Associate Cloud Engineer Exam QuestionsBrowse all questions from this exam

Associate Cloud Engineer Exam - Question 67


You built an application on Google Cloud that uses Cloud Spanner. Your support team needs to monitor the environment but should not have access to table data.

You need a streamlined solution to grant the correct permissions to your support team, and you want to follow Google-recommended practices. What should you do?

Show Answer
Correct Answer: AB

The roles/monitoring.viewer role grants read-only access to monitoring data without giving access to the table data. This is the correct role for monitoring the environment while following Google-recommended practices to ensure the support team does not have access to sensitive table data.

Discussion

17 comments
Sign in to comment
poogcpOption: A
Jun 10, 2020

its A, As you need to monitor only

WindDriver
Jul 13, 2021

A, right, correct answer. B and C are incorrect because allow to read data. D also incorrect: Not for monitoring. roles/stackdriver.accounts.viewer Stackdriver Accounts Viewer: Read-only access to get and list information about Stackdriver account structure (resourcemanager.projects.get, resourcemanager.projects.list and stackdriver.projects.get)

WindDriver
Jul 13, 2021

https://cloud.google.com/iam/docs/understanding-roles

GurnoorOption: A
Jun 13, 2020

A is correct as user should not have any access to data, so B and C cant be used in this scenario.

Priyankahere
Jan 17, 2022

This was there in exam, go with community answers.

BuruguduystunstugudunstuyOption: A
Feb 20, 2023

Answer A, adding the support team group to the roles/monitoring.viewer role, is the CORRECT answer. This role grants read-only access to monitoring data for all resources in a project, which allows the support team to monitor the environment but not access the table data. Answer B, adding the support team group to the roles/spanner.databaseUser role, grants read and write access to all tables in the specified database, which is NOT required for the support team to monitor the environment. Answer C, adding the support team group to the roles/spanner.databaseReader role, grants read-only access to all tables in the specified database, which would give the support team access to the table data. Answer D, adding the support team group to the roles/stackdriver.accounts.viewer role, grants permissions to view Stackdriver data for all resources in a project, which is NOT directly related to monitoring the Cloud Spanner environment.

Cornholio_LMC
Sep 24, 2022

had this question today

wolfie09Option: A
Jun 6, 2022

A is correct

RanjithKOption: A
Jul 2, 2022

A. This is the only role that provides read-only access to get and list information about all monitoring data and configurations.

ekta25Option: A
Oct 6, 2023

A. Add the support team group to the roles/monitoring.viewer role

haroldbenitesOption: A
Jun 4, 2022

Go for A

AzureDP900Option: A
Jun 23, 2022

You only need to monitor so A is correct!

AzureDP900
Jun 23, 2022

roles/monitoring.viewer Monitoring Viewer Grants read-only access to Monitoring in the Google Cloud console and API.

raghu09Option: A
Sep 16, 2022

B is wrong because it grants write access also we only need monitoring access.

ZozeOption: A
Nov 19, 2022

A is correct, the team need to monitor the environment not read the data.

cslinceOption: A
Dec 6, 2022

A is correct

sakdip66Option: A
Apr 13, 2023

the goal of support team is to MONITOR the environment only. therefore roles/monitoring.viewer role is the best option we have https://cloud.google.com/spanner/docs/iam#roles

Captain1212Option: A
Sep 2, 2023

A as you only need the monitor access

axantroffOption: A
Sep 30, 2023

Makes sense for me

nish2288Option: D
Jun 25, 2024

Its D. Stackdriver roles in GCP (Google Cloud Platform) are predefined sets of permissions that control access to monitoring and logging data within Stackdriver, a suite of tools for monitoring and logging applications and infrastructure in GCP. These roles determine what users or groups can see and do within Stackdriver. They allow you to grant granular access levels, ensuring users have the necessary permissions to perform their tasks without exposing sensitive data or granting unnecessary control.