New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Google Cloud - Apigee Certified API Engineer Exam - Topic 3 Question 12 Discussion

Actual exam question for Google's Google Cloud - Apigee Certified API Engineer exam
Question #: 12
Topic #: 3
[All Google Cloud - Apigee Certified API Engineer Questions]

You need to access API back-end systems authorized by a machine user credential Each API call must connect to the API back-end system with unique credentials You need to keep user credential info securely protected How should you store the credential?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Lili
9 hours ago
Hardcoding credentials? No way, that’s a bad idea!
upvoted 0 times
...
Aja
6 days ago
I think B is good too, but not as secure as D.
upvoted 0 times
...
Felicitas
11 days ago
Storing the credentials in configuration files? That's like leaving your house keys under the doormat. Encrypted key-value maps, people!
upvoted 0 times
...
Linn
16 days ago
Option D is the only way to keep those credentials safe and secure. Anything else is just asking for a security breach.
upvoted 0 times
...
Dexter
21 days ago
Storing the credentials in configuration files? That's just asking for trouble. Encrypted key-value maps all the way!
upvoted 0 times
...
Pete
26 days ago
Hardcoding the credentials in the code? That's a big no-no! Option B or D is the way to go.
upvoted 0 times
...
Yen
1 month ago
Option D is the way to go. Storing the credentials in encrypted key-value maps is the most secure approach.
upvoted 0 times
...
Hui
1 month ago
I’m leaning towards D too, but I wonder if there are any performance implications with accessing encrypted maps at runtime.
upvoted 0 times
...
Tanesha
1 month ago
I think we practiced a similar question where storing in configuration files was mentioned, but I can't recall if that was considered secure enough.
upvoted 0 times
...
Marshall
2 months ago
I feel like storing them in encrypted Key-Value Maps makes the most sense, but I’m not entirely sure if D is the only secure option.
upvoted 0 times
...
Martina
2 months ago
I remember we discussed the importance of not hardcoding credentials, so I think A is definitely out.
upvoted 0 times
...
Paulina
2 months ago
I'm a bit confused by this question. I'll need to review the material again to make sure I understand the best way to store the credentials securely.
upvoted 0 times
...
Zita
2 months ago
D is definitely the best option for security.
upvoted 0 times
...
Sage
2 months ago
I'm leaning towards option B. Storing the credentials in key-value maps and accessing them at runtime could be a good way to keep them secure.
upvoted 0 times
...
Xuan
2 months ago
Option C looks good to me. Storing the credentials in configuration files and accessing them at runtime seems like a straightforward solution.
upvoted 0 times
...
Elenora
3 months ago
Hardcoded credentials? What is this, the 90s? Option D is the only way to go, unless you want your API to be hacked.
upvoted 0 times
...
Almeta
3 months ago
C is better than A, but still not ideal.
upvoted 0 times
...
Royal
3 months ago
Hmm, I'm not sure about this one. I'll need to think it through a bit more to decide which option is the best.
upvoted 0 times
...
Hollis
3 months ago
I think I'll go with option D. Storing the credentials in encrypted key-value maps seems like the most secure approach.
upvoted 0 times
...

Save Cancel