Discount Offer
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

Professional-Cloud-Developer Practice Test


Page 4 out of 51 Pages

Topic 2: Misc. Questions

You are creating and running containers across different projects in Google Cloud. The application you are developing needs to access Google Cloud services from within Google Kubernetes Engine (GKE). What should you do?


A. Assign a Google service account to the GKE nodes.


B. Use a Google service account to run the Pod with Workload Identity.


C. Store the Google service account credentials as a Kubernetes Secret.


D. Use a Google service account with GKE role-based access control (RBAC).





B.
  Use a Google service account to run the Pod with Workload Identity.

You are developing a new public-facing application that needs to retrieve specific properties in the metadata of users’ objects in their respective Cloud Storage buckets. Due to privacy and data residency requirements, you must retrieve only the metadata and not the object data. You want to maximize the performance of the retrieval process. How should you retrieve the metadata?


A. Use the patch method


B. Use the compose method


C. Use the copy method


D. Use the fields request parameter.





D.
  Use the fields request parameter.

You are supporting a business-critical application in production deployed on Cloud Run. The application is reporting HTTP 500 errors that are affecting the usability of the application. You want to be alerted when the number of errors exceeds 15% of the requests within a specific time window. What should you do?


A. Navigate to the Cloud Run page in the Google Cloud console, and select the service from the services list. Use the Metrics tab to visualize the number of errors for that revision and refresh the page daily.


B. Create a Cloud Function that consumes the Cloud Monitoring API Use Cloud Composer to trigger the Cloud Function daily and alert you if the number of errors is above the defined threshold.


C. Create an alerting policy in Cloud Monitoring that alerts you if the number of errors is above the defined threshold.


D. Create a Cloud Function that consumes the Cloud Monitoring API Use Cloud Scheduler to trigger the Cloud Function daily and alert you if the number of errors is above the defined threshold.





B.
  Create a Cloud Function that consumes the Cloud Monitoring API Use Cloud Composer to trigger the Cloud Function daily and alert you if the number of errors is above the defined threshold.

You are running a containerized application on Google Kubernetes Engine. Your container images are stored in Container Registry. Your team uses CI/CD practices. You need to prevent the deployment of containers with known critical vulnerabilities. What should you do?


A.

  • Use Web Security Scanner to automatically crawl your application.
  • Review your application logs for scan results, and provide an attestation that the container is free of known critical vulnerabilities.
  • Use Binary Authorization to implement a policy that forces the attestation to be provided before the container is deployed.


B.

  • Use Web Security Scanner to automatically crawl your application
  • Review the scan results in the scan details page in the Cloud Console, and provide an attestation that the container is free of known critical vulnerabilities
  • Use Binary Authorization to implement a policy that forces the attestation to be provided before the container is deployed


C.

  • Enable the Container Scanning API to perform vulnerability scanning
  • Review vulnerability reporting in Container Registry in the Cloud Console, and provide an attestation that the container is free of known critical vulnerabilities
  • Use Binary Authorization to implement a policy that forces the attestation to be provided before the container is deployed


D.

  • Enable the Container Scanning API to perform vulnerability scanning
  • Programmatically review vulnerability reporting through the Container Scanning API, and provide an attestation that the container is free of known critical vulnerabilities
  • Use Binary Authorization to implement a policy that forces the attestation to be provided before the container is deployed





D.
  
  • Enable the Container Scanning API to perform vulnerability scanning
  • Programmatically review vulnerability reporting through the Container Scanning API, and provide an attestation that the container is free of known critical vulnerabilities
  • Use Binary Authorization to implement a policy that forces the attestation to be provided before the container is deployed


You are developing an ecommerce application that stores customer, order, and inventory data as relational tables inside Cloud Spanner. During a recent load test, you discover that Spanner performance is not scaling linearly as expected. Which of the following is the cause?


A. The use of 64-bit numeric types for 32-bit numbers.


B. The use of the STRING data type for arbitrary-precision values.


C. The use of Version 1 UUIDs as primary keys that increase monotonically


D. The use of LIKE instead of STARTS_WITH keyword for parameterized SQL queries





C.
  The use of Version 1 UUIDs as primary keys that increase monotonically


Page 4 out of 51 Pages
Previous