Medium1 markMultiple Choice
Subtask 3.1: Security DesignSecurityIoTAuthenticationCryptography
This question is part of a case study — click to read the full scenario(Case 11)

CASE STUDY: TerramEarth

Company Overview: TerramEarth manufactures heavy equipment. 2 million vehicles in the field.
Current Environment: Vehicles send telemetry via cellular. Processing 100,000 msgs/sec. On-prem Hadoop cluster.
Business Requirements: Predict equipment failure. Reduce warranty costs. Provide fleet dashboard.
Executive Statements: CEO: 'Monetize data.' CFO: 'Storage costs spiraling.' CTO: 'Need scalable ingestion and ML.'
Technical Requirements: Ingest 500,000 msgs/sec. Store petabytes cost-effectively. Train ML models. Real-time anomaly detection.
Constraints: Intermittent connectivity. Strict vehicle authentication.

QUESTION:
Which architecture should you design to handle the ingestion of 500,000 messages per second from vehicles with intermittent connectivity?

GCP PCA · Question 13 · Security Design

CASE STUDY: TerramEarth

Company Overview: TerramEarth manufactures heavy equipment. 2 million vehicles in the field.
Current Environment: Vehicles send telemetry via cellular. Processing 100,000 msgs/sec. On-prem Hadoop cluster.
Business Requirements: Predict equipment failure. Reduce warranty costs. Provide fleet dashboard.
Executive Statements: CEO: 'Monetize data.' CFO: 'Storage costs spiraling.' CTO: 'Need scalable ingestion and ML.'
Technical Requirements: Ingest 500,000 msgs/sec. Store petabytes cost-effectively. Train ML models. Real-time anomaly detection.
Constraints: Intermittent connectivity. Strict vehicle authentication.

QUESTION:
How should you meet the strict vehicle authentication constraint when vehicles connect to the GCP environment?

Answer options:

A.

Hardcode a single GCP Service Account JSON key in all 2 million vehicles.

B.

Require drivers to log in using Google Workspace credentials before starting the vehicle.

C.

Use asymmetric key pairs (RSA or Elliptic Curve) stored in a secure hardware element on the vehicle to sign JWTs for authentication.

D.

Use IP whitelisting in Cloud Armor to only allow traffic from the vehicles.

How to approach this question

Identify the best practice for authenticating millions of distributed IoT devices.

Full Answer

C.Use asymmetric key pairs (RSA or Elliptic Curve) stored in a secure hardware element on the vehicle to sign JWTs for authentication.✓ Correct
Use asymmetric key pairs (RSA or Elliptic Curve) stored in a secure hardware element on the vehicle to sign JWTs for authentication.
For IoT deployments, the best practice is to provision each device with a unique asymmetric key pair. The private key is stored securely on the device (e.g., in a Trusted Platform Module). The device uses this key to sign a JWT, which the server verifies using the device's registered public key.

Common mistakes

Suggesting Service Account keys, which are meant for server-to-server communication, not distributed edge devices.

Practice the full GCP Professional Cloud Architect Practice Exam 1

50 questions · hints · full answers · grading

More questions from this exam