemeral Pod for each pipeline run You must ensure that the pipelines that run in the Pods have the appropriate Identity and Access Management (1AM) permissions to perform the Terraform deployments You want to follow Google-recommended practices for identity management What should you do?

Choose 2 answers

Create a new Kubernetes service account, and assign the service account to the Pods Use Workload Identity to authenticate as the Google service account
Create a new Kubernetes service account, and assign the service account to the Pods Use Workload Identity to authenticate as the Google service account
Create a new JSON service account key for the Google service account store the key as a Kubernetes secret, inject the key into the Pods, and set the boogle_application_credentials environment variable
Create a new JSON service account key for the Google service account store the key as a Kubernetes secret, inject the key into the Pods, and set the boogle_application_credentials environment variable
Create a new Google service account, and assign the appropriate 1AM permissions
Create a new Google service account, and assign the appropriate 1AM permissions
Create a new JSON service account key for the Google service account store the key in the secret management store for the CI/CD tool and configure Terraform to use this key for authentication
Create a new JSON service account key for the Google service account store the key in the secret management store for the CI/CD tool and configure Terraform to use this key for authentication
Assign the appropriate 1AM permissions to the Google service account associated with the Compute Engine VM instances that run the Pods
Assign the appropriate 1AM permissions to the Google service account associated with the Compute Engine VM instances that run the Pods
Comment (0)
Suggested answer: A, C
Explanation:

The best options for ensuring that the pipelines that run in the Pods have the appropriate IAM permissions to perform the Terraform deployments are to create a new Kubernetes service account and assign the service account to the Pods, and to use Workload Identity to authenticate as the Google service account. A Kubernetes service account is an identity that represents an application or a process running in a Pod. A Google service account is an identity that represents a Google Cloud resource or service. Workload Identity is a feature that allows you to bind Kubernetes service accounts to Google service accounts. By using Workload Identity, you can avoid creating and managing JSON service account keys, which are less secure and require more maintenance. You can also assign the appropriate IAM permissions to the Google service account that corresponds to the Kubernetes service account.

asked 18/09/2024
BurtAnderson Carter
39 questions