Google (PCA) Exam Questions And Answers page 4
For this question, refer to the EHR Healthcare case study. In the past, configuration errors put public IP addresses on backend servers that should not have been accessible from the Internet. You need to ensure that no one can put external IP addresses on backend Compute Engine instances and that external IP addresses can only be configured on frontend Compute Engine instances. What should you do?
Revoke the compute.networkAdmin role from all users in the project with front end instances.
Create an Identity and Access Management (IAM) policy that maps the IT staff to the compute.networkAdmin role for the organization.
Create a custom Identity and Access Management (IAM) role named GCE_FRONTEND with the compute.addresses.create permission.
Managing and provisioning a cloud solution infrastructure
Designing for security and compliance
For this question, refer to the EHR Healthcare case study. You are a developer on the EHR customer portal team. Your team recently migrated the customer portal application to Google Cloud. The load has increased on the application servers, and now the application is logging many timeout errors. You recently incorporated Pub/Sub into the application architecture, and the application is not logging any Pub/Sub publishing errors. You want to improve publishing latency. What should you do?
Increase the Pub/Sub Total Timeout retry value.
Move from a Pub/Sub subscriber pull model to a push model.
Turn off Pub/Sub message batching.
Create a backup Pub/Sub message queue.
Managing and provisioning a cloud solution infrastructure
Designing for security and compliance
For this question, refer to the EHR Healthcare case study. You are responsible for designing the Google Cloud network architecture for Google Kubernetes Engine. You want to follow Google best practices. Considering the EHR Healthcare business and technical requirements, what should you do to reduce the attack surface?
Use a private cluster with a private endpoint with master authorized networks configured.
Use a public cluster with firewall rules and Virtual Private Cloud (VPC) routes.
Use a private cluster with a public endpoint with master authorized networks configured.
Use a public cluster with master authorized networks enabled and firewall rules.
Designing and planning a cloud solution architecture
Designing for security and compliance
For this question, refer to the EHR Healthcare case study. You are responsible for ensuring that EHR's use of Google Cloud will pass an upcoming privacy compliance audit. What should you do? (Choose two.)
Verify EHR's product usage against the list of compliant products on the Google Cloud compliance page.
Advise EHR to execute a Business Associate Agreement (BAA) with Google Cloud.
Use Firebase Authentication for EHR's user facing applications.
Implement Prometheus to detect and prevent security breaches on EHR's web-based applications.
Use GKE private clusters for all Kubernetes workloads.
Managing and provisioning a cloud solution infrastructure
Designing for security and compliance
For this question, refer to the EHR Healthcare case study. You need to define the technical architecture for hybrid connectivity between EHR's on-premises systems and Google Cloud. You want to follow Google's recommended practices for production-level applications. Considering the EHR Healthcare business and technical requirements, what should you do?
Configure two Partner Interconnect connections in one metro (City), and make sure the Interconnect connections are placed in different metro zones.
Configure two VPN connections from on-premises to Google Cloud, and make sure the VPN devices on-premises are in separate racks.
Configure Direct Peering between EHR Healthcare and Google Cloud, and make sure you are peering at least two Google locations.
Configure two Dedicated Interconnect connections in one metro (City) and two connections in another metro, and make sure the Interconnect connections are placed in different metro zones.
Designing and planning a cloud solution architecture
Managing and provisioning a cloud solution infrastructure
For this question, refer to the EHR Healthcare case study. You need to define the technical architecture for securely deploying workloads to Google Cloud. You also need to ensure that only verified containers are deployed using Google Cloud services. What should you do? (Choose two.)
Enable Binary Authorization on GKE, and sign containers as part of a CI/CD pipeline.
Configure Jenkins to utilize Kritis to cryptographically sign a container as part of a CI/CD pipeline.
Configure Container Registry to only allow trusted service accounts to create and deploy containers from the registry.
Configure Container Registry to use vulnerability scanning to confirm that there are no vulnerabilities before deploying the workload.
Designing and planning a cloud solution architecture
Designing for security and compliance
For this question, refer to the Helicopter Racing League (HRL) case study. A recent finance audit of cloud infrastructure noted an exceptionally high number of Compute Engine instances are allocated to do video encoding and transcoding. You suspect that these Virtual Machines are zombie machines that were not deleted after their workloads completed. You need to quickly get a list of which VM instances are idle. What should you do?
Log into each Compute Engine instance and collect disk, CPU, memory, and network usage statistics for analysis.
Use the gcloud compute instances list to list the virtual machine instances that have the idle: true label set.
Use the gcloud recommender command to list the idle virtual machine instances.
From the Google Console, identify which Compute Engine instances in the managed instance groups are no longer responding to health check probes.
Managing and provisioning a cloud solution infrastructure
Designing for security and compliance
For this question, refer to the Helicopter Racing League (HRL) case study. HRL is looking for a cost-effective approach for storing their race data such as telemetry. They want to keep all historical records, train models using only the previous season's data, and plan for data growth in terms of volume and information collected. You need to propose a data solution. Considering HRL business requirements and the goals expressed by CEO S. Hawke, what should you do?
Use Firestore for its scalable and flexible document-based database. Use collections to aggregate race data by season and event.
Use Cloud Spanner for its scalability and ability to version schemas with zero downtime. Split race data using season as a primary key.
Use BigQuery for its scalability and ability to add columns to a schema. Partition race data based on season.
Use Cloud SQL for its ability to automatically manage storage increases and compatibility with MySQL. Use separate database instances for each season.
Managing and provisioning a cloud solution infrastructure
Designing for security and compliance
For this question, refer to the Helicopter Racing League (HRL) case study. HRL wants better prediction accuracy from their ML prediction models. They want you to use Google s AI Platform so HRL can understand and interpret the predictions. What should you do?
Use Explainable AI.
Use Vision AI.
Use Google Cloud s operations suite.
Use Jupyter Notebooks.
Designing and planning a cloud solution architecture
Designing for security and compliance
For this question, refer to the Helicopter Racing League (HRL) case study. Recently HRL started a new regional racing league in Cape Town, South Africa. In an effort to give customers in Cape Town a better user experience, HRL has partnered with the Content Delivery Network provider, Fastly. HRL needs to allow traffic coming from all of the Fastly IP address ranges into their Virtual Private Cloud network (VPC network). You are a member of the HRL security team and you need to configure the update that will allow only the Fastly IP address ranges through the External HTTP(S) load balancer. Which command should you use?
Managing and provisioning a cloud solution infrastructure
Designing for security and compliance
Comments