GCP Professional Cloud Security Engineer Practice Question

An on-premises Jenkins server builds container images and deploys them to Cloud Storage and Cloud Run in a Google Cloud project. Company policy forbids keeping any long-lived service-account keys outside Google Cloud. Jenkins can obtain OpenID Connect (OIDC) ID tokens issued by the corporate Azure AD for each job. A dedicated service account with the necessary IAM roles already exists. How should you grant Jenkins 30-minute credentials to Google Cloud with minimal operational overhead?

  • Configure a Workload Identity Pool with an OIDC provider that trusts Azure AD, grant its principal set the iam.workloadIdentityUser role on the service account, and have Jenkins exchange its Azure-issued ID token for a short-lived Google Cloud access token before each deployment.

  • Create a Google OAuth 2.0 client for Jenkins, issue an offline refresh token, and have Jenkins use it to request new access tokens whenever it runs a build.

  • Generate a user-managed JSON key for the service account, encrypt it with Cloud KMS, store it in Secret Manager, and have Jenkins decrypt and use the key at build time.

  • Attach the service account to a dedicated Compute Engine jump-host VM and require Jenkins jobs to SSH into the VM and run gcloud commands using the VM's metadata server credentials.

GCP Professional Cloud Security Engineer
Configuring Access
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot