BlackFriday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IBM Exam C1000-172 Topic 2 Question 8 Discussion

Actual exam question for IBM's C1000-172 exam
Question #: 8
Topic #: 2
[All C1000-172 Questions]

How does a monitoring agent properly authenticate with the IBM Cloud Monitoring service it is sending metrics to?

Show Suggested Answer Hide Answer
Suggested Answer: C

In IBM Cloud, a monitoring agent properly authenticates with the IBM Cloud Monitoring service by using a service instance authorization. This approach allows secure interaction between the monitoring agent and the monitoring service by using identity and access management (IAM) policies and authorizations associated with a service instance.

Service instance authorizations grant specific permissions to services, enabling them to authenticate and interact with other services or resources securely. For IBM Cloud Monitoring, the agent uses the service instance authorization to send metrics to the monitoring service, ensuring that the communication is authenticated and authorized without relying on hard-coded credentials or API keys tied to individual users.

The service instance authorization method is recommended because it is aligned with best practices for securing services in cloud environments, offering a centralized and controlled way to manage permissions.

IBM Cloud Documentation Reference:

IBM Cloud Monitoring: Setting up and Configuring Agents

Service Authorization for IBM Cloud Services


Contribute your Thoughts:

Rashad
26 days ago
Haha, option A sounds like something a monitored service would do - 'trust me, I'm legit!'
upvoted 0 times
...
Adria
1 months ago
D is the obvious choice. Why would you use anything other than the master account's API key?
upvoted 0 times
...
Murray
1 months ago
I'm torn between B and C. Guess I'll have to study the docs more closely.
upvoted 0 times
Jacki
3 days ago
You should definitely check the docs to be sure, but I'm leaning towards B as well.
upvoted 0 times
...
Ailene
17 days ago
I believe it's C, using a service instance authorization.
upvoted 0 times
...
Keena
22 days ago
I think it's B, the access key provided when provisioning the service.
upvoted 0 times
...
...
Naomi
1 months ago
I'm not sure, but I think it could also be C, using a service instance authorization.
upvoted 0 times
...
Hoa
1 months ago
I agree with Christoper, using the access key makes the most sense for authentication.
upvoted 0 times
...
Christoper
1 months ago
I think the answer is B, using the access key provided when provisioning the monitoring service.
upvoted 0 times
...
Jerrod
1 months ago
Option B is the way to go. Using the access key is the simplest and most secure method.
upvoted 0 times
Reita
17 days ago
I've never had any issues using the access key for authentication.
upvoted 0 times
...
Margurite
25 days ago
I agree, it's simple and effective.
upvoted 0 times
...
Laurene
28 days ago
It's definitely the most secure option.
upvoted 0 times
...
Romana
1 months ago
I always use the access key when authenticating with the IBM Cloud Monitoring service.
upvoted 0 times
...
...

Save Cancel