ExamGecko
Home Home / Google / Professional Cloud Developer

Google Professional Cloud Developer Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











You want to use the Stackdriver Logging Agent to send an application's log file to Stackdriver from a Compute Engine virtual machine instance.

After installing the Stackdriver Logging Agent, what should you do first?

A.
Enable the Error Reporting API on the project.
A.
Enable the Error Reporting API on the project.
Answers
B.
Grant the instance full access to all Cloud APIs.
B.
Grant the instance full access to all Cloud APIs.
Answers
C.
Configure the application log file as a custom source.
C.
Configure the application log file as a custom source.
Answers
D.
Create a Stackdriver Logs Export Sink with a filter that matches the application's log entries.
D.
Create a Stackdriver Logs Export Sink with a filter that matches the application's log entries.
Answers
Suggested answer: B

Your company has a BigQuery data mart that provides analytics information to hundreds of employees. One user of wants to run jobs without interrupting important workloads. This user isn't concerned about the time it takes to run these jobs. You want to fulfill this request while minimizing cost to the company and the effort required on your part.

What should you do?

A.
Ask the user to run the jobs as batch jobs.
A.
Ask the user to run the jobs as batch jobs.
Answers
B.
Create a separate project for the user to run jobs.
B.
Create a separate project for the user to run jobs.
Answers
C.
Add the user as a job.user role in the existing project.
C.
Add the user as a job.user role in the existing project.
Answers
D.
Allow the user to run jobs when important workloads are not running.
D.
Allow the user to run jobs when important workloads are not running.
Answers
Suggested answer: B

You want to notify on-call engineers about a service degradation in production while minimizing development time.

What should you do?

A.
Use Cloud Function to monitor resources and raise alerts.
A.
Use Cloud Function to monitor resources and raise alerts.
Answers
B.
Use Cloud Pub/Sub to monitor resources and raise alerts.
B.
Use Cloud Pub/Sub to monitor resources and raise alerts.
Answers
C.
Use Stackdriver Error Reporting to capture errors and raise alerts.
C.
Use Stackdriver Error Reporting to capture errors and raise alerts.
Answers
D.
Use Stackdriver Monitoring to monitor resources and raise alerts.
D.
Use Stackdriver Monitoring to monitor resources and raise alerts.
Answers
Suggested answer: A

You are writing a single-page web application with a user-interface that communicates with a third-party API for content using XMLHttpRequest. The data displayed on the UI by the API results is less critical than other data displayed on the same web page, so it is acceptable for some requests to not have the API data displayed in the UI. However, calls made to the API should not delay rendering of other parts of the user interface. You want your application to perform well when the API response is an error or a timeout.

What should you do?

A.
Set the asynchronous option for your requests to the API to false and omit the widget displaying the API results when a timeout or error is encountered.
A.
Set the asynchronous option for your requests to the API to false and omit the widget displaying the API results when a timeout or error is encountered.
Answers
B.
Set the asynchronous option for your request to the API to true and omit the widget displaying the API results when a timeout or error is encountered.
B.
Set the asynchronous option for your request to the API to true and omit the widget displaying the API results when a timeout or error is encountered.
Answers
C.
Catch timeout or error exceptions from the API call and keep trying with exponential backoff until the API response is successful.
C.
Catch timeout or error exceptions from the API call and keep trying with exponential backoff until the API response is successful.
Answers
D.
Catch timeout or error exceptions from the API call and display the error response in the UI widget.
D.
Catch timeout or error exceptions from the API call and display the error response in the UI widget.
Answers
Suggested answer: A

Your team develops services that run on Google Cloud. You need to build a data processing service and will use Cloud Functions. The data to be processed by the function is sensitive. You need to ensure that invocations can only happen from authorized services and follow Google-recommended best practices for securing functions. What should you do?

A.
Enable Identity-Aware Proxy in your project. Secure function access using its permissions.
A.
Enable Identity-Aware Proxy in your project. Secure function access using its permissions.
Answers
B.
Create a service account with the Cloud Functions Viewer role. Use that service account to invoke the function.
B.
Create a service account with the Cloud Functions Viewer role. Use that service account to invoke the function.
Answers
C.
Create a service account with the Cloud Functions Invoker role. Use that service account to invoke the function.
C.
Create a service account with the Cloud Functions Invoker role. Use that service account to invoke the function.
Answers
D.
Create an OAuth 2.0 client ID for your calling service in the same project as the function you want to secure. Use those credentials to invoke the function.
D.
Create an OAuth 2.0 client ID for your calling service in the same project as the function you want to secure. Use those credentials to invoke the function.
Answers
Suggested answer: C

You are deploying your applications on Compute Engine. One of your Compute Engine instances failed to launch. What should you do? (Choose two.)

A.
Determine whether your file system is corrupted.
A.
Determine whether your file system is corrupted.
Answers
B.
Access Compute Engine as a different SSH user.
B.
Access Compute Engine as a different SSH user.
Answers
C.
Troubleshoot firewall rules or routes on an instance.
C.
Troubleshoot firewall rules or routes on an instance.
Answers
D.
Check whether your instance boot disk is completely full.
D.
Check whether your instance boot disk is completely full.
Answers
E.
Check whether network traffic to or from your instance is being dropped.
E.
Check whether network traffic to or from your instance is being dropped.
Answers
Suggested answer: A, D

Explanation:

https://cloud.google.com/compute/docs/troubleshooting/vm-startup

Your web application is deployed to the corporate intranet. You need to migrate the web application to Google Cloud. The web application must be available only to company employees and accessible to employees as they travel. You need to ensure the security and accessibility of the web application while minimizing application changes. What should you do?

A.
Configure the application to check authentication credentials for each HTTP(S) request to the application.
A.
Configure the application to check authentication credentials for each HTTP(S) request to the application.
Answers
B.
Configure Identity-Aware Proxy to allow employees to access the application through its public IP address.
B.
Configure Identity-Aware Proxy to allow employees to access the application through its public IP address.
Answers
C.
Configure a Compute Engine instance that requests users to log in to their corporate account. Change the web application DNS to point to the proxy Compute Engine instance. After authenticating, the Compute Engine instance forwards requests to and from the web application.
C.
Configure a Compute Engine instance that requests users to log in to their corporate account. Change the web application DNS to point to the proxy Compute Engine instance. After authenticating, the Compute Engine instance forwards requests to and from the web application.
Answers
D.
Configure a Compute Engine instance that requests users to log in to their corporate account. Change the web application DNS to point to the proxy Compute Engine instance. After authenticating, the Compute Engine issues an HTTP redirect to a public IP address hosting the web application.
D.
Configure a Compute Engine instance that requests users to log in to their corporate account. Change the web application DNS to point to the proxy Compute Engine instance. After authenticating, the Compute Engine issues an HTTP redirect to a public IP address hosting the web application.
Answers
Suggested answer: B

You have an application that uses an HTTP Cloud Function to process user activity from both desktop browser and mobile application clients. This function will serve as the endpoint for all metric submissions using HTTP POST.

Due to legacy restrictions, the function must be mapped to a domain that is separate from the domain requested by users on web or mobile sessions. The domain for the Cloud Function is https://fn.example.com. Desktop and mobile clients use the domain https://www.example.com. You need to add a header to the function's HTTP response so that only those browser and mobile sessions can submit metrics to the Cloud Function. Which response header should you add?

A.
Access-Control-Allow-Origin: *
A.
Access-Control-Allow-Origin: *
Answers
B.
Access-Control-Allow-Origin: https://*.example.com
B.
Access-Control-Allow-Origin: https://*.example.com
Answers
C.
Access-Control-Allow-Origin: https://fn.example.com
C.
Access-Control-Allow-Origin: https://fn.example.com
Answers
D.
Access-Control-Allow-origin: https://www.example.com
D.
Access-Control-Allow-origin: https://www.example.com
Answers
Suggested answer: D

You have an HTTP Cloud Function that is called via POST. Each submission's request body has a flat, unnested JSON structure containing numeric and text data. After the Cloud Function completes, the collected data should be immediately available for ongoing and complex analytics by many users in parallel. How should you persist the submissions?

A.
Directly persist each POST request's JSON data into Datastore.
A.
Directly persist each POST request's JSON data into Datastore.
Answers
B.
Transform the POST request's JSON data, and stream it into BigQuery.
B.
Transform the POST request's JSON data, and stream it into BigQuery.
Answers
C.
Transform the POST request's JSON data, and store it in a regional Cloud SQL cluster.
C.
Transform the POST request's JSON data, and store it in a regional Cloud SQL cluster.
Answers
D.
Persist each POST request's JSON data as an individual file within Cloud Storage, with the file name containing the request identifier.
D.
Persist each POST request's JSON data as an individual file within Cloud Storage, with the file name containing the request identifier.
Answers
Suggested answer: D

Your security team is auditing all deployed applications running in Google Kubernetes Engine. After completing the audit, your team discovers that some of the applications send traffic within the cluster in clear text. You need to ensure that all application traffic is encrypted as quickly as possible while minimizing changes to your applications and maintaining support from Google. What should you do?

A.
Use Network Policies to block traffic between applications.
A.
Use Network Policies to block traffic between applications.
Answers
B.
Install Istio, enable proxy injection on your application namespace, and then enable mTLS.
B.
Install Istio, enable proxy injection on your application namespace, and then enable mTLS.
Answers
C.
Define Trusted Network ranges within the application, and configure the applications to allow traffic only from those networks.
C.
Define Trusted Network ranges within the application, and configure the applications to allow traffic only from those networks.
Answers
D.
Use an automated process to request SSL Certificates for your applications from Let's Encrypt and add them to your applications.
D.
Use an automated process to request SSL Certificates for your applications from Let's Encrypt and add them to your applications.
Answers
Suggested answer: D
Total 265 questions
Go to page: of 27