GCP Professional Cloud Security Engineer Practice Question

Your company is launching a new microservice in a production Google Kubernetes Engine (GKE) cluster in project "prod-retail". The microservice needs read-only access to a single Cloud Storage bucket in the same project. The security policy requires following Google's recommended procedure for creating service accounts and enforcing least privilege while preventing long-lived credentials. Which approach should the platform engineer implement?

  • Create a dedicated service account in the prod-retail project, grant it roles/storage.objectViewer on the target bucket only, enable Workload Identity so the GKE pods can use the service account without keys, and disable the unused Compute Engine default service account.

  • Create a new service account at the organization level, assign it the Project Editor role on prod-retail, and allow GKE node service accounts to impersonate it via iam.serviceAccountUser.

  • For each pod replica, create a new service account with roles/storage.objectViewer on the bucket, generate a user-managed JSON key, store the key in Cloud Storage, and have the pod download the key during startup.

  • Reuse the project's Compute Engine default service account, grant it the Storage Admin role at the project level, and mount its JSON key into the pods as a Kubernetes secret.

GCP Professional Cloud Security Engineer
Configuring Access
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot