ExamGecko
Home Home / Google / Professional Cloud Architect

Google Professional Cloud Architect Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

Related questions











The current Dress4win system architecture has high latency to some customers because it is located in one data center.

As of a future evaluation and optimizing for performance in the cloud, Dresss4win wants to distribute its system architecture to multiple locations when Google cloud platform.

Which approach should they use?

A.
Use regional managed instance groups and a global load balancer to increase performance because the regional managed instance group can grow instances in each region separately based on traffic.
A.
Use regional managed instance groups and a global load balancer to increase performance because the regional managed instance group can grow instances in each region separately based on traffic.
Answers
B.
Use a global load balancer with a set of virtual machines that forward the requests to a closer group of virtual machines managed by your operations team.
B.
Use a global load balancer with a set of virtual machines that forward the requests to a closer group of virtual machines managed by your operations team.
Answers
C.
Use regional managed instance groups and a global load balancer to increase reliability by providing automatic failover between zones in different regions.
C.
Use regional managed instance groups and a global load balancer to increase reliability by providing automatic failover between zones in different regions.
Answers
D.
Use a global load balancer with a set of virtual machines that forward the requests to a closer group of virtual machines as part of a separate managed instance groups.
D.
Use a global load balancer with a set of virtual machines that forward the requests to a closer group of virtual machines as part of a separate managed instance groups.
Answers
Suggested answer: A

Explanation:

For this question, refer to the Dress4Win case study. Dress4Win is expected to grow to 10 times its size in 1 year with a corresponding growth in data and traffic that mirrors the existing patterns of usage. The CIO has set the target of migrating production infrastructure to the cloud within the next 6 months. How will you configure the solution to scale for this growth without making major application changes and still maximize the ROI?

A.
Migrate the web application layer to App Engine, and MySQL to Cloud Datastore, and NAS to Cloud Storage. Deploy RabbitMQ, and deploy Hadoop servers using Deployment Manager.
A.
Migrate the web application layer to App Engine, and MySQL to Cloud Datastore, and NAS to Cloud Storage. Deploy RabbitMQ, and deploy Hadoop servers using Deployment Manager.
Answers
B.
Migrate RabbitMQ to Cloud Pub/Sub, Hadoop to BigQuery, and NAS to Compute Engine with Persistent Disk storage. Deploy Tomcat, and deploy Nginx using Deployment Manager.
B.
Migrate RabbitMQ to Cloud Pub/Sub, Hadoop to BigQuery, and NAS to Compute Engine with Persistent Disk storage. Deploy Tomcat, and deploy Nginx using Deployment Manager.
Answers
C.
Implement managed instance groups for Tomcat and Nginx. Migrate MySQL to Cloud SQL, RabbitMQ to Cloud Pub/Sub, Hadoop to Cloud Dataproc, and NAS to Compute Engine with Persistent Disk storage.
C.
Implement managed instance groups for Tomcat and Nginx. Migrate MySQL to Cloud SQL, RabbitMQ to Cloud Pub/Sub, Hadoop to Cloud Dataproc, and NAS to Compute Engine with Persistent Disk storage.
Answers
D.
Implement managed instance groups for the Tomcat and Nginx. Migrate MySQL to Cloud SQL, RabbitMQ to Cloud Pub/Sub, Hadoop to Cloud Dataproc, and NAS to Cloud Storage.
D.
Implement managed instance groups for the Tomcat and Nginx. Migrate MySQL to Cloud SQL, RabbitMQ to Cloud Pub/Sub, Hadoop to Cloud Dataproc, and NAS to Cloud Storage.
Answers
Suggested answer: D

For this question, refer to the Dress4Win case study. Considering the given business requirements, how would you automate the deployment of web and transactional data layers?

A.
Deploy Nginx and Tomcat using Cloud Deployment Manager to Compute Engine. Deploy a Cloud SQL server to replace MySQL. Deploy Jenkins using Cloud Deployment Manager.
A.
Deploy Nginx and Tomcat using Cloud Deployment Manager to Compute Engine. Deploy a Cloud SQL server to replace MySQL. Deploy Jenkins using Cloud Deployment Manager.
Answers
B.
Deploy Nginx and Tomcat using Cloud Launcher. Deploy a MySQL server using Cloud Launcher. Deploy Jenkins to Compute Engine using Cloud Deployment Manager scripts.
B.
Deploy Nginx and Tomcat using Cloud Launcher. Deploy a MySQL server using Cloud Launcher. Deploy Jenkins to Compute Engine using Cloud Deployment Manager scripts.
Answers
C.
Migrate Nginx and Tomcat to App Engine. Deploy a Cloud Datastore server to replace the MySQL server in a high-availability configuration. Deploy Jenkins to Compute Engine using Cloud Launcher.
C.
Migrate Nginx and Tomcat to App Engine. Deploy a Cloud Datastore server to replace the MySQL server in a high-availability configuration. Deploy Jenkins to Compute Engine using Cloud Launcher.
Answers
D.
Migrate Nginx and Tomcat to App Engine. Deploy a MySQL server using Cloud Launcher. Deploy Jenkins to Compute Engine using Cloud Launcher.
D.
Migrate Nginx and Tomcat to App Engine. Deploy a MySQL server using Cloud Launcher. Deploy Jenkins to Compute Engine using Cloud Launcher.
Answers
Suggested answer: A

For this question, refer to the Dress4Win case study. Which of the compute services should be migrated as -is and would still be an optimized architecture for performance in the cloud?

A.
Web applications deployed using App Engine standard environment
A.
Web applications deployed using App Engine standard environment
Answers
B.
RabbitMQ deployed using an unmanaged instance group
B.
RabbitMQ deployed using an unmanaged instance group
Answers
C.
Hadoop/Spark deployed using Cloud Dataproc Regional in High Availability mode
C.
Hadoop/Spark deployed using Cloud Dataproc Regional in High Availability mode
Answers
D.
Jenkins, monitoring, bastion hosts, security scanners services deployed on custom machine types
D.
Jenkins, monitoring, bastion hosts, security scanners services deployed on custom machine types
Answers
Suggested answer: D

For this question, refer to the Dress4Win case study. To be legally compliant during an audit, Dress4Win must be able to give insights in all administrative actions that modify the configuration or metadata of resources on Google Cloud.

What should you do?

A.
Use Stackdriver Trace to create a trace list analysis.
A.
Use Stackdriver Trace to create a trace list analysis.
Answers
B.
Use Stackdriver Monitoring to create a dashboard on the project's activity.
B.
Use Stackdriver Monitoring to create a dashboard on the project's activity.
Answers
C.
Enable Cloud Identity-Aware Proxy in all projects, and add the group of Administrators as a member.
C.
Enable Cloud Identity-Aware Proxy in all projects, and add the group of Administrators as a member.
Answers
D.
Use the Activity page in the GCP Console and Stackdriver Logging to provide the required insight.
D.
Use the Activity page in the GCP Console and Stackdriver Logging to provide the required insight.
Answers
Suggested answer: D

For this question, refer to the Dress4Win case study. You are responsible for the security of data stored in Cloud Storage for your company, Dress4Win. You have already created a set of Google Groups and assigned the appropriate users to those groups. You should use Google best practices and implement the simplest design to meet the requirements.

Considering Dress4Win's business and technical requirements, what should you do?

A.
Assign custom IAM roles to the Google Groups you created in order to enforce security requirements. Encrypt data with a customer-supplied encryption key when storing files in Cloud Storage.
A.
Assign custom IAM roles to the Google Groups you created in order to enforce security requirements. Encrypt data with a customer-supplied encryption key when storing files in Cloud Storage.
Answers
B.
Assign custom IAM roles to the Google Groups you created in order to enforce security requirements. Enable default storage encryption before storing files in Cloud Storage.
B.
Assign custom IAM roles to the Google Groups you created in order to enforce security requirements. Enable default storage encryption before storing files in Cloud Storage.
Answers
C.
Assign predefined IAM roles to the Google Groups you created in order to enforce security requirements. Utilize Google's default encryption at rest when storing files in Cloud Storage.
C.
Assign predefined IAM roles to the Google Groups you created in order to enforce security requirements. Utilize Google's default encryption at rest when storing files in Cloud Storage.
Answers
D.
Assign predefined IAM roles to the Google Groups you created in order to enforce security requirements. Ensure that the default Cloud KMS key is set before storing files in Cloud Storage.
D.
Assign predefined IAM roles to the Google Groups you created in order to enforce security requirements. Ensure that the default Cloud KMS key is set before storing files in Cloud Storage.
Answers
Suggested answer: C

For this question, refer to the Dress4Win case study. You want to ensure that your on-premises architecture meets business requirements before you migrate your solution.

What change in the on-premises architecture should you make?

A.
Replace RabbitMQ with Google Pub/Sub.
A.
Replace RabbitMQ with Google Pub/Sub.
Answers
B.
Downgrade MySQL to v5.7, which is supported by Cloud SQL for MySQL.
B.
Downgrade MySQL to v5.7, which is supported by Cloud SQL for MySQL.
Answers
C.
Resize compute resources to match predefined Compute Engine machine types.
C.
Resize compute resources to match predefined Compute Engine machine types.
Answers
D.
Containerize the micro services and host them in Google Kubernetes Engine.
D.
Containerize the micro services and host them in Google Kubernetes Engine.
Answers
Suggested answer: C

Explanation:

For this question, refer to the EHR Healthcare case study. You are responsible for ensuring that EHR's use of Google Cloud will pass an upcoming privacy compliance audit. What should you do? (Choose two.)

A.
Verify EHR's product usage against the list of compliant products on the Google Cloud compliance page.
A.
Verify EHR's product usage against the list of compliant products on the Google Cloud compliance page.
Answers
B.
Advise EHR to execute a Business Associate Agreement (BAA) with Google Cloud.
B.
Advise EHR to execute a Business Associate Agreement (BAA) with Google Cloud.
Answers
C.
Use Firebase Authentication for EHR's user facing applications.
C.
Use Firebase Authentication for EHR's user facing applications.
Answers
D.
Implement Prometheus to detect and prevent security breaches on EHR's web-based applications.
D.
Implement Prometheus to detect and prevent security breaches on EHR's web-based applications.
Answers
E.
Use GKE private clusters for all Kubernetes workloads.
E.
Use GKE private clusters for all Kubernetes workloads.
Answers
Suggested answer: A, B

For this question, refer to the EHR Healthcare case study. You need to define the technical architecture for securely deploying workloads to Google Cloud. You also need to ensure that only verified containers are deployed using Google

Cloud services. What should you do? (Choose two.)

A.
Enable Binary Authorization on GKE, and sign containers as part of a CI/CD pipeline.
A.
Enable Binary Authorization on GKE, and sign containers as part of a CI/CD pipeline.
Answers
B.
Configure Jenkins to utilize Kritis to cryptographically sign a container as part of a CI/CD pipeline.
B.
Configure Jenkins to utilize Kritis to cryptographically sign a container as part of a CI/CD pipeline.
Answers
C.
Configure Container Registry to only allow trusted service accounts to create and deploy containers from the registry.
C.
Configure Container Registry to only allow trusted service accounts to create and deploy containers from the registry.
Answers
D.
Configure Container Registry to use vulnerability scanning to confirm that there are no vulnerabilities before deploying the workload.
D.
Configure Container Registry to use vulnerability scanning to confirm that there are no vulnerabilities before deploying the workload.
Answers
Suggested answer: A, D

You need to upgrade the EHR connection to comply with their requirements. The new connection design must support business-critical needs and meet the same network and security policy requirements. What should you do?

A.
Add a new Dedicated Interconnect connection.
A.
Add a new Dedicated Interconnect connection.
Answers
B.
Upgrade the bandwidth on the Dedicated Interconnect connection to 100 G.
B.
Upgrade the bandwidth on the Dedicated Interconnect connection to 100 G.
Answers
C.
Add three new Cloud VPN connections.
C.
Add three new Cloud VPN connections.
Answers
D.
Add a new Carrier Peering connection.
D.
Add a new Carrier Peering connection.
Answers
Suggested answer: A
Total 285 questions
Go to page: of 29