You have a file of 20 GB that you have to share with some contractors securely. They need it as quickly as they can. How fast and secure would they get the file?
Correct
Incorrect
Question 2 of 50
2. Question
1 point(s)
The test suite of your company is a custom C++ application running tests on virtual Linux machines every day. The whole test suite is completed for several hours and runs on a limited number of test servers on the premises. Your company would like to move the testing infrastructure to the cloud to reduce the time it takes to fully test the system change while minimizing tests. What should you recommend cloud infrastructure?
Correct
Incorrect
Question 3 of 50
3. Question
1 point(s)
An organization plans to migrate its web app to Google App Engine, and they still want to use the on-site database. How can the application be configured?
Correct
Incorrect
Question 4 of 50
4. Question
1 point(s)
A company has new features that you want to slowly implement in order to monitor for errors. The change includes some major changes to the UI. In order to perform a canary operation, you opted to use traffic splitting. You will begin by rolling the code out to 15% of your users. How do you manage the same experience with setting up traffic splits?
Correct
Incorrect
Question 5 of 50
5. Question
1 point(s)
An organization handles large volumes of time-stamped IoT data. There can be several petabytes of total data volume. The data must be written and modified at high speed. The most efficient storage option for your data is to be used. What product are you supposed to use?
Correct
Incorrect
Question 6 of 50
6. Question
1 point(s)
The infrastructure for the new application is planned by a company which has to store more than 100 TB or a petabyte of information in NoSQL format to be read / write low latency and high-performance analytics. How should you use the storage option?
Correct
Incorrect
Question 7 of 50
7. Question
1 point(s)
You have used the gcloud app deployment for App Engine. However, you do not find the implementation for the intended project, and the application seems to have been deployed in the wrong project. How can you find out which project was used for the application?
Correct
Incorrect
Question 8 of 50
8. Question
1 point(s)
Your firm designs a Cloud Spanner interacting application. You should view and edit the Cloud Spanner tables in the application. In view of the lower privilege principle, what role should you give the team members?
Correct
Incorrect
Question 9 of 50
9. Question
1 point(s)
In Google Cloud Storage, your company collects and stores security camera footage. In the first 30 days, threat detection, object detection, trend analysis, and suspicious behavior detection are regularly processed with footages. All data storage costs should be reduced to a minimum then how are the videos to store?
Correct
Incorrect
Question 10 of 50
10. Question
1 point(s)
With 30 microservices, a company is developing a large distributed application. they must connect to a back-end database for each of distributed microservices. The credentials should be safely stored. Where are the credentials to be stored?
Correct
Incorrect
Question 11 of 50
11. Question
1 point(s)
In the European-West1 region, organization project has all its computer engine resources. The default region for gcloud commands is Europa-west1. What are they supposed to do?
Correct
Incorrect
Question 12 of 50
12. Question
1 point(s)
A company created a cluster called “ips” of the Kubernetes engine that has the cluster pool named “pri-node pool.” Now they have realized that in order to meet the capacity requirements between 10 and 20, they need more total nodes. What is the command to change its pool’s number of nodes?
Correct
Incorrect
Question 13 of 50
13. Question
1 point(s)
Auditors visit their team every 12 months to review any policy changes made during the previous 12 months by Google Cloud Identity and Access Management (Cloud IAM). The process of analysis and audit will be streamlined and expedited. What should you do?
Correct
Incorrect
Question 14 of 50
14. Question
1 point(s)
You have a cloud storage bucket, which has a dozen HTML pages, a few JavaScript file, and a certain CSS to hold static web assets. How can you publicize the bucket?
Correct
Incorrect
Question 15 of 50
15. Question
1 point(s)
The media files that you have to migrate to Google Cloud Storage are more than 100 GB each. The files are in the data center on site. How can you migrate to speed up the transfer process?
Correct
Incorrect
Question 16 of 50
16. Question
1 point(s)
A leading software engineer says his new app design is using web sockets and HTTP sessions not distributed across web servers. You want to support him in making sure the Google Cloud Platform app is running correctly. What are you supposed to do?
Correct
Incorrect
Question 17 of 50
17. Question
1 point(s)
A new firewall rule has been developed to allow traffic entering port 22 using a “dev-ssh” target tag. You have tried, and you are still unable to connect to one of your instances. How you resolve this issue?
Correct
Incorrect
Question 18 of 50
18. Question
1 point(s)
An organization transfers its business applications to Google Cloud. Their security team wishes to see every project in the organization in detail. The Google Cloud Resource Manager is provided by cloud engineer and set up the CEO as the org admin. What roles should you give the security team to Google Cloud Identity and Access Management?
Correct
Incorrect
Question 19 of 50
19. Question
1 point(s)
How you estimate the annual cost of running a nightly BigQuery query?
Correct
Incorrect
Question 20 of 50
20. Question
1 point(s)
You have used a Deployment Manager application. The deployment should be updated with minimum downtime. How can you do this?
Correct
Incorrect
Question 21 of 50
21. Question
1 point(s)
You are payable for your two projects via a self-served billing account. Your billing threshold is $1000,00, and you spend about $50 a day between the two projects. You have been accused for the last 18 days. Where are you going to be charged next given the above data?
Correct
Incorrect
Question 22 of 50
22. Question
1 point(s)
A firm is hosting critical data by using Cloud SQL. You want to make it possible to recover Point In Time (PIT) to a particular point in for instance. How are you to set up the same thing?
Correct
Incorrect
Question 23 of 50
23. Question
1 point(s)
It was your task to get all public SSH keys of your team into all instances of a particular project. You gathered all of them. What is the easiest way to deploy the keys?
Correct
Incorrect
Question 24 of 50
24. Question
1 point(s)
An organization have hardcoded the database credentials to be used by application on Kubernetes Engine. The YAML they’re using looks similar to the following:apiVersion: “extensions/v1beta1” kind: “Deployment” metadata: name: “products-service” namespace: “default” labels: app: “products-service” spec: replicas: 3 selector: matchLabels: app: “products-service” template: metadata: labels: app: “products-service” spec: containers: – name: “products” image: “gcr.io/find-seller-app-dev/products:latest” env: – name: “database_user” value: “admin” – name: “database_password” value: “TheB3stP@ssW0rd” What is Google’s recommended best practice for working with sensitive information inside of Kubernetes?
Correct
Incorrect
Question 25 of 50
25. Question
1 point(s)
Your company wishes to host its confidential documents in Cloud Storage. Due to compliance requirements, data are necessary even in case of a regional failure to be highly available and resilient. What classes of storage help meet the needs? (select any 2)
Correct
Incorrect
Question 26 of 50
26. Question
1 point(s)
In your new network and subnet, you have set up an instance. Your firewall rules shall be used for all instances in your network with the following firewall rules. NAME:deny-all | NETWORK:devnet | DIRECTION:INGRESS | PRIORITY:1000 | DENY:tcp:0-65535,udp:0-6553 NAME:open-ssh | NETWORK:devnet | DIRECTION:INGRESS | PRIORITY:5000 | ALLOW:tcp:22. When you try to connect to the instance via SSH, you get connection timeout. What was the issue behind this?
Correct
Incorrect
Question 27 of 50
27. Question
1 point(s)
A company has a managed automatic instance group set to scale based on the 60 percent CPU usage. In the instance group, there are currently 3 instances. The CPU usage is 70 percent, of the instance they are logged in. The instance group does not, however, start another instance. What is the most probable reason for this?
Correct
Incorrect
Question 28 of 50
28. Question
1 point(s)
App Engine applications have been running for a few weeks in a standard environment. You just deployed a broken version with a number of successful deployments, and the developers are not available. What is the quickest way to get the site to work?
Correct
Incorrect
Question 29 of 50
29. Question
1 point(s)
An enterprise has created a new account and must transfer the projects to the account for payments. What role does the billing account need to change? (select any 2)
Correct
Incorrect
Question 30 of 50
30. Question
1 point(s)
Company moves its storage to Google Cloud Storage (GCS). The data includes personal data (PII) and customer information sensitive. How should you use a security strategy for GCS?
Correct
Incorrect
Question 31 of 50
31. Question
1 point(s)
In the European-west1-d zone, you have an application server running on Compute Engine. You must ensure high availability and replicate the server with the minimum possible steps to the European-West2-C area. How you can do this?
Correct
Incorrect
Question 32 of 50
32. Question
1 point(s)
An organization decided to store Cloud Storage data files. To begin with, the information would be host in a regional bucket. To move the data for archiving after 30 days and delete it after one year, you need to configure the Cloud Storage Lifecycle rule. What should you do with these two actions?
Correct
Incorrect
Question 33 of 50
33. Question
1 point(s)
A company is hosting critical data with Cloud SQL. If you have a complete zone failure, then you high availability. How you can do this?
Correct
Incorrect
Question 34 of 50
34. Question
1 point(s)
The company wants to build a Cloud storage bucket application that stores the images, generates thumbnails and resizes the images. They want to use a managed service that automatically helps you scale from 0 to scale and back to 0. Which GCP service meets the needs?
Correct
Incorrect
Question 35 of 50
35. Question
1 point(s)
The new Jenkins instance must need to be set up quickly. How you can do this?
Correct
Incorrect
Question 36 of 50
36. Question
1 point(s)
You work in a small company where all the resources of a given project can be viewed. You would like to give them access to the recommended practices of Google. How you do this?
Correct
Incorrect
Question 37 of 50
37. Question
1 point(s)
An enterprise migrates to Google Cloud its on-site application. The application uses a license server component. The IP address of the license server is 10.28.0.10. You want the application to be deployed without any code or setup changes. How should the application be implemented?
Correct
Incorrect
Question 38 of 50
38. Question
1 point(s)
All thing happens in the API has been fully logged by your developers. The API provides end-users with data requirements such as JSON, XML, CSV, and XLS. It takes a lot of developer effort to support all these formats. Management wants to begin tracking the options used for the following month. What is the quickest way to report on this information at the end of the month without modifying the code?
Correct
Incorrect
Question 39 of 50
39. Question
1 point(s)
For a few weeks, an organization has been running your marketing application with Autoscaling on the App Engine app, and it has worked well. The marketing team, however, plan a large campaign and expect a great deal of explosive traffic. How do you ensure that 3 idle instances always exist?
Correct
Incorrect
Question 40 of 50
40. Question
1 point(s)
Your company has appointed external auditors to monitor your system’s security. All users and roles configured want to be examined. What is the best way for users and roles to check?
Correct
Incorrect
Question 41 of 50
41. Question
1 point(s)
An organization needs to back up data and store for disaster recovery scenarios. They must conduct monthly recovery exercises in accordance with disasters. What is the best standard class for storage?
Correct
Incorrect
Question 42 of 50
42. Question
1 point(s)
Your project manager wants to delegate to his team members the responsibility for managing cloud storage files and buckets. With the less privileged principle, what role should you play in the team?
Correct
Incorrect
Question 43 of 50
43. Question
1 point(s)
Your application is host in several regions with relational data and static pictures. There are more than 10 TB of data in Your database. For each data type, you want to use a unique storage repository in all areas. For that task, which two products would you choose? (Select any 2)
Correct
Incorrect
Question 44 of 50
44. Question
1 point(s)
A company has a team of developers that are trying to find the best compute service for running a static website. You have a dozen HTML pages, some JavaScript and some CSS files. For the weeks it runs, you need the website highly available. They have a small budget as well. What is the best service for running the site?
Correct
Incorrect
Question 45 of 50
45. Question
1 point(s)
A large amount of data stored by BigQuery must be queried by a company. they know that a large amount of data is expected to be returned. What would the cost of the query?
Correct
Incorrect
Question 46 of 50
46. Question
1 point(s)
A company has its App Engine application which needs to store stateful data in a proper storage service. The data is non-relational database data. The size of the database is not be expected to grow beyond 10 GB, and they need to have the ability to scale down to zero to avoid unnecessary costs. Which storage service should they use?
Correct
Incorrect
Question 47 of 50
47. Question
1 point(s)
In order to diagnose some errors, your developers try to connect to a Ubuntu server over SSH. The connection times out, however. How you resolve this problem?
Correct
Incorrect
Question 48 of 50
48. Question
1 point(s)
You’re working on creating a script that can extract the IP address of a Kubernetes Service. Your coworker sent you a code snippet that they had saved. Which one is the best starting point for your code?
Correct
Incorrect
Question 49 of 50
49. Question
1 point(s)
Your company plans to deploy a Google Cloud web application on a custom Linux distribution. Your website is accessible worldwide and needs to be expanded to satisfy demand. To achieve this objective, select all necessary component from the following: (Select any 2)
Correct
Incorrect
Question 50 of 50
50. Question
1 point(s)
A company has to back up data and store all backup data for disaster recovery scenarios. These data would not be available otherwise and would only be required in the event of a disaster. What is the best standard class for storage?
Correct
Incorrect
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.