Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

Professional-Cloud-Architect Practice Test


Page 16 out of 51 Pages

Topic 5, Misc Questions

Your development team has installed a new Linux kernel module on the batch servers in Google Compute
Engine (GCE) virtual machines (VMs) to speed up the nightly batch process. Two days after the installation,
50% of the batch servers failed the nightly batch run. You want to collect details on the failure to pass back to
the development team. Which three actions should you take? Choose 3 answers


A.

Use Stackdriver Logging to search for the module log entries.


B.

Read the debug GCE Activity log using the API or Cloud Console.


C.

Use gcloud or Cloud Console to connect to the serial console and observe the logs.


D.

Identify whether a live migration event of the failed server occurred, using in the activity log.


E.

Adjust the Google Stackdriver timeline to match the failure time, and observe the batch server metrics.


F.

Export a debug VM into an image, and run the image on a local server where kernel log messages will
be displayed on the native screen.





A.
  

Use Stackdriver Logging to search for the module log entries.



C.
  

Use gcloud or Cloud Console to connect to the serial console and observe the logs.



E.
  

Adjust the Google Stackdriver timeline to match the failure time, and observe the batch server metrics.



You set up an autoscaling instance group to serve web traffic for an upcoming launch. After configuring the instance group as a backend service to an HTTP(S) load balancer, you notice that virtual machine (VM) instances are being terminated and re-launched every minute. The instances do not have a public IP address. You have verified the appropriate web response is coming from each instance using the curl command. You want to ensure the backend is configured correctly. What should you do?


A.

Ensure that a firewall rule exists to allow source traffic on HTTP/HTTPS to reach the load balancer.


B.

Assign a public IP to each instance and configure a firewall rule to allow the load balancer to reach the
instance public IP.


C.

Ensure that a firewall rule exists to allow load balancer health checks to reach the instances in the
instance group.


D.

Create a tag on each instance with the name of the load balancer. Configure a firewall rule with the
name of the load balancer as the source and the instance tag as the destination.





C.
  

Ensure that a firewall rule exists to allow load balancer health checks to reach the instances in the
instance group.



https://cloud.google.com/vpc/docs/using-firewalls

Your company wants to try out the cloud with low risk. They want to archive approximately 100 TB of their log data to the cloud and test the analytics features available to them there, while also retaining that data as a long-term disaster recovery backup. Which two steps should they take? Choose 2 answers


A.

Load logs into Google BigQuery.


B.

Load logs into Google Cloud SQL.


C.

Import logs into Google Stackdriver.


D.

Insert logs into Google Cloud Bigtable.


E.

Upload log files into Google Cloud Storage.





A.
  

Load logs into Google BigQuery.



C.
  

Import logs into Google Stackdriver.



You are designing a mobile chat application. You want to ensure people cannot spoof chat messages, by
providing a message were sent by a specific user.
What should you do


A.

Tag messages client side with the originating user identifier and the destination user.


B.

Encrypt the message client side using block-based encryption with a shared key.


C.

Use public key infrastructure (PKI) to encrypt the message client side using the originating user's private
key.


D.

Use a trusted certificate authority to enable SSL connectivity between the client application and the
server.





D.
  

Use a trusted certificate authority to enable SSL connectivity between the client application and the
server.



Encrypting each block and tagging each message at the client side is an overhead on the application. Best
method which has been adopted since years is contacting the SSL provider and use the public certificate to
encrypt the traffic between client and the server.

Your company has successfully migrated to the cloud and wants to analyze their data stream to optimize
operations. They do not have any existing code for this analysis, so they are exploring all their options. These
options include a mix of batch and stream processing, as they are running some hourly jobs and
live-processing some data as it comes in. Which technology should they use for this?


A.

Google Cloud Dataproc


B.

Google Cloud Dataflow


C.

Google Container Engine with Bigtable


D.

Google Compute Engine with Google BigQuery





B.
  

Google Cloud Dataflow



Dataflow is for processing both the Batch and Stream


Page 16 out of 51 Pages
Previous