You plan to deploy your cloud infrastructure using a CI/CD cluster hosted on Compute Engine. You want to minimize the risk of its credentials being stolen by a third party. What should you do?
I practiced a similar question where we had to choose between service accounts and user accounts. I feel like option C might be the right approach, but I’m a bit hesitant.
I've got a good handle on this topic, so I'm confident I can nail this question. The reverse repo rate is determined by the central bank, not market forces, so A is wrong. B is the right answer.
I'm pretty sure the special folder permission is "Write". That allows you to create, modify, and delete files in the folder, which seems like the most comprehensive permission.
Galen
4 months agoKristel
4 months agoMarguerita
4 months agoPhil
4 months agoEttie
4 months agoBlondell
5 months agoElza
5 months agoLindy
5 months agoOctavio
5 months agoElza
5 months agoAn
5 months agoChandra
5 months agoQuentin
5 months agoBonita
5 months ago