Search Header Logo

GCP Mock Questions

Authored by Awo Gyamea

Computers

12th Grade

Used 1+ times

GCP Mock Questions
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company is using GCP Compute Engine to host its applications where one such application has a number of unauthenticated REST API calls. One of the users has located the URL of one such API call, which when repeatedly executed, crashed the Compute Engine instance. The instance was down for almost 3 hours and disrupted business for the whole company. What would you do to make sure that next time this happens, you are notified immediately if CPU usage goes above 90 percent?

Choose an Alerting Policy based on Process health in Cloud Monitoring

Choose an Alerting Policy based on metric rate in Cloud Monitoring

Choose an Alerting Policy based on uptime check in Cloud Monitoring

Create a script in your VM Instance to track the CPU Usage and trigger the notification if usage goes above defined threshold.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization is starting to move its infrastructure from its on-premises environment to Google Cloud Platform (GCP). The first step the organization wants to take is to migrate its current data backup and disaster recovery solutions to GCP for later analysis. The organization's production environment will remain on-premises for an indefinite time. The organization wants a scalable and cost-efficient solution. Which GCP solution should the organization use?

BigQuery using a data pipeline job with continuous updates

Cloud Storage using a scheduled task and gsutil

Compute Engine Virtual Machines using Persistent Disk

Cloud Datastore using regularly scheduled batch upload jobs

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are creating an internal App Engine application that needs to access a user's Google Drive on the user's behalf. Your company does not want to rely on the current user's credentials. It also wants to follow Google-recommended practices. What should you do?

Create a new Service account, and give all application users the role of Service Account User.

Create a new Service account, and add all application users to a Google Group. Give this group the role of Service Account User.

Use a dedicated G Suite Admin account, and authenticate the application's operations with these G Suite credentials.

Create a new service account, and grant it G Suite domain-wide delegation. Have the application use it to impersonate the user.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your manager has asked you to grant one contingent worker to review all the Cloud Storage buckets for two hours in order to create a similar bucket configuration for his team. What is the most secure and efficient method to grant the contingent worker access to Cloud Storage for only two hours?

Create a pre-signed URL granting two hours of access.

Configure an access control list (ACL) to allow access from the contingent works IP address and then modify it two hours later.

Assign an IAM role to an IAM user for the contingent worker with an expiration time of two hours.

Create an IAM user for the contingent worker and then manually remove the IAM user after two hours.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A customer wants to move their sensitive workloads to a Compute Engine-based cluster using Managed Instance Groups (MIGs). The jobs are bursty and must be completed quickly. They have a requirement to be able to control the key lifecycle. Which boot disk encryption solution should you use on the cluster to meet this customer's requirements?

Customer-supplied encryption keys (CSEK)

Customer-managed encryption keys (CMEK) using Cloud Key Management Service (KMS)

Encryption by default

Pre-encrypting files before transferring to Google Cloud Platform (GCP) for analysis

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company is using Cloud Dataproc for its Spark and Hadoop jobs. You want to be able to create, rotate, and destroy symmetric encryption keys used for the persistent disks used by Cloud Dataproc. Keys can be stored in the cloud. What should you do?

Use the Cloud Key Management Service to manage the data encryption key (DEK).

Use the Cloud Key Management Service to manage the key encryption key (KEK).

Use customer-supplied encryption keys to manage the data encryption key (DEK).

Use customer-supplied encryption keys to manage the key encryption key (KEK).

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your manager has asked you to store all Cloud Logging data access logs in Google Cloud. The Analytics team will review these logs for quality improvement and plans to retain them for up to 20 years. Which of the following options should the Analytics team choose to store the logs, keeping cost optimization in mind?

BigQuery

Cloud Storage

Cloud Logging

Cloud Pub/Sub

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?