cloud computing

INFORMACIÓN
ESTADÍSTICAS
RÉCORDS
REALIZAR TEST
Título del test:
cloud computing

Descripción:
preguntas para examen cloud

Autor:
javier2072
(Otros tests del mismo autor)

Fecha de Creación:
14/02/2020

Categoría:
Otros
Comparte el test:
Facebook
Twitter
Whatsapp
REALIZAR TEST
Últimos Comentarios
No hay ningún comentario sobre este test.
Temario:
In GCP, what is the minimum number of IP addresses that a VM instance needs? One: Only an internal IP address Two: One internal and one external IP address Three: One internal, one external and one alias IP address.
What are the three types of networks offered in the Google Cloud Platform? Zonal, regional, and global Gigabit network, 10 gigabit network, and 100 gigabit network IPv4 unicast network, IPv4 multicast network, IPv6 network Default network, auto network, and custom network.
What is one benefit of applying firewall rules by tag rather than by address? Tags help organizations track firewall billing. Tags in network traffic help with network sniffing. Tags on firewall rules control which ephemeral IP addresses VMs will receive. When a VM is created with a matching tag, the firewall rules apply irrespective of the IP address it is assigned.
Which statement is true of persistent disks? Persistent disks are physical hardware devices connected directly to VMs. Persistent disks are always HDDs (magnetic spinning disks). Cloud IAM Persistent disks are encrypted by default. Once created, a persistent disk cannot be resized. .
What abstraction is primarily used to administer user access in Cloud IAM ? Leases, an abstraction of periodic entitlements. Roles, an abstraction of job roles. Credentials, an abstraction of an authorization token. Privileges, an abstraction of access rights.
What data storage service might you select if you just needed to migrate a standard relational database running on a single machine in a datacenter to the cloud? Cloud SQL BigQuery Persistent Disk Cloud Storage.
3. Which data storage service provides data warehouse services for storing data but also offers an interactive SQL interface for querying the data? BigQuery Cloud Dataproc Cloud Datalab Cloud SQL.
No resources in GCP can be used without being associated with... A user. A virtual machine. A project. A bucket.
A budget is set at $500 and an alert is set at 100%. What happens when the full amount is used? Everything in the associated project will suspend because there is not more budget to spend. Nothing. There is no point to sending a notification when there is no budget remaining. A notification email is sent to the Billing Administrator. You have a 4-hour courtesy period before Google shuts down all resources.
How do quotas protect GCP customers? By preventing uncontrolled consumption of resources By preventing resource use in too many zones in a region. By preventing resource use by unknown users. By preventing resource use of too many different GCP services.
What is the foundational process at the base of Google's Site Reliability Engineering (SRE)? Capacity planning. Testing and release procedures. Monitoring. Root cause analysis.
What is the purpose of the Stackdriver Trace service? Reporting on latency as part of managing performance. Reporting on GCP system errors. Reporting on application errors. Reporting on GCP resource consumption as part of managing performance.
Stackdriver integrates several technologies, including monitoring, logging, error reporting, and debugging that are commonly implemented in other environments as separate solutions using separate products. What are key benefits of integration of these services? Reduces overhead, reduces noise, streamlines use, and fixes problems faster Ability to replace one tool with another from a different vendor Detailed control over the connections between the technologies Better for GCP only so long as you don't need to monitor other applications or clouds.
1. What is the purpose of Virtual Private Networking (VPN)? It is a method to detect intruders at the edge of a network boundary. VPNs are also called access control lists, or ACLs, and they limit network access. To enable a secure communication method (a tunnel) to connect two trusted environments through an untrusted environment, such as the Internet. The main purpose is to encrypt data so that it can be stored in an encrypted format.
Which of the following is a feature of Cloud Dataproc? It doesn't integrate with Stackdriver, but it has its own monitoring system. Dataproc allows full control over HDFS advanced settings. It typically takes less than 90 seconds to start a cluster. Dataproc billing occurs in 10-hour intervals.
You are a project owner and need your co-worker to deploy a new version of your application to App Engine. You want to follow Google’s recommended practices. Which IAM roles should you grant your co- worker? Project Editor App Engine Service Admin App Engine Deployer App Engine Code Viewer.
Your company has reserved a monthly budget for your project. You want to be informed automatically of your project spend so that you can take action when you approach the limit. What should you do? Link a credit card with a monthly limit equal to your budget. Create a budget alert for 50%, 90%, and 100% of your total monthly budget. In App Engine Settings, set a daily budget at the rate of 1/30 of your monthly budget. In the GCP Console, configure billing export to BigQuery. Create a saved view that queries your total spend.
You developed a new application for App Engine and are ready to deploy it to production. You need to estimate the costs of running your application on Google Cloud Platform as accurately as possible. What should you do? Create a YAML file with the expected usage. Pass this file to the "gcloud app estimate" command to get an accurate estimation. Multiply the costs of your application when it was in development by the number of expected users to get an accurate estimation. Use the pricing calculator for App Engine to get an accurate estimation of the expected charges. Create a ticket with Google Cloud Billing Support to get an accurate estimation.
6. Your company processes high volumes of IoT data that are time- stamped. The total data volume can be several petabytes. The data needs to be written and changed at a high speed. You want to use the most performant storage option for your data. Which product should you use? Cloud Datastore Cloud Storage Cloud Bigtable BigQuery.
Your application has a large international audience and runs stateless virtual machines within a managed instance group across multiple locations. One feature of the application lets users upload files and share them with other users. Files must be available for 30 days; after that, they are removed from the system entirely. Which storage solution should you choose? A Cloud Datastore database. A multi-regional Cloud Storage bucket. Persistent SSD on virtual machine instances. A managed instance group of Filestore servers.
You have a definition for an instance template that contains a web application. You are asked to deploy the application so that it can scale based on the HTTP traffic it receives. What should you do? Create a VM from the instance template. Create a custom image from the VM’s disk. Export the image to Cloud Storage. Create an HTTP load balancer and add the Cloud Storage bucket as its backend service. Create a VM from the instance template. Create an App Engine application in Automatic Scaling mode that forwards all traffic to the VM. Create a managed instance group based on the instance template. Configure autoscaling based on HTTP traffic and configure the instance group as the backend service of an HTTP load balancer. Create the necessary amount of instances required for peak user traffic based on the instance template. Create an unmanaged instance group and add the instances to that instance group. Configure the instance group as the Backend Service of an HTTP load balancer.
You have an application server running on Compute Engine in the europe-west1-d zone. You need to ensure high availability and replicate the server to the europe-west2-c zone using the fewest steps possible. What should you do? Create a snapshot from the disk. Create a disk from the snapshot in the europe-west2-c zone. Create a new VM with that disk. Create a snapshot from the disk. Create a disk from the snapshot in the europe-west1-d zone and then move the disk to europe-west2-c. Create a new VM with that disk. Use "gcloud" to copy the disk to the europe-west2-c zone. Create a new VM with that disk. Use "gcloud compute instances move" with parameter "--destination- zone europe-west2-c" to move the instance to the new zone.
Your company has a mission-critical application that serves users globally. You need to select a transactional, relational data storage system for this application. Which two products should you consider BigQuery Cloud SQL Cloud Spanner Cloud Bigtable Cloud Datastore.
You created an update for your application on App Engine. You want to deploy the update without impacting your users. You want to be able to roll back as quickly as possible if it fails. What should you do? A. Delete the current version of your application. Deploy the update using the same version identifier as the deleted version. Notify your users of an upcoming maintenance window. Deploy the update in that maintenance window. Deploy the update as the same version that is currently running. Deploy the update as a new version. Migrate traffic from the current version to the new version.
You need to estimate the annual cost of running a Bigquery query that is scheduled to run nightly. What should you do? Use "gcloud query --dry_run" to determine the number of bytes read by the query. Use this number in the Pricing Calculator. Use "bq query --dry_run" to determine the number of bytes read by the query. Use this number in the Pricing Calculator. Use "gcloud estimate" to determine the amount billed for a single query. Multiply this amount by 365. Use "bq estimate" to determine the amount billed for a single query. Multiply this amount by 365.
You want to find out who in your organization has Owner access to a project called "my-project".What should you do? In the Google Cloud Platform Console, go to the IAM page for your organization and apply the filter "Role:Owner". In the Google Cloud Platform Console, go to the IAM page for your project and apply the filter "Role:Owner". Use "gcloud iam list-grantable-role --project my-project" from your Terminal. Use "gcloud iam list-grantable-role" from Cloud Shell on the project page.
You want to create a new role for your colleagues that will apply to all current and future projects created in your organization. The role should have the permissions of the BigQuery Job User and Cloud Bigtable User roles. You want to follow Google’s recommended practices. How should you create the new role? Use "gcloud iam combine-roles --global" to combine the 2 roles into a new custom role. For one of your projects, in the Google Cloud Platform Console under Roles, select both roles and combine them into a new custom role. Use "gcloud iam promote-role" to promote the role from a project role to an organization role. For all projects, in the Google Cloud Platform Console under Roles, select both roles and combine them into a new custom role. For your organization, in the Google Cloud Platform Console under Roles, select both roles and combine them into a new custom role.
You work in a small company where everyone should be able to view all resources of a specific project. You want to grant them access following Google’s recommended practices. What should you do? Create a script that uses "gcloud projects add-iam-policy-binding" for all users’ email addresses and the Project Viewer role. Create a script that uses "gcloud iam roles create" for all users’ email addresses and the Project Viewer role. Create a new Google Group and add all users to the group. Use "gcloud projects add-iam-policy-binding" with the Project Viewer role and Group email address. Create a new Google Group and add all members to the group. Use "gcloud iam roles create" with the Project Viewer role and Group email address.
You need to verify the assigned permissions in a custom IAM role. What should you do? Use the "gcloud init" command to view the information. Use the GCP Console, IAM section to view the information. Use the GCP Console, Security section to view the information. Use the GCP Console, API section to view the information.
Does a cloud computing service let you scale your resource use up and down? yes no.
To get resources from a cloud computing provider, is working with a person at the provider required? yes no.
Why might a GCP customer use resources in several zones within a region? For improved fault tolerance For better performance.
Why might a GCP customer use resources in several regions around the world? To bring their applications closer to users around the world, and for improved fault tolerance To improve security.
Choose fundamental characteristics of cloud computing. Mark all that are correct (4 correct responses). Providers always dedicate physical resources to each customer Resources are available from anywhere over the network Customers pay only for what they use or reserve Computing resources available on-demand and self-service Customers are required to commit to multi-year contracts All resources are open-source-based Customers can scale their resource use up and down.
Choose a fundamental characteristic of devices in a virtualized data center. They use less resources than devices in a physical data center. They are manageable separately from the underlying hardware. They are more secure. They are available from anywhere on the Internet.
What type of cloud computing service lets you bind your application code to libraries that give access to the infrastructure your application needs? Platform as a Service Infrastructure as a Service Software as a Service Hybrid cloud Virtualized data centers.
What type of cloud computing service provides raw compute, storage, and network, organized in ways that are familiar from physical data centers? Software as a Service Database as a Service Infrastructure as a Service Platform as a Service.
Which statement is true about the zones within a region? Each zone corresponds to a single physical data center. Customers must choose exactly one zone in each region in which to run their resources. The zones within a region have fast network connectivity among them. The zones within a region are never closer to each other than 160 km.
What kind of customer benefits most from billing by the second for cloud resources such as virtual machines? Customers who create and run many virtual machines Customers who create many virtual machines and leave them running for months Customers who create too few virtual machines to get discounts Customers who create virtual machines running commercially licensed operating systems.
Choose the correct completion: Services and APIs are enabled on a per- ___________ basis. Organization Project Folder Billing account.
True or false: Google manages every aspect of Google Cloud Platform customers' security. True False.
Your company has two GCP projects, and you want them to share policies. What is the less error-prone way to set this up? Duplicate all the policies on one project onto the other. Place both projects into a folder, and define the policies on the folder.
When would you choose to have an organization node? (Choose all that are correct. Choose 2 responses.) When you want to create folders. When you want to organize resources into projects. When you want to apply organization-wide policies centrally. There is no choice; organization nodes are mandatory.
When would you choose to have an organization node? (Choose all that are correct. Choose 2 responses.) When you want to create folders. When you want to organize resources into projects. When you want to apply organization-wide policies centrally. There is no choice; organization nodes are mandatory.
Order these IAM role types from broadest to finest-grained. Primitive roles, predefined roles, custom roles Custom roles, predefined roles, primitive roles Predefined roles, custom roles, primitive roles.
Can IAM policies that are implemented higher in the resource hierarchy take away access that is granted by lower-level policies? Yes. No.
True or False: In Google Cloud IAM: if a policy applied at the project level gives you Owner permissions, your access to an individual resource in that project might be restricted to View permission if someone applies a more restrictive policy directly to that resource. True False.
True or False: All Google Cloud Platform resources are associated with a project. True False.
Service accounts are used to provide which of the following? (Choose all that are correct. Choose 3 responses.) A way to restrict the actions a resource (such as a VM) can perform A set of predefined permissions A way to allow users to act with service account permissions Authentication between Google Cloud Platform services.
How do GCP customers and Google Cloud Platform divide responsibility for security? All aspects of security are the customer's responsibility. Google takes care of the lower parts of the stack, and customers are responsible for the higher parts. Google takes care of the higher parts of the stack, and customers are responsible for the lower parts. All aspects of security are Google's responsibility. .
Which of these values is globally unique, permanent, and unchangeable, but chosen by the customer? The project ID The project name The project's billing credit-card number The project number.
Consider a single hierarchy of GCP resources. Which of these situations is possible? (Choose all that are correct. Choose 3 responses.) There is no organization node, and there are no folders. There are two or more organization nodes There is an organization node, and there is at least one folder. There is an organization node, and there are no folders. There is no organization node, but there is at least one folder.
What is the difference between IAM primitive roles and IAM predefined roles? Primitive roles only allow viewing, creating, and deleting resources. Predefined roles allow any modification. Primitive roles only apply to the owner of the GCP project. Predefined roles can be associated with any user. Primitive roles can only be granted to single users. Predefined roles can be associated with a group. Primitive roles are changeable once assigned. Predefined roles can never be changed. Primitive roles affect all resources in a GCP project. Predefined roles apply to a particular service in a project.
Which statement is true about billing for solutions deployed using Cloud Marketplace (formerly known as Cloud Launcher)? You pay only for the underlying GCP resources you use, with the possible addition of extra fees for commercially licensed software. You pay only for the underlying GCP resources you use; Google pays the license fees for commercially licensed software. Cloud Marketplace solutions are always free. After a trial period, each Cloud Marketplace solution assesses a fixed recurring monthly fee. .
True or false? In Google Cloud VPCs, subnets have regional scope. True False True False.
True or false: If you increase the size of a subnet in a custom VPC network, the IP addresses of virtual machines already on that subnet might be affected. True False.
True or false: You can create Compute Engine virtual machines from the command line. True False.
What is the main reason customers choose Preemptible VMs? To reduce cost. To improve performance.
True or False: Google Cloud Load Balancing allows you to balance HTTP-based traffic across multiple Compute Engine regions. False True.
Which statement is true about Google VPC networks and subnets? Networks are global; subnets are regional Networks are regional; subnets are zonal Networks are global; subnets are zonal Networks and subnets are global.
An application running in a Compute Engine virtual machine needs high-performance scratch space. Which type of storage meets this need? Local standard Standard persistent Local SSD SSD persistent.
Choose an application that would be suitable for running in a Preemptible VM. An interactive website A batch job that can be checkpointed and restarted A batch job that cannot be checkpointed and restarted An online relational database.
How do Compute Engine customers choose between big VMs and many VMs? Use big VMs for fault tolerance and elasticity; use many VMs for in-memory databases and CPU-intensive analytics Use big VMs for in-memory databases and CPU-intensive analytics; use many VMs for fault tolerance and elasticity.
How do VPC routers and firewalls work? They are managed by Google as a built-in feature. Customers provision virtual machines and run their routers and firewalls in them. They are managed by Google in virtual machines, which customers may tune or turn off. They are managed by Google in virtual machines, which customers may never modify.
GCP customer wants to load-balance traffic among the back-end VMs that form part of a multi-tier application. Which load-balancing option should this customer choose? The global SSL proxy The regional load balancer The global TCP proxy The global HTTP(S) load balancer The regional internal load balancer.
For which of these interconnect options is a Service Level Agreement available? Dedicated Interconnect VPNs with Cloud Router Direct Peering Carrier Peering.
Your Cloud Storage objects live in buckets. Which of these characteristics do you define on a per-bucket basis? Choose all that are correct (3 correct answers). A globally-unique name A default file type for the objects in the bucket A geographic location An encryption-at-rest setting (on or off) A default storage class.
True or false: Cloud Storage is well suited to providing the root file system of a Linux virtual machine. True False.
Why would a customer consider the Coldline storage class? To save money on storing infrequently accessed data. To use the Coldline Storage API. To save money on storing frequently accessed data. To improve security.
True or false: Each table in NoSQL databases such as Cloud Bigtable has a single schema that is enforced by the database engine itself. True False.
Some developers think of Cloud Bigtable as a persistent hashtable. What does that mean? Each item in the database consists of exactly the same fields, and can be looked up based on a variety of keys. Each item in the database can be sparsely populated, and is looked up with a single key.
Which database service can scale to higher database sizes? Cloud SQL. Cloud Spanner.
Which database service presents a MySQL or PostgreSQL interface to clients? Cloud SQL. Cloud Spanner.
Which database service offers transactional consistency at global scale? Cloud SQL. Cloud Spanner.
How are Cloud Datastore and Cloud Bigtable alike? Choose all that are correct (2 correct answers) They both offer SQL-like queries. They both have a free daily quota. They are both NoSQL databases. They are both highly scalable.
True or false: Cloud Datastore databases can span App Engine and Compute Engine applications. True False.
You are developing an application that transcodes large video files. Which storage option is the best choice for your application? Cloud Storage Cloud Datastore Cloud Spanner Google Drive.
You manufacture devices with sensors and need to stream huge amounts of data from these devices to a storage option in the cloud. Which Google Cloud Platform storage option is the best choice for your application? Cloud Spanner Cloud Bigtable Cloud Datastore BigQuery.
Which statement is true about objects in Cloud Storage? They are immutable, and new versions overwrite old unless you turn on versioning. They can be edited in place. They are immutable unless you turn on versioning. They are immutable, and versioned by default. .
You are building a small application. If possible, you'd like this application's data storage to be at no additional charge. Which service has a free daily quota, separate from any free trials? Bigtable Cloud Spanner Cloud SQL Cloud Datastore.
How do the Nearline and Coldline storage classes differ from Multi-regional and Regional? Choose all that are correct (2 responses). Nearline and Coldline use a differently-architected API. Nearline and Coldline assess additional retrieval fees. Data in Nearline and Coldline is not retrievable immediately. Nearline and Coldline assess lower storage fees. Nearline and Coldline have lower durability.
Your application needs a relational database, and it expects to talk to MySQL. Which storage option is the best choice for your application? Cloud Storage Cloud Spanner Bigtable Cloud SQL.
Your application needs to store data with strong transactional consistency, and you want seamless scaling up. Which storage option is the best choice for your application? Cloud Storage Cloud Spanner Cloud Datastore Cloud SQL.
Which GCP storage service is often the ingestion point for data being moved into the cloud, and is frequently the long-term storage location for data? Cloud Storage Cloud Spanner Cloud Datastore Local SSD.
True or false: each container has its own instance of an operating system. True False.
Containers are loosely coupled to their environments. What does that mean? Choose all the statements that are true. (3 correct answers) Containers abstract away unimportant details of their environments. Containers don't require any particular runtime binary. Deploying a containerized application consumes less resources and is less error-prone than deploying an application in virtual machines. Containers package your application into equally sized components. Containers are easy to move around.
What is a Kubernetes pod? A group of clusters A group of nodes A group of containers.
What is a Kubernetes cluster? A group of machines where Kubernetes can schedule workloads A group of containers that provide high availability for applications.
Where do the resources used to build Kubernetes Engine clusters come from? Compute Engine Bare-metal servers App Engine.
True or false: Google keeps Kubernetes Engine refreshed with successive versions of Kubernetes. True. False.
Identify two reasons for deploying applications using containers. (Choose 2 responses.) Simpler to migrate workloads Tight coupling between applications and operating systems Consistency across development, testing, production environments No need to allocate resources in which to run containers.
True or False: Kubernetes allows you to manage container clusters in multiple cloud providers. True False.
True or False: Google Cloud Platform provides a secure, high-speed container image storage service for use with Kubernetes Engine. True False.
In Kubernetes, what does "pod" refer to? A popular logging subsystem A group of containers that work together A group of clusters that work together A popular management subsystem.
Does Google Cloud Platform offer its own tool for building containers (other than the ordinary docker command)? Yes; the GCP-provided tool is an option, but customers may choose not use it. Yes. yes, Kubernetes Engine customers must use the GCP-provided tool. No; all customers use the ordinary docker command.
Does Google Cloud Platform offer its own tool for building containers (other than the ordinary docker command)? Yes; the GCP-provided tool is an option, but customers may choose not use it. Yes. Kubernetes Engine customers must use the GCP-provided tool. No; all customers use the ordinary docker command.
Where do your Kubernetes Engine workloads run? In clusters implemented using App Engine In clusters built from Compute Engine virtual machines In clusters that are built into GCP, not separately manageable In clusters implemented using Cloud Functions.
True or false: App Engine is a better choice for a web application than for long-running batch processing. True False.
True or false: App Engine just runs applications; it doesn't offer any services to the applications it runs. True False.
Which of these criteria would make you choose App Engine Flexible Environment, rather than Standard Environment, for your application? Choose all that are correct (2 correct responses). Ability to ssh in Wider range of choices for application language Daily free usage quota Finer-grained scaling.
True or false: App Engine Flexible Environment applications let their owners control the geographic region where they run. True False.
Which statements are true about App Engine? Choose all that are true (2 correct answers). App Engine requires you to supply or code your own application load balancing and logging services. App Engine charges you based on the resources you pre-allocate rather than based on the resources you use. Developers who write for App Engine do not need to code their applications in any particular way to use the service. It is possible for an App Engine application's daily billing to drop to zero. App Engine manages the hardware and networking infrastructure required to run your code.
Name 3 advantages of using the App Engine Flexible Environment over App Engine Standard. Choose all that are true (3 correct answers). Your application can execute code in background threads You can install third-party binaries You can SSH in to your application Google provides automatic in-place security patches Your application can write to local disk.
Name 3 advantages of using the App Engine Standard Environment over App Engine Flexible. Choose all that are true (3 correct answers). Google provides and maintains runtime binaries Scaling is finer-grained You can choose any programming language You can install third-party binaries Billing can drop to zero if your application is idle.
You want to do business analytics and billing on a customer-facing API. Which GCP service should you choose? Apigee Edge Cloud Endpoints.
You want to support developers who are building services in GCP through API logging and monitoring. Which GCP service should you choose? Cloud Endpoints Apigee Edge.
You want to gradually decompose a pre-existing monolithic application, not implemented in GCP, into microservices. Which GCP service should you choose? Apigee Edge Cloud Endpoints.
Why would a developer choose to store source code in Cloud Source Repositories? Choose all the answers that are correct (2 correct answers). To reduce work To have total control over the hosting infrastructure To keep code private to a GCP project.
What is the advantage of putting event-driven components of your application into Cloud Functions? Cloud Functions means that processing always happens free of charge. Cloud Functions handles scaling these components seamlessly.
Why might a GCP customer choose to use Cloud Source Repositories? They don't want to host their own git instance, and they want to integrate with IAM permissions. They don't want to host their own git instance, and they don't want to integrate with IAM permissions. They want to host and manage their own git instance, and they don't want to integrate with IAM permissions. They want to host and manage their own git instance, and they want to integrate with IAM permissions.
Why might a GCP customer choose to use Cloud Functions? Cloud Functions is the primary way to run Node.js applications in GCP. Their application has a legacy monolithic structure that they want to break apart into microservices with little developer effort. Cloud Functions is a free service for hosting compute operations. Their application contains event-driven code that they don't want to have to provision compute resources for.
Why might a GCP customer choose to use Deployment Manager? Deployment Manager is a version control system for your GCP infrastructure layout. Deployment Manager is an infrastructure management system for GCP resources. Deployment Manager is an infrastructure management system for Kubernetes pods. Deployment Manager enforces maximum resource utilization and spending limits on your GCP resources.
You want to define alerts on your GCP resources, such as when health checks fail. Which is the best GCP product to use? Deployment Manager Stackdriver Trace Cloud Functions Stackdriver Debugger Stackdriver Monitoring.
Which statements are true about Stackdriver Logging? Choose all that are true (2 statements) Stackdriver Logging lets you view logs from your applications, and filter and search on them. Stackdriver Logging requires that you store your logs in BigQuery or Cloud Storage. Stackdriver Logging lets you define uptime checks. Stackdriver Logging requires the use of a third-party monitoring agent. Stackdriver Logging lets you define metrics based on your logs.
Name two use cases for Google Cloud Dataproc (Select 2 answers). Manage datasets of unpredictable size Migrate on-premises Hadoop jobs to the cloud Data mining and analysis in datasets of known size Manage data that arrives in realtime .
Name two use cases for Google Cloud Dataflow (Select 2 answers). Orchestration Extract, Transform, and Load (ETL) Manual resource management Reserved compute instances.
Name three use cases for the Google Cloud Machine Learning Platform (Select 3 answers). Data preparation Query architecture Fraud detection Content personalization Sentiment analysis.
Which statements are true about BigQuery? Choose all that are true (2 statements). BigQuery lets you run fast SQL queries against large databases. Once in BigQuery, data is not accessible from other GCP services. BigQuery is a good choice for online transaction processing. BigQuery is a good choice for data analytics warehousing. BigQuery requires that you provision database instances ahead of use.
What is TensorFlow? A managed service for building data pipelines An open-source software library that’s useful for building machine learning applications A managed service for building machine learning models A hardware device designed to accelerate machine learning workloads.
What does the Cloud Natural Language API do? It translates arbitrary strings into any supported language. It performs sentiment analysis on audio and video content. It extracts text in various languages from images. It analyzes text to reveal its structure and meaning.
Which compute service lets customers run virtual machines that run on Google's infrastructure? Kubernetes Engine Cloud Functions Compute Engine App Engine Compute Engine App Engine.
Which compute service lets customers deploy their applications in containers that run in clusters on Google's infrastructure? Cloud Functions App Engine Kubernetes Engine Compute Engine.
Which compute service lets customers focus on their applications, leaving most infrastructure and provisioning to Google, while still offering various choices of runtime? App Engine Compute Engine Cloud Functions Kubernetes Engine.
Which compute service lets customers supply chunks of code, which get run on-demand in response to events, on infrastructure wholly managed by Google? Cloud Functions Compute Engine Kubernetes Engine App Engine.
For what kind of traffic would the regional load balancer be the first choice? Choose all that are correct (2 answers). TCP traffic on arbitrary port numbers TCP/SSL traffic on popular well-known port numbers TCP traffic (non-SSL) on popular well-known port numbers UDP traffic.
Choose a simple way to let a VPN into your Google VPC continue to work in spite of routing changes, Cloud Router Dedicated Interconnect Direct Peering Carrier Peering.
Which of these storage needs is best addressed by Cloud Datastore? Structured objects, with transactions and SQL-like queries Structured objects, with lookups based on a single key Immutable binary objects A relational database with SQL queries and horizontal scalability.
Which of these storage needs is best addressed by Cloud Spanner? Structured objects, with lookups based on a single key A relational database with SQL queries and horizontal scalability Immutable binary objects Structured objects, with transactions and SQL-like queries.
Which of these storage needs is best addressed by Cloud Bigtable? Structured objects, with transactions and SQL-like queries Immutable binary objects Structured objects, with lookups based on a single key A relational database with SQL queries and horizontal scalability .
Which of these storage needs is best addressed by Cloud Storage? Structured objects, with transactions and SQL-like queries Structured objects, with lookups based on a single key Immutable binary objects A relational database with SQL queries and horizontal scalability.
The course introduces design using a three-tier design model. The three tiers are: Presentation layer, Business-logic layer, and Data layer. Presentation layer, Transport layer, and Session layer. Business-logic layer, Data layer, and Private layer. Data layer, Metadata layer, and Logic layer.
The design process includes which steps? Vision. Mission. Action. Begin simple and iterate. Plan for failure. Measure Measure. Rehearse. Process. Iterate. Assign blame. Needs analysis.
What is it called when information must be preserved to perform a subsequent step? Stateless. Data is stored in a database until it is needed. Stateful. State information is stored. The cache must be deleted prior to reuse.
What is the focus of measurement? Efficiency. An abstract ratio representing resource utilization. Effectiveness. A ratio that represents how well work gets done. Error free. The ideal state is zero errors. Measure what the user cares about.
What are the categories of requirements described in gathering requirements? Quantitative, size, frequency, and force. Quantitative, qualitative, scaling, and size. Qualitative, sequence, selection, and service. Scaling, corrective, system, and size.
How does a microservices design complicate business logic ? Key business logic is implemented as cross-services communication. The extra security introduces delays. Some business logic can only be implemented in a container. Because you can't do A/B testing with a microservices design.
Which GCP platform services are identified as useful for the 12-factor principle of "store configuration information in the environment"? Google Kubernetes Engine and Spanner. Google Cloud Storage and the Metadata Server. Google Cloud Storage and Bigtable. Metadata server, data server, and server.
Which platform processing service is designed to offer the lowest IT overhead so you can focus on the application? Google App Engine (GAE) Google Compute Engine (GCE) Google Easybake Engine (GEE) Google Kubernetes Engine (GKE).
What advice is given on horizontal scaling design? Prefer larger centralized servers. Even if it is complex, having it all in one horizontal layer makes it easier to manage. Assign multiple roles to a single server. That is how horizontal efficiency works. Prefer small stateless servers. Keep servers simple; do one thing well. Avoid horizontal scaling. The more servers there are the more likely things can go wrong.
What reason is given for the design advice to "design first and dimension later"? You will probably get the dimensions wrong and just have to do it again later. Trying to optimize cost or optimize for size (dimension) before the design is fully developed can lead to confusion and ambiguities in the design process. That is just the standard order of activities agreed on by the World Architecture Consortium in 2013. If the business requirements change, the dimensions could change. So wait as long as possible before dimensioning to lower the risk of change.
What does Data Integrity mean? That users have access to their data and that the data persists without being corrupted or lost. That the data is secure That is just the standard order of activities agreed on by the World Architecture Consortium in 2013. That the data is accessible to them and that it is persistent and has the same value.
What is the difference between a proxied and a pass-through load balancer? Proxied load balancers work with TCP, and pass-through load balancers work only with UDP. A proxied load balancer sets up a secure tunnel to the destination, while a pass-through load balancer forwards the data without encapsulation. A pass-through load balancer sets up a secure tunnel to the destination, while a proxied load balancer forwards the data without encapsulation. A proxied load balancer terminates the incoming connection and initiates a separate connection, a pass-through redirects traffic without terminating it.
Which form of load balancing enables you to load balance behind an IP address that is only accessible to instances within your Virtual Private Cloud (VPC)? SSL proxy. HTTP(S) load balancing. Network load balancing. Internal load balancing.
What is the service provided by a third party (such as an ISP) that enables you to connect another cloud directly to your Google cloud resources to create hybrid cloud solutions? Dedicated interconnect. The Internet. Virtual Private Networking (VPN). Cross-cloud load splitting.
What are the two main categories of failures described? Failure due to overload, and failure due to underload. Failure due to loss of resources, and failure due to overload. Failure due to social loafing and failure due to bad luck. Failure due to loss of resources, and failure due to breakage.
To design to overcome a single point of failure, the N+2 strategy is recommended. What is N+2? You turn from North twice. Therefore, the correct answer is South. One alternative to ' N' to handle an upgrade, and a second to handle a service outage. The first N is for early detection, and the second N is for a spare. The first N is just the service itself. So N+2 means "have a single backup".
What is a correlated failure? When two unrelated and disconnected items fail at the same time; also called quantum entanglement. Cause and effect. For example, turning off the power causes a device to stop communicating. Turning the power off is a correlated failure. A really big failure. Small failures are called consolidated failures. When a group of related items fail at the same time; the group is a failure domain.
How can a design to improve reliability through failover create an opportunity for overload failure? If growth occurs and the capacity is not increased to accommodate the new greater load during failover. Cause and effect. For example, turning off the power causes a device to stop communicating. Turning the power off is a correlated failure. A really big failure. Small failures are called consolidated failures. When a group of related items fail at the same time; the group is a failure domain.
What is a cascading failure? When a small failure is followed by a much bigger failure of the same resource. It is a false alarm, when there appears to be a failure but it clears up on its own. When, due to an overload failure, the system seeks additional resources and spreads the overload until the system loses integrity. A denial of service attack when, due to an overload failure, the system security policy shuts down all access.
What is it called when you are trying to make a system more reliable by adding retries and it creates the opportunity for an overload failure? Queries of death overload failure. Incast overload failure. Positive feedback cycle overload failure. Canary overload failure.
What is the recommended action to help cope with failure that involves Objectives and Indicators? Establish early warning canary tests to indicate when failure is imminent. Calculate a ratio of SLI/SLO and keep the ratio between .9 and 1.0. Incorporate failure planning including a margin of safety and scheduled downtime into the SLOs and SLIs. Add the SLO and SLI together and divide by 2 to get the arithmetic mean.
Why is DNS recommended for business continuity and disaster recovery? Because you can use it to broadcast status messages to all clients of the service. Because you can use it to redirect client requests to an alternate backup service by changing the DNS definition. You can upload a backup version of your service to the DNS platform, so it can take over during an outage. Because DNS gives you a "choke point" to rate-limit requests if there is a denial of service overload attack.
What is a lazy deletion strategy? When a client deletes an object, it is not annihilated immediately, but concealed and preserved for a period. There may be multiple tiers in the deletion strategy that permit different kinds of recovery of the object. That is when an organization is lazy about deleting documents containing personally identifying information instead of deleting them immediately. Don't use lazy deletion. A programing technique in which objects are not immediately deleted, but are placed on a queue. Later, a separate process called a "garbage collector" deletes the object. When a client deletes an object, the object is hidden from the client's view permanently but is never "really" deleted. Lazy deletion just means "never show me this object again".
What is a key technology for scalable and resilient design that enables both scaling of capacity and redirecting traffic to alternate resources in the event of a failure? Cloud Router. Dataflow. Load balancing. Google Cloud Storage (GCS).
What does "pervasive defense in depth" mean? It means that GCP is secure. If you use GCP your application is automatically secure. It means that you need third-party security technology. As with other cloud providers, GCP provides resources not security guarantees. Pervasive defense in depth means that you don't need to monitor security because Google does it for you. Segregation of duties; Google handles some things, others are your responsibility.
In most network devices such as a firewall, the network is subject to overload of the capacity of the interface. What is the overload capacity of a firewall in Google's network? The firewall is virtual, implemented through software defined networking, so there is no physical interface to be overloaded. About 5.4 ghz. When you allocate a virtual firewall device in GCP, the capacity of the hardware interface is one of the selectable options. This is not a user-selectable option. When you allocate a virtual firewall in GCP the capacity is determined for you.
Which edge features of Google's networking provide automatic protections against Distributed Denial of Service attacks (DDoS) ? VPC Firewall, Internal Load Balancing, and Cloud DNS. TCP/SSL proxy, Global Load Balancing, and Cloud CDN. This is the main purpose of Google's Cloud Router. Google's intrusion detection system.
Which of the following describes Cross-project VPC network peering? Projects are isolated in separate VPCs, but using virtual private networking they can share resources over a secure VPN tunnel. All of the projects share resources in a separate project. Projects are isolated in separate VPCs, but using network peering they can communicate over a private address space. Projects that are isolated in separate VPCs can only communicate over the internet and share resources using a tunneled address space.
When would you use CSEK (Customer Supplied Encryption Keys) ? When you have a requirement to use your own AES-256 keys rather than those automatically generated by Google. When you have a requirement to use AES-512 or AES-1024 keys instead of the less secure keys used by Google. Only during working hours in your location, because CSEK is not available on evenings or weekends. You should always use CSEK keys because without them data is transmitted and stored without encryption.
What is the "principle of least privilege" as it relates to IAM Policies? It means "avoid setting detailed privileges". Start with the highest scope of privilege. The resulting IAM policy is simpler to administer and less prone to errors. IAM roles are built up from collections of simple permissions. So the principle of least privilege means to build custom roles because the predefined roles are almost never useful. Grant roles at the smallest scope needed for the individual or service account to be functional with the services they require. When you share an account, make sure that it has the right privileges needed for the shared activity. Sometimes it is easier for two or more people to share a single user account instead of having individual accounts. .
What are the steps in the capacity planning cycle? Application. Presentation. Session. Transport. Control. Management. Data. Processing. Deploy. Dimension. Identify. Adapt. Allocate. Approve. Deploy. Forecast.
What are three methods for reducing the price of virtual machines (VMs) in GCP? Suspended use discounts. Bulk pricing VMs. Price bidding. Sustained use discounts. Committed use discounts. Preemptible VMs. Old equipment discount. Committed use discounts. Sustainable VMs. Bulk pricing. Bid pricing (also called market pricing). Lights-out discounts.
What is the key advice presented about GCP deployment? Always test deployment rollout in a simulated environment, and never the real production environment. Deploy to the largest number of users as soon as possible so that you get detailed feedback on what to fix. Deployment is pretty simple, so you should not need a checklist and you can do most things manually. Automate everything you can -- because launch and release automation has an influence over reliability.
What is the difference between black box monitoring and white box monitoring? White box monitoring requires Stackdriver. Black box monitoring can be done with only open source software. In black box monitoring you can only monitor external observable events, whereas, in white box monitoring, you can also monitor the system's internal events. Black box monitoring means that you don't tell anyone what you are doing, whereas white box monitoring is more transparent. White box monitoring is done by administration professionals. Black box monitoring is when a hacker tries to monitor your system from outside the organization.
From the bottom up, what are the first three layers in the Site Reliability Engineering pyramid? Product. Capacity Planning. Incident Response. Testing and Release Procedures. Capacity Planning. Alert Notification. Incident Response. Testing and Release Procedures. Capacity Planning. Monitoring. Incident Response. Post Mortem / Root Cause Analysis.
The course introduces design using a three-tier design model. The three tiers are: Presentation layer, Business-logic layer, and Data layer. Presentation layer, Transport layer, and Session layer. Business-logic layer, Data layer, and Private layer. Data layer, Metadata layer, and Logic layer.
Denunciar test Condiciones de uso
CREAR TEST
Usamos cookies para personalizar su experiencia. Si sigue navegando estará aceptando su uso. Más información.