PROFESSIONAL-CLOUD-ARCHITECT Practice Test Questions

251 Questions


Topic 5, Misc Questions

Your solution is producing performance bugs in production that you did not see in staging and test environments. You want to adjust your test and deployment procedures to avoid this problem in the future. What should you do?


A. Deploy fewer changes to production.


B. Deploy smaller changes to production.


C. Increase the load on your test and staging environments.


D. Deploy changes to a small subset of users before rolling out to production.





D.
  Deploy changes to a small subset of users before rolling out to production.

A news teed web service has the following code running on Google App Engine. During peak load, usersreport that they can see news articles they already viewed. What is the most likely cause of this problem?


A. The session variable is local to just a single instance.


B. The session variable is being overwritten in Cloud Datastore.


C. The URL of the API needs to be modified to prevent caching.


D. The HTTP Expires header needs to be set to -1 to stop caching.





B.
  The session variable is being overwritten in Cloud Datastore.

https://stackoverflow.com/questions/3164280/google-app-engine-cache-list-in-session-variable?rq=1

Your organization wants to control IAM policies for different departments independently, but centrally. Which approach should you take?


A. Multiple Organizations with multiple Folders


B. Multiple Organizations, one for each department


C. A single Organization with Folder for each department


D. A single Organization with multiple projects, each with a central owner





C.
  A single Organization with Folder for each department

Your development team has installed a new Linux kernel module on the batch servers in Google Compute Engine (GCE) virtual machines (VMs) to speed up the nightly batch process. Two days after the installation, 50% of the batch servers failed the nightly batch run. You want to collect details on the failure to pass back to the development team. Which three actions should you take? Choose 3 answers


A. Use Stackdriver Logging to search for the module log entries.


B. Read the debug GCE Activity log using the API or Cloud Console.


C. Use gcloud or Cloud Console to connect to the serial console and observe the logs.


D. Identify whether a live migration event of the failed server occurred, using in the activity log.


E. Adjust the Google Stackdriver timeline to match the failure time, and observe the batch server metrics.


F. Export a debug VM into an image, and run the image on a local server where kernel log messages will be displayed on the native screen.





A.
  Use Stackdriver Logging to search for the module log entries.

C.
  Use gcloud or Cloud Console to connect to the serial console and observe the logs.

E.
  Adjust the Google Stackdriver timeline to match the failure time, and observe the batch server metrics.

You set up an autoscaling instance group to serve web traffic for an upcoming launch. After configuring the instance group as a backend service to an HTTP(S) load balancer, you notice that virtual machine (VM) instances are being terminated and re-launched every minute. The instances do not have a public IP address. You have verified the appropriate web response is coming from each instance using the curl command. You want to ensure the backend is configured correctly. What should you do?


A. Ensure that a firewall rule exists to allow source traffic on HTTP/HTTPS to reach the load balancer.


B. Assign a public IP to each instance and configure a firewall rule to allow the load balancer to reach the instance public IP.


C. Ensure that a firewall rule exists to allow load balancer health checks to reach the instances in the instance group.


D. Create a tag on each instance with the name of the load balancer. Configure a firewall rule with the name of the load balancer as the source and the instance tag as the destination.





C.
  Ensure that a firewall rule exists to allow load balancer health checks to reach the instances in the instance group.

https://cloud.google.com/vpc/docs/using-firewalls

Your company wants to try out the cloud with low risk. They want to archive approximately 100 TB of their log data to the cloud and test the analytics features available to them there, while also retaining that data as a long-term disaster recovery backup. Which two steps should they take? Choose 2 answers


A. Load logs into Google BigQuery.


B. Load logs into Google Cloud SQL.


C. Import logs into Google Stackdriver.


D. Insert logs into Google Cloud Bigtable.


E. Upload log files into Google Cloud Storage.





A.
  Load logs into Google BigQuery.

C.
  Import logs into Google Stackdriver.

You are designing a mobile chat application. You want to ensure people cannot spoof chat messages, by providing a message were sent by a specific user. What should you do


A. Tag messages client side with the originating user identifier and the destination user.


B. Encrypt the message client side using block-based encryption with a shared key.


C. Use public key infrastructure (PKI) to encrypt the message client side using the originating user's private key.


D. Use a trusted certificate authority to enable SSL connectivity between the client application and the server.





D.
  Use a trusted certificate authority to enable SSL connectivity between the client application and the server.

Encrypting each block and tagging each message at the client side is an overhead on the application. Best method which has been adopted since years is contacting the SSL provider and use the public certificate to encrypt the traffic between client and the server.

Your company has successfully migrated to the cloud and wants to analyze their data stream to optimize operations. They do not have any existing code for this analysis, so they are exploring all their options. These options include a mix of batch and stream processing, as they are running some hourly jobs and live-processing some data as it comes in. Which technology should they use for this?


A. Google Cloud Dataproc


B. Google Cloud Dataflow


C. Google Container Engine with Bigtable


D. Google Compute Engine with Google BigQuery





B.
  Google Cloud Dataflow

Dataflow is for processing both the Batch and Stream

You have been asked to select the storage system for the click-data of your company's large portfolio of websites. This data is streamed in from a custom website analytics package at a typical rate of 6,000 clicks per minute, with bursts of up to 8,500 clicks per second. It must been stored for future analysis by your data science and user experience teams. Which storage infrastructure should you choose?


A. Google Cloud SQL


B. Google Cloud Bigtable


C. Google Cloud Storage


D. Google cloud Datastore





C.
  Google Cloud Storage

https://cloud.google.com/solutions/data-analytics-partner-ecosystem
https://zulily-tech.com/2015/08/10/leveraging-google-cloud-dataflow-for-clickstream-processing/

Auditors visit your teams every 12 months and ask to review all the Google Cloud Identity and Access Management (Cloud IAM) policy changes in the previous 12 months. You want to streamline and expedite the analysis and audit process. What should you do?


A. Create custom Google Stackdriver alerts and send them to the auditor.


B. Enable Logging export to Google BigQuery and use ACLs and views to scope the data shared with the auditor.


C. Use cloud functions to transfer log entries to Google Cloud SQL and use ACLS and views to limit an auditor's view.


D. Enable Google Cloud Storage (GCS) log export to audit logs Into a GCS bucket and delegate access to the bucket





D.
  Enable Google Cloud Storage (GCS) log export to audit logs Into a GCS bucket and delegate access to the bucket

Your application needs to process credit card transactions. You want the smallest scope of Payment Card Industry (PCI) compliance without compromising the ability to analyze transactional data and trends relating to which payment methods are used. How should you design your architecture?


A. Create a tokenizer service and store only tokenized data.


B. Create separate projects that only process credit card data.


C. Create separate subnetworks and isolate the components that process credit card data.


D. Streamline the audit discovery phase by labeling all of the virtual machines (VMs) that process PCI data.


E. Enable Logging export to Google BigQuery and use ACLs and views to scope the data shared with the auditor





E.
  Enable Logging export to Google BigQuery and use ACLs and views to scope the data shared with the auditor

The proper model for exporting credit card processing data is to forward from a squid proxy to Stackdriver Logging, and export from Stackdriver Logging into BigQuery https://cloud.google.com/solutions/pci-dss

Your company places a high value on being responsive and meeting customer needs quickly. Their primary business objectives are release speed and agility. You want to reduce the chance of security errors being accidentally introduced. Which two actions can you take? Choose 2 answers


A. Ensure every code check-in is peer reviewed by a security SME.


B. Use source code security analyzers as part of the CI/CD pipeline.


C. Ensure you have stubs to unit test all interfaces between components.


D. Enable code signing and a trusted binary repository integrated with your CI/CD pipeline.


E. Run a vulnerability security scanner as part of your continuous-integration /continuous-delivery (CI/CD) pipeline.





B.
  Use source code security analyzers as part of the CI/CD pipeline.

E.
  Run a vulnerability security scanner as part of your continuous-integration /continuous-delivery (CI/CD) pipeline.

https://docs.microsoft.com/en-us/vsts/articles/security-validation-cicd-pipeline?view=vsts


Page 7 out of 21 Pages
Previous