Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 300-910 Topic 4 Question 82 Discussion

Actual exam question for Cisco's 300-910 exam
Question #: 82
Topic #: 4
[All 300-910 Questions]

A DevOps engineer must build a Docker image to containerize an application. Then the image must be pushed to a repository on Docker Hub in a CI/CD pipeline using GitHub Actions.

Which approach securely encrypts the Docker Hub access token as an environment variable within the CI/CD pipeline?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Argelia
7 days ago
I'd rather not 'hard code' anything. That's just begging for a security breach. Option B is the clear winner here.
upvoted 0 times
Leota
2 days ago
Option B is definitely the way to go. Storing the access token with GitHub encrypted secrets is much more secure.
upvoted 0 times
...
...
Lucina
16 days ago
I disagree, hard coding the access token in the repository with Base64 encoding is not secure at all.
upvoted 0 times
...
Stefania
16 days ago
Hah, hardcoding the token? What is this, the 90s? GitHub secrets all the way, folks!
upvoted 0 times
...
Kandis
17 days ago
I don't know, Option C seems like a good compromise. An environment file in the repo is still pretty secure, right?
upvoted 0 times
...
Delfina
20 days ago
I believe storing the access token with GitHub environment variables is also a secure option.
upvoted 0 times
...
Brandon
23 days ago
Option D is a terrible idea. Hardcoding the token, even with Base64 encoding, is just asking for trouble. Go with B.
upvoted 0 times
Nobuko
4 days ago
I agree, storing the access token with GitHub encrypted secrets is the best approach.
upvoted 0 times
...
Marlon
18 days ago
Option D is definitely not secure. B is the way to go.
upvoted 0 times
...
...
Renea
1 months ago
I agree with Dolores, storing it as encrypted secrets adds an extra layer of security.
upvoted 0 times
...
Dolores
1 months ago
I think the best approach is to store the access token with GitHub encrypted secrets.
upvoted 0 times
...
Jerry
1 months ago
Definitely B. Storing the token as a GitHub secret keeps it out of the codebase and away from prying eyes.
upvoted 0 times
Detra
4 days ago
Agreed, it's important to keep sensitive information secure.
upvoted 0 times
...
Gregoria
6 days ago
That's the best practice for security.
upvoted 0 times
...
Leonida
8 days ago
B) Store the access token with GitHub encrypted secrets
upvoted 0 times
...
Loreen
12 days ago
A) Store the access token with GitHub environment variables
upvoted 0 times
...
Curtis
22 days ago
B) Store the access token with GitHub encrypted secrets
upvoted 0 times
...
Erin
22 days ago
That's the best practice for security.
upvoted 0 times
...
...
Felix
1 months ago
Option B is the way to go. GitHub encrypted secrets are the most secure way to store sensitive information like the Docker Hub access token.
upvoted 0 times
Jacinta
9 days ago
Let's make sure to follow best practices for security.
upvoted 0 times
...
Sherly
10 days ago
Agreed, it's important to keep sensitive information safe.
upvoted 0 times
...
Asuncion
22 days ago
Definitely, that's the most secure option.
upvoted 0 times
...
Jacquelyne
1 months ago
User 1: I think we should store the access token with GitHub encrypted secrets.
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77