Cloud Digital Leader - Google Learning Path Part 2 Quiz

Questions (55)

Number Questions Options
1

What open source platform, originally developed by Google, manages containerized workloads and services?

  • Angular
  • Go
  • Kubernetes
  • TensorFlow
2

What phrase refers to when a workload is rehosted without changing anything in the workload's code or architecture.

  • Move and improve
  • Refactor and reshape
  • Reimagine and plan
  • Lift and shift
3

A travel company is in the early stages of developing a new application and wants to test it on a variety of configurations: different operating systems, processors, and storage options. What cloud computing option should they use?

  • Containers
  • Virtual machine instances
  • A local development environment
  • Colocation
4

What portion of a machine does a container virtualize?

  • Hardware layers above the electrical level
  • Software layers above the firmware level
  • Software layers above the operating system level
  • The entire machine
5

A manufacturing company is considering shifting their on-premises infrastructure to the cloud, but are concerned that access to their data and applications won’t be available when they need them. They want to ensure that if one data center goes down, another will be available to prevent any disruption of service. What does this refer to?

  • Total cost of ownership
  • Security
  • Reliability
  • Flexibility
6

What computing option automatically provisions resources, like compute power, in the background as needed?

  • Serverless computing
  • PaaS (platform as a service)
  • IaaS (infrastructure as a service)
  • Traditional on-premises computing
7

What term is commonly used to describe a rehost migration strategy for an organization that runs specialized legacy applications that aren’t compatible with cloud-native applications?

  • Build and deploy
  • Lift and shift
  • Move and improve
  • Install and fall
8

Which is a fully managed cloud infrastructure solution that lets organizations run their Oracle workloads on dedicated servers in the cloud?

  • Bare metal solution
  • App Engine
  • Google Cloud VMware Engine
  • SQL Server on Google Cloud
9

In modern cloud application development, what name is given to independently deployable, scalable, and maintainable components that can be used to build a wide range of applications?

  • Monoliths
  • Containers
  • DevOps
  • Microservices
10

In modern application development, which is responsible for the day-to-day management of cloud-based infrastructure, such as patching, upgrades, and monitoring?

  • Containers
  • Managed services
  • Cloud security
  • DevOps
11

What term describes a set of instructions that lets different software programs communicate with each other?

  • Communication link interface
  • Network programming interface
  • Application programming interface
  • Programming communication link
12

What name is given to an environment that comprises some combination of on-premises or private cloud infrastructure and public cloud services?

  • Multicloud
  • Secure cloud
  • Hybrid cloud
  • Smart cloud
13

What is the name of Google Cloud's API management service that can operate APIs with enhanced scale, security, and automation?

  • Apigee
  • Cloud API Manager
  • AppSheet
  • App Engine
14

What’s the name of Google Cloud’s production-ready platform for running Kuberenetes applications across multiple cloud environments?

  • Container Registry
  • Knative
  • GKE Enterprise
  • Google Kubernetes Engine
15

What name is given to an environment where an organization uses more than one public cloud provider as part of its architecture?

  • Multicloud
  • Edge cloud
  • Community cloud
  • Hybrid cloud
16

What is one way that organizations can create new revenue streams through APIs?

  • By charging developers to access their APIs
  • By using APIs to track customer shipments
  • By allowing developers to access their data for free
  • By developing new products and services internally
17

Which is a benefit of cloud security over traditional on-premises security?

  • Having physical access to hardware.
  • Increased scalability.
  • Large upfront capital investment.
  • Only having to install security updates on a weekly basis.
18

Which cybersecurity threat occurs when errors arise during the setup of resources, inadvertently exposing sensitive data and systems to unauthorized access?

  • Configuration mishaps
  • Malware
  • Virus
  • Phishing
19

Which cloud security principle ensures that security practices and measures align with established standards and guidelines?

  • Compliance
  • Confidentiality
  • Control
  • Integrity
20

Which definition best describes a firewall?

  • A security model that assumes no user or device can be trusted by default
  • A set of security measures designed to protect a computer system or network from cyber attacks
  • A network security device that monitors and controls incoming and outgoing network traffic based on predefined security rules
  • A software program that encrypts data to make it unreadable to unauthorized users
21

Which is the responsibility of the cloud provider in a cloud security model?

  • Configuring the customer's applications.
  • Maintaining the customer's infrastructure.
  • Securing the customer's data.
  • Managing the customer's user access.
22

What common cybersecurity threat involves tricking users into revealing sensitive information or performing actions that compromise security?

  • Ransomware
  • Configuration mishap
  • Phishing
  • Malware
23

Which cloud security principle relates to keeping data accurate and trustworthy?

  • Control
  • Integrity
  • Confidentiality
  • Compliance
24

Which cybersecurity threat demands a ransom payment from a victim to regain access to their files and systems.

  • Ransomware
  • Virus
  • Spyware
  • Trojan
25

Which three essential aspects of cloud security form the foundation of the CIA triad?

  • Compliance, identity, and access management
  • Confidentiality, integrity, and availability
  • Certificates, intelligence, and authentication
  • Containers, infrastructure, and architecture
26

Which security principle advocates granting users only the access they need to perform their job responsibilities?

  • Privileged access
  • Least privilege
  • Security by default
  • Zero-trust architecture
27

Which is a powerful encryption algorithm trusted by governments and businesses worldwide?

  • Isomorphic encryption (IE)
  • Advanced Encryption Standard (AES)
  • Post-quantum cryptography (PQC)
  • Lattice-Based Cryptography (LBC)
28

Which practice involves a combination of processes and technologies that help reduce the risk of data breaches, system outages, and other security incidents in the cloud?

  • Site reliability engineering (SRE)
  • Zero trust security
  • Cloud security posture management (CSPM)
  • Security operations (SecOps)
29

What metric does Google Cloud use to measure the efficiency of its data centers to achieve cost savings and a reduced carbon footprint?

  • Total cost of ownership (TCO)
  • Power Usage Effectiveness (PUE)
  • Energy Efficiency Ratio (EER)
  • Data Center Infrastructure Efficiency (DCiE)
30

Google Cloud encrypts data at various states. Which state refers to when data is being actively processed by a computer?

  • Data at rest
  • Data in use
  • Data lake
  • Data in transit
31

Which aspect of cloud identity management verifies the identity of users or systems?

  • Authentication
  • Auditing
  • Accounting
  • Authorization
32

What security feature adds an extra layer of protection to cloud-based systems?

  • Data loss prevention (DLP)
  • Firewall as a service (FaaS)
  • Security information and event management (SIEM)
  • Two-step verification (2SV)
33

What Google Cloud product provides robust protection from harmful distributed denial-of-service (DDoS) attacks?

  • Cloud Monitoring
  • IAM
  • Google Cloud Armor
  • Cloud Load Balancing
34

Select the correct statement about Identity and Access Management (IAM).

  • IAM is a cloud security information and event management solution that collects and analyzes log data from cloud security devices and applications.
  • IAM provides granular control over who has access to Google Cloud resources and what they can do with those resources.
  • IAM is a cloud service that encrypts cloud-based data at rest and in transit.
  • IAM is a system that detects and prevents malicious traffic from entering a cloud network.
35

Which is one of Google Cloud’s seven trust principles?

  • We give "backdoor" access to government entities when requested.
  • Google Cloud uses customer data for advertising.
  • All customer data is encrypted by default.
  • Google sells customer data to third parties.
36

Where can you find details about certifications and compliance standards met by Google Cloud?

  • Cloud Storage client libraries
  • Google Cloud console
  • Marketplace
  • Compliance resource center
37

Which Google Cloud feature allows users to control their data's physical location?

  • Areas
  • Regions
  • Districts
  • Places
38

Which report provides a way for Google Cloud to share data about how the policies and actions of governments and corporations affect privacy, security, and access to information?

  • Compliance reports
  • Transparency reports
  • Billing reports
  • Security reports
39

Which term describes the concept that data is subject to the laws and regulations of the country where it resides?

  • Data redundancy
  • Data consistency
  • Data residency
  • Data sovereignty
40

Why is it a benefit that the Google Cloud resource hierarchy follows inheritance and propagation rules?

  • Permissions set at higher levels of the resource hierarchy are automatically inherited by lower-level resources.
  • Resources at lower levels can improve the performance of cloud applications.
  • Inheritance in the hierarchy reduces the overall cost of cloud computing.
  • Faster propagation can simplify a cloud migration.
41

Which Google Cloud tool lets you estimate how changes to cloud usage will affect costs?

  • Google Cloud Pricing Calculator
  • Cloud Trace
  • Cloud Billing
  • Cloud Monitoring
42

Which feature lets you set limits on the amount of resources that can be used by a project or user?

  • Committed use discounts
  • Billing reports
  • Invoicing limits
  • Quota policies
43

Which feature lets you set alerts for when cloud costs exceed a certain limit?

  • Budget threshold rules
  • Cost optimization recommendations
  • Billing reports
  • Cost forecasting
44

Which offers a reactive method to help you track and understand what you’ve already spent on Google Cloud resources and provide ways to help optimize your costs?

  • Google Cloud Pricing Calculator
  • Resource usage
  • Cost forecasting
  • Cloud billing reports
45

Which term describes a centralized hub within an organization composed of a partnership across finance, technology, and business functions?

  • Competency center
  • Center of innovation
  • Center of excellence
  • Hub center
46

Which represents the lowest level in the Google Cloud resource hierarchy?

  • Organization node
  • Projects
  • Folders
  • Resources
47

Which of these measures should be automated on a regular basis and stored in geographically separate locations to allow for rapid recovery from disasters or failures?

  • Backups
  • Security patches
  • Log files
  • Inventory data
48

Why is escalating a support ticket not always the best course of action when trying to resolve an issue?

  • It can result in increased power consumption, impacting carbon neutrality.
  • It can increase the monthly cost of support plans.
  • It may disrupt the workflow of the Customer Care team and lead to delays in other cases.
  • It may reduce the number of available virtual machines.
49

Which metric shows how well a system or service is performing?

  • Service level objectives
  • Service level indicators
  • Service level contracts
  • Service level agreements
50

One of the four golden signals is latency. What does latency measure?

  • How long it takes for a particular part of a system to return a result.
  • How close to capacity a system is.
  • How many requests reach a system.
  • System failures or other issues.
51

Google Cloud Observability provides a comprehensive set of monitoring, logging, and diagnostics tools. Which tool collects latency data from applications and provides insights into how they’re performing?

  • Cloud Trace
  • Cloud Monitoring
  • Cloud Profiler
  • Cloud Logging
52

Which Google Cloud Customer Care support level is designed for enterprises with critical workloads and features the fastest response time?

  • Standard Support
  • Enhanced Support
  • Basic Support
  • Premium Support
53

Whose job is to ensure the reliability, availability, and efficiency of software systems and services deployed in the cloud?

  • DevOps engineer
  • Cloud architect
  • Site reliability engineer
  • Cloud security engineer
54

What does the Cloud Profiler tool do?

  • It collects and stores all application and infrastructure logs.
  • It identifies how much CPU power, memory, and other resources an application uses.
  • It provides a comprehensive view of your cloud infrastructure and applications.
  • It counts, analyzes, and aggregates the crashes in running cloud services in real-time.
55

How does replication help the design of resilient and fault-tolerant infrastructure and processes in a cloud environment?

  • It scales infrastructure to handle varying workloads and accommodate increased demand.
  • It duplicates critical components or resources to provide backup alternatives.
  • It monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  • It creates multiple copies of data or services and distributes them across different servers or locations.