Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IBM Exam C1000-172 Topic 3 Question 26 Discussion

Actual exam question for IBM's C1000-172 exam
Question #: 26
Topic #: 3
[All C1000-172 Questions]

How does a monitoring agent properly authenticate with the IBM Cloud Monitoring service it is sending metrics to?

Show Suggested Answer Hide Answer
Suggested Answer: C

In IBM Cloud, a monitoring agent properly authenticates with the IBM Cloud Monitoring service by using a service instance authorization. This approach allows secure interaction between the monitoring agent and the monitoring service by using identity and access management (IAM) policies and authorizations associated with a service instance.

Service instance authorizations grant specific permissions to services, enabling them to authenticate and interact with other services or resources securely. For IBM Cloud Monitoring, the agent uses the service instance authorization to send metrics to the monitoring service, ensuring that the communication is authenticated and authorized without relying on hard-coded credentials or API keys tied to individual users.

The service instance authorization method is recommended because it is aligned with best practices for securing services in cloud environments, offering a centralized and controlled way to manage permissions.

IBM Cloud Documentation Reference:

IBM Cloud Monitoring: Setting up and Configuring Agents

Service Authorization for IBM Cloud Services


Contribute your Thoughts:

Freeman
5 days ago
I remember something about using an access key when provisioning the service. That might be the right answer.
upvoted 0 times
...
Adrianna
11 days ago
I think the monitoring agent uses an API key from the master cloud account owner, but I'm not completely sure.
upvoted 0 times
...
Leota
16 days ago
I'm pretty confident the answer is B. The question specifically mentions the access key provided when provisioning the service, so that seems like the intended authentication method.
upvoted 0 times
...
Arleen
21 days ago
Option C, using a service instance authorization, sounds like it could be the right approach. I'll need to review the details on how that works for IBM Cloud Monitoring to be sure.
upvoted 0 times
...
German
26 days ago
Hmm, I'm not totally sure about this one. I know we need to authenticate somehow, but I'm not familiar with the specifics of IBM Cloud Monitoring. I'll have to think this through carefully.
upvoted 0 times
...
Dannie
1 months ago
I think the answer is B - using the access key provided when provisioning the monitoring service. That seems like the most straightforward way to authenticate.
upvoted 0 times
...
Cristal
1 months ago
I disagree, I believe it's C, using a service instance authorization.
upvoted 0 times
...
Vi
1 months ago
I'm going with C. Service instance authorization sounds fancy and professional.
upvoted 0 times
...
Serita
2 months ago
I think the answer is B, using the access key provided when provisioning the monitoring service.
upvoted 0 times
...
Verlene
3 months ago
Option B seems like the obvious choice here. Who doesn't love a good access key?
upvoted 0 times
...

Save Cancel