New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IBM C1000-172 Exam - Topic 3 Question 26 Discussion

Actual exam question for IBM's C1000-172 exam
Question #: 26
Topic #: 3
[All C1000-172 Questions]

How does a monitoring agent properly authenticate with the IBM Cloud Monitoring service it is sending metrics to?

Show Suggested Answer Hide Answer
Suggested Answer: C

In IBM Cloud, a monitoring agent properly authenticates with the IBM Cloud Monitoring service by using a service instance authorization. This approach allows secure interaction between the monitoring agent and the monitoring service by using identity and access management (IAM) policies and authorizations associated with a service instance.

Service instance authorizations grant specific permissions to services, enabling them to authenticate and interact with other services or resources securely. For IBM Cloud Monitoring, the agent uses the service instance authorization to send metrics to the monitoring service, ensuring that the communication is authenticated and authorized without relying on hard-coded credentials or API keys tied to individual users.

The service instance authorization method is recommended because it is aligned with best practices for securing services in cloud environments, offering a centralized and controlled way to manage permissions.

IBM Cloud Documentation Reference:

IBM Cloud Monitoring: Setting up and Configuring Agents

Service Authorization for IBM Cloud Services


Contribute your Thoughts:

0/2000 characters
Shaun
2 months ago
I agree with B, that's how I've always done it!
upvoted 0 times
...
Troy
2 months ago
I thought it was C, service instance authorization makes sense too.
upvoted 0 times
...
Antonio
3 months ago
A trusted profile? Never heard of that for this.
upvoted 0 times
...
Coletta
3 months ago
Surprised there's no mention of API keys in the options!
upvoted 0 times
...
Hollis
3 months ago
It's definitely B, the access key is crucial.
upvoted 0 times
...
Hoa
3 months ago
I practiced a similar question, and I think the trusted profile option was mentioned, but it seems less likely here.
upvoted 0 times
...
Tayna
4 months ago
I feel like it could be a service instance authorization, but I can't recall the details.
upvoted 0 times
...
Freeman
4 months ago
I remember something about using an access key when provisioning the service. That might be the right answer.
upvoted 0 times
...
Adrianna
4 months ago
I think the monitoring agent uses an API key from the master cloud account owner, but I'm not completely sure.
upvoted 0 times
...
Leota
4 months ago
I'm pretty confident the answer is B. The question specifically mentions the access key provided when provisioning the service, so that seems like the intended authentication method.
upvoted 0 times
...
Arleen
4 months ago
Option C, using a service instance authorization, sounds like it could be the right approach. I'll need to review the details on how that works for IBM Cloud Monitoring to be sure.
upvoted 0 times
...
German
5 months ago
Hmm, I'm not totally sure about this one. I know we need to authenticate somehow, but I'm not familiar with the specifics of IBM Cloud Monitoring. I'll have to think this through carefully.
upvoted 0 times
...
Dannie
5 months ago
I think the answer is B - using the access key provided when provisioning the monitoring service. That seems like the most straightforward way to authenticate.
upvoted 0 times
...
Cristal
5 months ago
I disagree, I believe it's C, using a service instance authorization.
upvoted 0 times
...
Vi
5 months ago
I'm going with C. Service instance authorization sounds fancy and professional.
upvoted 0 times
...
Serita
5 months ago
I think the answer is B, using the access key provided when provisioning the monitoring service.
upvoted 0 times
...
Verlene
6 months ago
Option B seems like the obvious choice here. Who doesn't love a good access key?
upvoted 0 times
...

Save Cancel