Watch this video on YouTube
To ensure proper authentication of services accessing various Google Cloud APIs within a Google Kubernetes Engine (GKE) cluster, adhering to Google's recommended best practices, which approaches should you implement? (Choose two)