One of your primary business objectives is being able to trust the data stored in your application. You want to log all changes to the application data.
How can you design your logging system to verify authenticity of your logs?
A . Write the log concurrently in the cloud and on premises
B . Use a SQL database and limit who can modify the log table
C . Digitally sign each timestamp and log entry and store the signature
D . Create a JSON dump of each log entry and store it in Google Cloud Storage
Answer: C
Explanation:
Write a log entry. If the log does not exist, it is created. You can specify a severity for the log entry, and you can write a structured log entry by specifying –payload-type=json and writing your message as a JSON string:
gcloud logging write LOG STRING
gcloud logging write LOG JSON-STRING –payload-type=json
References: https://cloud.google.com/logging/docs/reference/tools/gcloud-logging
Latest Professional Cloud Architect Dumps Valid Version with 168 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund