Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Google Exam Professional Cloud Developer Topic 12 Question 96 Discussion

Actual exam question for Google's Professional Cloud Developer exam
Question #: 96
Topic #: 12
[All Professional Cloud Developer Questions]

You are developing a web application that contains private images and videos stored in a Cloud Storage bucket. Your users are anonymous and do not have Google Accounts. You want to use your application-specific logic to control access to the images and videos. How should you configure access?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Maile
27 days ago
Option C with IAP sounds fancy, but why overcomplicate things? D gets the job done without all the extra setup.
upvoted 0 times
Wilda
14 days ago
But option C with IAP provides an extra layer of security.
upvoted 0 times
...
Tasia
17 days ago
I agree, option D seems like the simplest solution.
upvoted 0 times
...
...
Rutha
29 days ago
Haha, can you imagine trying to manage a big IP table? What is this, the 90s? D is the clear winner here.
upvoted 0 times
Marta
2 days ago
Yeah, D seems like the most efficient option for controlling access.
upvoted 0 times
...
Rory
3 days ago
I agree, managing a big IP table sounds like a nightmare.
upvoted 0 times
...
...
Mona
1 months ago
I was thinking B might work, but requiring users to authenticate through the app first is a good call. Signed URLs are the way to go.
upvoted 0 times
Ronald
3 days ago
B) Grant the Storage Object Viewer IAM role to allUsers. Allow users to access the bucket after authenticating through your web application.
upvoted 0 times
...
...
Desire
2 months ago
I agree, D seems the most straightforward approach. Keeping the authorization logic in our application makes it easier to manage and scale.
upvoted 0 times
Lillian
14 days ago
I agree, D seems the most straightforward approach. Keeping the authorization logic in our application makes it easier to manage and scale.
upvoted 0 times
...
Gretchen
17 days ago
C) Configure Identity-Aware Proxy (IAP) to authenticate users into the web application. Allow users to access the bucket after authenticating through IAP.
upvoted 0 times
...
Galen
20 days ago
D) Generate a signed URL that grants read access to the bucket. Allow users to access the URL after authenticating through your web application.
upvoted 0 times
...
...
Natalie
2 months ago
Option D looks like the best choice here. Generating a signed URL for the bucket allows us to control access without relying on Google Accounts or IP address caching.
upvoted 0 times
Kanisha
14 days ago
Option D does seem like a good choice. It provides a secure way to grant access to the bucket.
upvoted 0 times
...
Josphine
15 days ago
I'm not sure, I think option C with Identity-Aware Proxy could also be a good choice for authentication.
upvoted 0 times
...
Billye
24 days ago
Yeah, I agree. Using a signed URL seems like a secure way to manage access to the images and videos.
upvoted 0 times
...
Valda
2 months ago
I think option D is the way to go. It gives us control over access without needing Google Accounts.
upvoted 0 times
...
...
Kate
2 months ago
I'm not sure about option D. I think option C with Identity-Aware Proxy could also be a good solution for controlling access.
upvoted 0 times
...
Long
2 months ago
I agree with Hermila. Option D provides a secure way to grant access to the private images and videos.
upvoted 0 times
...
Hermila
2 months ago
I think option D is the best choice. It allows us to control access using our application-specific logic.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77