- (Exam Topic 5)
You created a pipeline that can deploy your source code changes to your infrastructure in instance groups for self healing.
One of the changes negatively affects your key performance indicator. You are not sure how to fix it and investigation could take up to a week.
What should you do
Correct Answer:
C
- (Exam Topic 4)
For this question, refer to the Dress4Win case study.
At Dress4Win, an operations engineer wants to create a tow-cost solution to remotely archive copies of database backup files. The database files are compressed tar files stored in their current data center. How should he proceed?
Correct Answer:
A
Follow these rules of thumb when deciding whether to use gsutil or Storage Transfer Service:
When transferring data from an on-premises location, use gsutil.
When transferring data from another cloud storage provider, use Storage Transfer Service.
Otherwise, evaluate both tools with respect to your specific scenario.
Use this guidance as a starting point. The specific details of your transfer scenario will also help you determine which tool is more appropriate
https://cloud.google.com/storage-transfer/docs/overview
- (Exam Topic 5)
Your company acquired a healthcare startup and must retain its customers’ medical information for up to 4 more years, depending on when it was created. Your corporate policy is to securely retain this data, and then delete it as soon as regulations allow.
Which approach should you take?
Correct Answer:
C
https://cloud.google.com/storage/docs/lifecycle
- (Exam Topic 5)
You have an application that runs in Google Kubernetes Engine (GKE). Over the last 2 weeks, customers have reported that a specific part of the application returns errors very frequently. You currently have no logging or monitoring solution enabled on your GKE cluster. You want to diagnose the problem, but you have not been able to replicate the issue. You want to cause minimal disruption to the application. What should you do?
Correct Answer:
A
Reference: https://cloud.google.com/blog/products/management-tools/using-logging-your-apps-running- kubernetes-engine
- (Exam Topic 5)
Your company has a networking team and a development team. The development team runs applications on Compute Engine instances that contain sensitive data. The development team requires administrative permissions for Compute Engine. Your company requires all network resources to be managed by the networking team. The development team does not want the networking team to have access to the sensitive data on the instances. What should you do?
Correct Answer:
C
In this scenario, a large organization has a central team that manages security and networking controls for the entire organization. Developers do not have permissions to make changes to any network or security settings defined by the security and networking team but they are granted permission to create resources such as virtual machines in shared subnets. To facilitate this the organization makes use of a shared VPC (Virtual Private Cloud). A shared VPC allows creation of a VPC network of RFC 1918 IP spaces that associated projects (service projects) can then use. Developers using the associated projects can create VM instances in the shared VPC network spaces. The organization's network and security admins can create subnets, VPNs, and firewall rules usable by all the projects in the VPC network.
https://cloud.google.com/iam/docs/job-functions/networking#single_team_manages_security_network_for_orga
Reference: https://cloud.google.com/vpc/docs/shared-vpc