Professional-Cloud-Architect Exam Questions

Total 251 Questions

Last Updated Exam : 22-Oct-2024

Topic 5, Misc Questions

You are using Cloud SQL as the database backend for a large CRM deployment. You want to scale as usageincreases and ensure that you don’t run out of storage, maintain 75% CPU usage cores, and keep replicationlag below 60 seconds. What are the correct steps to meet your requirements?


A.

1. Enable automatic storage increase for the instance.
2. Create a Stackdriver alert when CPU usage exceeds 75%, and change the instance type to reduce
CPU usage.3. Create a Stackdriver alert for replication lag, and shard the database to reduce replication time.


B.

1. Enable automatic storage increase for the instance.
2. Change the instance type to a 32-core machine type to keep CPU usage below 75%.
3. Create a Stackdriver alert for replication lag, and shard the database to reduce replication time.


C.

1. Create a Stackdriver alert when storage exceeds 75%, and increase the available storage on the
instance to create more space.
2. Deploy memcached to reduce CPU load.
3. Change the instance type to a 32-core machine type to reduce replication lag


D.

1. Create a Stackdriver alert when storage exceeds 75%, and increase the available storage on the
instance to create more space.
2. Deploy memcached to reduce CPU load.
3. Create a Stackdriver alert for replication lag, and change the instance type to a 32-core machine type
to reduce replication lag





A.
  

1. Enable automatic storage increase for the instance.
2. Create a Stackdriver alert when CPU usage exceeds 75%, and change the instance type to reduce
CPU usage.3. Create a Stackdriver alert for replication lag, and shard the database to reduce replication time.



You are tasked with building an online analytical processing (OLAP) marketing analytics and reporting tool.This requires a relational database that can operate on hundreds of terabytes of data. What is the Googlerecommended tool for such applications?


A.

Cloud Spanner, because it is globally distributed


B.

Cloud SQL, because it is a fully managed relational database


C.

Cloud Firestore, because it offers real-time synchronization across devices


D.

BigQuery, because it is designed for large-scale processing of tabular data





D.
  

BigQuery, because it is designed for large-scale processing of tabular data



Reference: https://cloud.google.com/files/BigQueryTechnicalWP.pdf

Your customer wants to capture multiple GBs of aggregate real-time key performance indicators (KPIs) fromtheir game servers running on Google Cloud Platform and monitor the KPIs with low latency. How shouldthey capture the KPIs?


A.

Store time-series data from the game servers in Google Bigtable, and view it using Google Data Studio.


B.

Output custom metrics to Stackdriver from the game servers, and create a Dashboard in Stackdriver
Monitoring Console to view them.


C.

Schedule BigQuery load jobs to ingest analytics files uploaded to Cloud Storage every ten minutes, and
visualize the results in Google Data Studio.


D.

Insert the KPIs into Cloud Datastore entities, and run ad hoc analysis and visualizations of them in
Cloud Datalab.





A.
  

Store time-series data from the game servers in Google Bigtable, and view it using Google Data Studio.



Reference:https://cloud.google.com/solutions/data-lifecycle-cloud-platform

You have a Python web application with many dependencies that requires 0.1 CPU cores and 128 MB of
memory to operate in production. You want to monitor and maximize machine utilization. You also to reliably deploy new versions of the application. Which set of steps should you take?


A.

Perform the following:
1. Create a managed instance group with f1-micro type machines.
2. Use a startup script to clone the repository, check out the production branch, install the dependencies,
and start the Python app.
3. Restart the instances to automatically deploy new production releases


B.

Perform the following:
1. Create a managed instance group with n1-standard-1 type machines.
2. Build a Compute Engine image from the production branch that contains all of the dependencies and
automatically starts the Python app.
3. Rebuild the Compute Engine image, and update the instance template to deploy new production
releases.


C.

Perform the following:
1. Create a Kubernetes Engine cluster with n1-standard-1 type machines.
2. Build a Docker image from the production branch with all of the dependencies, and tag it with the
version number.
3. Create a Kubernetes Deployment with the imagePullPolicy set to “IfNotPresent” in the staging
namespace, and then promote it to the production namespace after testing.


D.

Perform the following:
1. Create a Kubernetes Engine cluster with n1-standard-4 type machines.
2. Build a Docker image from the master branch will all of the dependencies, and tag it with “latest”.
3. Create a Kubernetes Deployment in the default namespace with the imagePullPolicy set to “Always”.
Restart the pods to automatically deploy new production releases





B.
  

Perform the following:
1. Create a managed instance group with n1-standard-1 type machines.
2. Build a Compute Engine image from the production branch that contains all of the dependencies and
automatically starts the Python app.
3. Rebuild the Compute Engine image, and update the instance template to deploy new production
releases.



Your web application must comply with the requirements of the European Union’s General Data ProtectionRegulation (GDPR). You are responsible for the technical architecture of your web application. What should you do?


A.

Ensure that your web application only uses native features and services of Google Cloud Platform,
because Google already has various certifications and provides “pass-on” compliance when you use
native features


B.

Enable the relevant GDPR compliance setting within the GCPConsole for each of the services in use within your application


C.

Ensure that Cloud Security Scanner is part of your test planning strategy in order to pick up any
compliance gaps.


D.

Define a design for the security of data in your web application that meets GDPR requirements.





D.
  

Define a design for the security of data in your web application that meets GDPR requirements.



Reference: https://www.mobiloud.com/blog/gdpr-compliant-mobile-app/

You are analyzing and defining business processes to support your startup’s trial usage of GCP, and you don’t yet know what consumer demand for your product will be. Your manager requires you to minimize GCP service costs and adhere to Google best practices. What should you do?


A.

Utilize free tier and sustained use discounts. Provision a staff position for service cost management.


B.

Utilize free tier and sustained use discounts. Provide training to the team about service cost
management.


C.

Utilize free tier and committed use discounts. Provision a staff position for service cost management.


D.

Utilize free tier and committed use discounts. Provide training to the team about service cost
management.





A.
  

Utilize free tier and sustained use discounts. Provision a staff position for service cost management.



You are working in a highly secured environment where public Internet access from the Compute Engine VMsis not allowed. You do not yet have a VPN connection to access an on-premises file server. You need to installspecific software on a Compute Engine instance. How should you install the software?


A.

Upload the required installation files to Cloud Storage. Configure the VM on a subnet with a Private
Google Access subnet. Assign only an internal IP address to the VM. Download the installation files to the VM using gsutil.


B.

Upload the required installation files to Cloud Storage and use firewall rules to block all traffic except
the IP address range for Cloud Storage. Download the files to the VM using gsutil


C.

Upload the required installation files to Cloud Source Repositories. Configure the VM on a subnet with
a Private Google Access subnet. Assign only an internal IP address to the VM. Download the
installation files to the VM using gcloud.


D.

Upload the required installation files to Cloud Source Repositories and use firewall rules to block all
traffic except the IP address range for Cloud Source Repositories. Download the files to the VM using
gsutil.





B.
  

Upload the required installation files to Cloud Storage and use firewall rules to block all traffic except
the IP address range for Cloud Storage. Download the files to the VM using gsutil



You have an application that will run on Compute Engine. You need to design an architecture that takes intoaccount a disaster recovery plan that requires your application to fail over to another region in case of aregional outage. What should you do?


A.

Deploy the application on two Compute Engine instances in the same project but in a different region.
Use the first instance to serve traffic, and use the HTTP load balancing service to fail over to the standby
instance in case of a disaster.


B.

Deploy the application on a Compute Engine instance. Use the instance to serve traffic, and use the
HTTP load balancing service to fail over to an instance on your premises in case of a disaster


C.

Deploy the application on two Compute Engine instance groups, each in the same project but in a
different region. Use the first instance group to serve traffic, and use the HTTP load balancing service to
fail over to the standby instance group in case of a disaster.


D.

Deploy the application on two Compute Engine instance groups, each in separate project and a different
region. Use the first instance group to server traffic, and use the HTTP load balancing service to fail
over to the standby instance in case of a disaster





B.
  

Deploy the application on a Compute Engine instance. Use the instance to serve traffic, and use the
HTTP load balancing service to fail over to an instance on your premises in case of a disaster



You are creating an App Engine application that uses Cloud Datastore as its persistence layer. You need to retrieve several root entities for which you have the identifiers. You want to minimize the overhead in
operations performed by Cloud Datastore. What should you do?


A.

Create the Key object for each Entity and run a batch get operation


B.

Create the Key object for each Entity and run multiple get operations, one operation for each entity


C.

Use the identifiers to create a query filter and run a batch query operation


D.

Use the identifiers to create a query filter and run multiple query operations, one operation for each
entity





A.
  

Create the Key object for each Entity and run a batch get operation



You are deploying an application on App Engine that needs to integrate with an on-premises database. For
security purposes, your on-premises database must not be accessible through the public Internet. What should you do?


A.

Deploy your application on App Engine standard environment and use App Engine firewall rules to
limit access to the open on-premises database.


B.

Deploy your application on App Engine standard environment and use Cloud VPN to limit access to the
onpremises database.


C.

Deploy your application on App Engine flexible environment and use App Engine firewall rules to limit
access to the on-premises database.


D.

Deploy your application on App Engine flexible environment and use Cloud VPN to limit access to the
onpremises database





A.
  

Deploy your application on App Engine standard environment and use App Engine firewall rules to
limit access to the open on-premises database.




Page 13 out of 26 Pages
Previous