Professional Cloud Architect on Google Cloud Platform v1.0

Page:    1 / 19   
Exam contains 279 questions

A development manager is building a new application. He asks you to review his requirements and identify what cloud technologies he can use to meet them. The application must:
1. Be based on open-source technology for cloud portability
2. Dynamically scale compute capacity based on demand
3. Support continuous software delivery
4. Run multiple segregated copies of the same application stack
5. Deploy application bundles using dynamic templates
6. Route network traffic to specific services based on URL
Which combination of technologies will meet all of his requirements?

  • A. Google Kubernetes Engine, Jenkins, and Helm
  • B. Google Kubernetes Engine and Cloud Load Balancing
  • C. Google Kubernetes Engine and Cloud Deployment Manager
  • D. Google Kubernetes Engine, Jenkins, and Cloud Load Balancing


Answer : A

You have created several pre-emptible Linux virtual machine instances using Google Compute Engine. You want to properly shut down your application before the virtual machines are preempted.
What should you do?

  • A. Create a shutdown script named k99.shutdown in the /etc/rc.6.d/ directory
  • B. Create a shutdown script registered as a xinetd service in Linux and configure a Stackdriver endpoint check to call the service
  • C. Create a shutdown script and use it as the value for a new metadata entry with the key shutdown-script in the Cloud Platform Console when you create the new virtual machine instance
  • D. Create a shutdown script, registered as a xinetd service in Linux, and use the gcloud compute instances add-metadata command to specify the service URL as the value for a new metadata entry with the key shutdown-script-url


Answer : C

Your organization has a 3-tier web application deployed in the same network on Google Cloud Platform. Each tier (web, API, and database) scales independently of the others. Network traffic should flow through the web to the API tier and then on to the database tier. Traffic should not flow between the web and the database tier.
How should you configure the network?

  • A. Add each tier to a different subnetwork
  • B. Set up software based firewalls on individual VMs
  • C. Add tags to each tier and set up routes to allow the desired traffic flow
  • D. Add tags to each tier and set up firewall rules to allow the desired traffic flow


Answer : D

Your development team has installed a new Linux kernel module on the batch servers in Google Compute Engine (GCE) virtual machines (VMs) to speed up the nightly batch process. Two days after the installation, 50% of the batch servers failed the nightly batch run. You want to collect details on the failure to pass back to the development team.
Which three actions should you take? (Choose three.)

  • A. Use Stackdriver Logging to search for the module log entries
  • B. Read the debug GCE Activity log using the API or Cloud Console
  • C. Use gcloud or Cloud Console to connect to the serial console and observe the logs
  • D. Identify whether a live migration event of the failed server occurred, using in the activity log
  • E. Adjust the Google Stackdriver timeline to match the failure time, and observe the batch server metrics
  • F. Export a debug VM into an image, and run the image on a local server where kernel log messages will be displayed on the native screen


Answer : ACE

Your company wants to try out the cloud with low risk. They want to archive approximately 100 TB of their log data to the cloud and test the analytics features available to them there, while also retaining that data as a long-term disaster recovery backup.
Which two steps should you take? (Choose two.)

  • A. Load logs into Google BigQuery
  • B. Load logs into Google Cloud SQL
  • C. Import logs into Google Stackdriver
  • D. Insert logs into Google Cloud Bigtable
  • E. Upload log files into Google Cloud Storage


Answer : AE

You created a pipeline that can deploy your source code changes to your infrastructure in instance groups for self-healing. One of the changes negatively affects your key performance indicator. You are not sure how to fix it, and investigation could take up to a week.
What should you do?

  • A. Log in to a server, and iterate on the fox locally
  • B. Revert the source code change, and rerun the deployment pipeline
  • C. Log into the servers with the bad code change, and swap in the previous code
  • D. Change the instance group template to the previous one, and delete all instances


Answer : B

Your organization wants to control IAM policies for different departments independently, but centrally.
Which approach should you take?

  • A. Multiple Organizations with multiple Folders
  • B. Multiple Organizations, one for each department
  • C. A single Organization with Folders for each department
  • D. A single Organization with multiple projects, each with a central owner


Answer : C

You deploy your custom Java application to Google App Engine. It fails to deploy and gives you the following stack trace.
What should you do?

  • A. Upload missing JAR files and redeploy your application.
  • B. Digitally sign all of your JAR files and redeploy your application
  • C. Recompile the CLoakedServlet class using and MD5 hash instead of SHA1


Answer : B

You are designing a mobile chat application. You want to ensure people cannot spoof chat messages, by providing a message were sent by a specific user.
What should you do?

  • A. Tag messages client side with the originating user identifier and the destination user.
  • B. Encrypt the message client side using block-based encryption with a shared key.
  • C. Use public key infrastructure (PKI) to encrypt the message client side using the originating user's private key.
  • D. Use a trusted certificate authority to enable SSL connectivity between the client application and the server.


Answer : C

As part of implementing their disaster recovery plan, your company is trying to replicate their production MySQL database from their private data center to their
GCP project using a Google Cloud VPN connection. They are experiencing latency issues and a small amount of packet loss that is disrupting the replication.
What should they do?

  • A. Configure their replication to use UDP.
  • B. Configure a Google Cloud Dedicated Interconnect.
  • C. Restore their database daily using Google Cloud SQL.
  • D. Add additional VPN connections and load balance them.
  • E. Send the replicated transaction to Google Cloud Pub/Sub.


Answer : B

Your customer support tool logs all email and chat conversations to Cloud Bigtable for retention and analysis. What is the recommended approach for sanitizing this data of personally identifiable information or payment card information before initial storage?

  • A. Hash all data using SHA256
  • B. Encrypt all data using elliptic curve cryptography
  • C. De-identify the data with the Cloud Data Loss Prevention API
  • D. Use regular expressions to find and redact phone numbers, email addresses, and credit card numbers


Answer : C

You are using Cloud Shell and need to install a custom utility for use in a few weeks. Where can you store the file so it is in the default execution path and persists across sessions?

  • A. ~/bin
  • B. Cloud Storage
  • C. /google/scripts
  • D. /usr/local/bin


Answer : A

You want to create a private connection between your instances on Compute Engine and your on-premises data center. You require a connection of at least 20
Gbps. You want to follow Google-recommended practices. How should you set up the connection?

  • A. Create a VPC and connect it to your on-premises data center using Dedicated Interconnect.
  • B. Create a VPC and connect it to your on-premises data center using a single Cloud VPN.
  • C. Create a Cloud Content Delivery Network (Cloud CDN) and connect it to your on-premises data center using Dedicated Interconnect.
  • D. Create a Cloud Content Delivery Network (Cloud CDN) and connect it to your on-premises datacenter using a single Cloud VPN.


Answer : A

You are analyzing and defining business processes to support your startup's trial usage of GCP, and you don't yet know what consumer demand for your product will be. Your manager requires you to minimize GCP service costs and adhere to Google best practices. What should you do?

  • A. Utilize free tier and sustained use discounts. Provision a staff position for service cost management.
  • B. Utilize free tier and sustained use discounts. Provide training to the team about service cost management.
  • C. Utilize free tier and committed use discounts. Provision a staff position for service cost management.
  • D. Utilize free tier and committed use discounts. Provide training to the team about service cost management.


Answer : B

You are building a continuous deployment pipeline for a project stored in a Git source repository and want to ensure that code changes can be verified before deploying to production. What should you do?

  • A. Use Spinnaker to deploy builds to production using the red/black deployment strategy so that changes can easily be rolled back.
  • B. Use Spinnaker to deploy builds to production and run tests on production deployments.
  • C. Use Jenkins to build the staging branches and the master branch. Build and deploy changes to production for 10% of users before doing a complete rollout.
  • D. Use Jenkins to monitor tags in the repository. Deploy staging tags to a staging environment for testing. After testing, tag the repository for production and deploy that to the production environment.


Answer : D

Page:    1 / 19   
Exam contains 279 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy