GCP Professional Cloud Security Engineer Practice Question

Your organization's Cloud Build runs in the devops project and deploys workloads to a production GKE cluster located in the prod project. Company policy forbids the storage or distribution of any user-managed service-account keys. During each build, the pipeline must obtain a short-lived OAuth 2.0 access token for the existing service account [email protected], and Cloud Audit Logs must show both the identity that triggered the build and the impersonated service account. Which IAM configuration best satisfies these requirements?

  • Configure Workload Identity Federation for Cloud Build with an external AWS provider so builds can exchange temporary AWS credentials for Google Cloud tokens linked to prod-deployer@.

  • Create a user-managed key for prod-deployer@, encrypt it with Cloud KMS, store it in Secret Manager, and allow Cloud Build to retrieve and use the key during deployments.

  • Grant the Cloud Build service account the Service Account User role (roles/iam.serviceAccountUser) on prod-deployer@ and also grant it the Kubernetes Engine Admin role on the prod project.

  • Grant the Cloud Build service account the Service Account Token Creator role (roles/iam.serviceAccountTokenCreator) on prod-deployer@ and assign the required GKE roles directly to prod-deployer@ in the prod project.

GCP Professional Cloud Security Engineer
Configuring Access
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot