Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Google Exam Professional Cloud Developer Topic 12 Question 96 Discussion

Actual exam question for Google's Professional Cloud Developer exam
Question #: 96
Topic #: 12
[All Professional Cloud Developer Questions]

You are developing a web application that contains private images and videos stored in a Cloud Storage bucket. Your users are anonymous and do not have Google Accounts. You want to use your application-specific logic to control access to the images and videos. How should you configure access?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Maile
30 days ago
Option C with IAP sounds fancy, but why overcomplicate things? D gets the job done without all the extra setup.
upvoted 0 times
Hyman
2 days ago
True, but sometimes simplicity is key when it comes to development.
upvoted 0 times
...
Wilda
17 days ago
But option C with IAP provides an extra layer of security.
upvoted 0 times
...
Tasia
20 days ago
I agree, option D seems like the simplest solution.
upvoted 0 times
...
...
Rutha
1 months ago
Haha, can you imagine trying to manage a big IP table? What is this, the 90s? D is the clear winner here.
upvoted 0 times
Ula
2 days ago
IAP authentication would add an extra layer of security to the application.
upvoted 0 times
...
Arletta
3 days ago
Signed URLs would definitely simplify things for users.
upvoted 0 times
...
Marta
5 days ago
Yeah, D seems like the most efficient option for controlling access.
upvoted 0 times
...
Rory
6 days ago
I agree, managing a big IP table sounds like a nightmare.
upvoted 0 times
...
...
Mona
1 months ago
I was thinking B might work, but requiring users to authenticate through the app first is a good call. Signed URLs are the way to go.
upvoted 0 times
Ronald
6 days ago
B) Grant the Storage Object Viewer IAM role to allUsers. Allow users to access the bucket after authenticating through your web application.
upvoted 0 times
...
...
Desire
2 months ago
I agree, D seems the most straightforward approach. Keeping the authorization logic in our application makes it easier to manage and scale.
upvoted 0 times
Lillian
17 days ago
I agree, D seems the most straightforward approach. Keeping the authorization logic in our application makes it easier to manage and scale.
upvoted 0 times
...
Gretchen
20 days ago
C) Configure Identity-Aware Proxy (IAP) to authenticate users into the web application. Allow users to access the bucket after authenticating through IAP.
upvoted 0 times
...
Galen
23 days ago
D) Generate a signed URL that grants read access to the bucket. Allow users to access the URL after authenticating through your web application.
upvoted 0 times
...
...
Natalie
2 months ago
Option D looks like the best choice here. Generating a signed URL for the bucket allows us to control access without relying on Google Accounts or IP address caching.
upvoted 0 times
Kanisha
17 days ago
Option D does seem like a good choice. It provides a secure way to grant access to the bucket.
upvoted 0 times
...
Josphine
18 days ago
I'm not sure, I think option C with Identity-Aware Proxy could also be a good choice for authentication.
upvoted 0 times
...
Billye
27 days ago
Yeah, I agree. Using a signed URL seems like a secure way to manage access to the images and videos.
upvoted 0 times
...
Valda
2 months ago
I think option D is the way to go. It gives us control over access without needing Google Accounts.
upvoted 0 times
...
...
Kate
2 months ago
I'm not sure about option D. I think option C with Identity-Aware Proxy could also be a good solution for controlling access.
upvoted 0 times
...
Long
3 months ago
I agree with Hermila. Option D provides a secure way to grant access to the private images and videos.
upvoted 0 times
...
Hermila
3 months ago
I think option D is the best choice. It allows us to control access using our application-specific logic.
upvoted 0 times
...

Save Cancel