ExamGecko
Home / Google / Professional Cloud Architect / List of questions
Ask Question

Google Professional Cloud Architect Practice Test - Questions Answers, Page 9

List of questions

Question 81

Report
Export
Collapse

You have created several pre-emptible Linux virtual machine instances using Google Compute Engine. You want to properly shut down your application before the virtual machines are preempted.

What should you do?

Create a shutdown script named k99.shutdown in the /etc/rc.6.d/ directory
Create a shutdown script named k99.shutdown in the /etc/rc.6.d/ directory
Create a shutdown script registered as a xinetd service in Linux and configure a Stackdriver endpoint check to call the service
Create a shutdown script registered as a xinetd service in Linux and configure a Stackdriver endpoint check to call the service
Create a shutdown script and use it as the value for a new metadata entry with the key shutdown-script in the Cloud Platform Console when you create the new virtual machine instance
Create a shutdown script and use it as the value for a new metadata entry with the key shutdown-script in the Cloud Platform Console when you create the new virtual machine instance
Create a shutdown script, registered as a xinetd service in Linux, and use the gcloud compute instances add-metadata command to specify the service URL as the value for a new metadata entry with the key shutdownscript-url
Create a shutdown script, registered as a xinetd service in Linux, and use the gcloud compute instances add-metadata command to specify the service URL as the value for a new metadata entry with the key shutdownscript-url
Suggested answer: C

Explanation:

A startup script, or a shutdown script, is specified through the metadata server, using startup script metadata keys. Reference: https://cloud.google.com/compute/docs/startupscript

asked 18/09/2024
Robert Andrade
47 questions

Question 82

Report
Export
Collapse

Your organization has a 3-tier web application deployed in the same network on Google Cloud Platform. Each tier (web, API, and database) scales independently of the others. Network traffic should flow through the web to the API tier and then on to the database tier. Traffic should not flow between the web and the database tier.

How should you configure the network?

Add each tier to a different subnetwork
Add each tier to a different subnetwork
Set up software based firewalls on individual VMs
Set up software based firewalls on individual VMs
Add tags to each tier and set up routes to allow the desired traffic flow
Add tags to each tier and set up routes to allow the desired traffic flow
Add tags to each tier and set up firewall rules to allow the desired traffic flow
Add tags to each tier and set up firewall rules to allow the desired traffic flow
Suggested answer: D

Explanation:

Google Cloud Platform(GCP) enforces firewall rules through rules and tags. GCP rules and tags can be defined once and used across all regions.

References: https://cloud.google.com/docs/compare/openstack/

https://aws.amazon.com/it/blogs/aws/building-three-tier-architectures-with-security-groups/

asked 18/09/2024
Sasha Grib
44 questions

Question 83

Report
Export
Collapse

Your development team has installed a new Linux kernel module on the batch servers in Google Compute Engine (GCE) virtual machines (VMs) to speed up the nightly batch process. Two days after the installation, 50% of the batch servers failed the nightly batch run. You want to collect details on the failure to pass back to the development team.

Which three actions should you take? Choose 3 answers.

Use Stackdriver Logging to search for the module log entries
Use Stackdriver Logging to search for the module log entries
Read the debug GCE Activity log using the API or Cloud Console
Read the debug GCE Activity log using the API or Cloud Console
Use gcloud or Cloud Console to connect to the serial console and observe the logs
Use gcloud or Cloud Console to connect to the serial console and observe the logs
Identify whether a live migration event of the failed server occurred, using in the activity log
Identify whether a live migration event of the failed server occurred, using in the activity log
Adjust the Google Stackdriver timeline to match the failure time, and observe the batch server metrics
Adjust the Google Stackdriver timeline to match the failure time, and observe the batch server metrics
Export a debug VM into an image, and run the image on a local server where kernel log messages will be displayed on the native screen
Export a debug VM into an image, and run the image on a local server where kernel log messages will be displayed on the native screen
Suggested answer: A, C, E
asked 18/09/2024
Ridwan Sulaiman
35 questions

Question 84

Report
Export
Collapse

Your company wants to try out the cloud with low risk. They want to archive approximately 100 TB of their log data to the cloud and test the analytics features available to them there, while also retaining that data as a long-term disaster recovery backup.

Which two steps should you take? Choose 2 answers.

Load logs into Google BigQuery
Load logs into Google BigQuery
Load logs into Google Cloud SQL
Load logs into Google Cloud SQL
Import logs into Google Stackdriver
Import logs into Google Stackdriver
Insert logs into Google Cloud Bigtable
Insert logs into Google Cloud Bigtable
Upload log files into Google Cloud Storage
Upload log files into Google Cloud Storage
Suggested answer: A, E
asked 18/09/2024
Juan Contreras
36 questions

Question 85

Report
Export
Collapse

You created a pipeline that can deploy your source code changes to your infrastructure in instance groups for self-healing. One of the changes negatively affects your key performance indicator. You are not sure how to fix it, and investigation could take up to a week.

What should you do?

Log in to a server, and iterate on the fox locally
Log in to a server, and iterate on the fox locally
Revert the source code change, and rerun the deployment pipeline
Revert the source code change, and rerun the deployment pipeline
Log into the servers with the bad code change, and swap in the previous code
Log into the servers with the bad code change, and swap in the previous code
Change the instance group template to the previous one, and delete all instances
Change the instance group template to the previous one, and delete all instances
Suggested answer: B
asked 18/09/2024
Zdenek Machura
28 questions

Question 86

Report
Export
Collapse

Your organization wants to control IAM policies for different departments independently, but centrally.

Which approach should you take?

Multiple Organizations with multiple Folders
Multiple Organizations with multiple Folders
Multiple Organizations, one for each department
Multiple Organizations, one for each department
A single Organization with Folders for each department
A single Organization with Folders for each department
A single Organization with multiple projects, each with a central owner
A single Organization with multiple projects, each with a central owner
Suggested answer: C

Explanation:

Folders are nodes in the Cloud Platform Resource Hierarchy. A folder can contain projects, other folders, or a combination of both. You can use folders to group projects under an organization in a hierarchy. For example, your organization might contain multiple departments, each with its own set of GCP resources. Folders allow you to group these resources on a per-department basis. Folders are used to group resources that share common IAM policies. While a folder can contain multiple folders or resources, a given folder or resource can have exactly one parent.

References: https://cloud.google.com/resource-manager/docs/creating-managing-folders

asked 18/09/2024
Hassene SAADI
30 questions

Question 87

Report
Export
Collapse

You deploy your custom Java application to Google App Engine. It fails to deploy and gives you the following stack trace. What should you do?

Google Professional Cloud Architect image Question 51 28392 09182024191247000000

Upload missing JAR files and redeploy your application.
Upload missing JAR files and redeploy your application.
Digitally sign all of your JAR files and redeploy your application
Digitally sign all of your JAR files and redeploy your application
Recompile the CLoakedServlet class using and MD5 hash instead of SHA1
Recompile the CLoakedServlet class using and MD5 hash instead of SHA1
Suggested answer: B
asked 18/09/2024
Charles Marlin
36 questions

Question 88

Report
Export
Collapse

You are designing a mobile chat application. You want to ensure people cannot spoof chat messages, by providing a message were sent by a specific user.

What should you do?

Tag messages client side with the originating user identifier and the destination user.
Tag messages client side with the originating user identifier and the destination user.
Encrypt the message client side using block-based encryption with a shared key.
Encrypt the message client side using block-based encryption with a shared key.
Use public key infrastructure (PKI) to encrypt the message client side using the originating user's private key.
Use public key infrastructure (PKI) to encrypt the message client side using the originating user's private key.
Use a trusted certificate authority to enable SSL connectivity between the client application and the server.
Use a trusted certificate authority to enable SSL connectivity between the client application and the server.
Suggested answer: C
asked 18/09/2024
shubha sunil
36 questions

Question 89

Report
Export
Collapse

As part of implementing their disaster recovery plan, your company is trying to replicate their production MySQL database from their private data center to their GCP project using a Google Cloud VPN connection. They are experiencing latency issues and a small amount of packet loss that is disrupting the replication. What should they do?

Configure their replication to use UDP.
Configure their replication to use UDP.
Configure a Google Cloud Dedicated Interconnect.
Configure a Google Cloud Dedicated Interconnect.
Restore their database daily using Google Cloud SQL.
Restore their database daily using Google Cloud SQL.
Add additional VPN connections and load balance them.
Add additional VPN connections and load balance them.
Send the replicated transaction to Google Cloud Pub/Sub.
Send the replicated transaction to Google Cloud Pub/Sub.
Suggested answer: B
asked 18/09/2024
Rudy Alexander Gonzalez
44 questions

Question 90

Report
Export
Collapse

Your customer support tool logs all email and chat conversations to Cloud Bigtable for retention and analysis. What is the recommended approach for sanitizing this data of personally identifiable information or payment card information before initial storage?

Hash all data using SHA256
Hash all data using SHA256
Encrypt all data using elliptic curve cryptography
Encrypt all data using elliptic curve cryptography
De-identify the data with the Cloud Data Loss Prevention API
De-identify the data with the Cloud Data Loss Prevention API
Use regular expressions to find and redact phone numbers, email addresses, and credit card numbers
Use regular expressions to find and redact phone numbers, email addresses, and credit card numbers
Suggested answer: C

Explanation:

Reference: https://cloud.google.com/solutions/pci-dss-compliance-in-gcp#using_data_loss_prevention_api_to_sanitize_data

asked 18/09/2024
Coleman Owie
39 questions
Total 285 questions
Go to page: of 29
Search

Related questions