1
|
What open source platform, originally developed by Google, manages containerized workloads and services?
|
|
2
|
What phrase refers to when a workload is rehosted without changing anything in the workload's code or architecture.
|
|
3
|
A travel company is in the early stages of developing a new application and wants to test it on a variety of configurations: different operating systems, processors, and storage options. What cloud computing option should they use?
|
- Virtual machine instances
- A local development environment
|
4
|
What portion of a machine does a container virtualize?
|
- Hardware layers above the electrical level
- Software layers above the firmware level
- Software layers above the operating system level
|
5
|
A manufacturing company is considering shifting their on-premises infrastructure to the cloud, but are concerned that access to their data and applications won’t be available when they need them. They want to ensure that if one data center goes down, another will be available to prevent any disruption of service. What does this refer to?
|
|
6
|
What computing option automatically provisions resources, like compute power, in the background as needed?
|
- PaaS (platform as a service)
- IaaS (infrastructure as a service)
- Traditional on-premises computing
|
7
|
What term is commonly used to describe a rehost migration strategy for an organization that runs specialized legacy applications that aren’t compatible with cloud-native applications?
|
|
8
|
Which is a fully managed cloud infrastructure solution that lets organizations run their Oracle workloads on dedicated servers in the cloud?
|
- Google Cloud VMware Engine
- SQL Server on Google Cloud
|
9
|
In modern cloud application development, what name is given to independently deployable, scalable, and maintainable components that can be used to build a wide range of applications?
|
|
10
|
In modern application development, which is responsible for the day-to-day management of cloud-based infrastructure, such as patching, upgrades, and monitoring?
|
|
11
|
What term describes a set of instructions that lets different software programs communicate with each other?
|
- Communication link interface
- Network programming interface
- Application programming interface
- Programming communication link
|
12
|
What name is given to an environment that comprises some combination of on-premises or private cloud infrastructure and public cloud services?
|
|
13
|
What is the name of Google Cloud's API management service that can operate APIs with enhanced scale, security, and automation?
|
|
14
|
What’s the name of Google Cloud’s production-ready platform for running Kuberenetes applications across multiple cloud environments?
|
|
15
|
What name is given to an environment where an organization uses more than one public cloud provider as part of its architecture?
|
|
16
|
What is one way that organizations can create new revenue streams through APIs?
|
- By charging developers to access their APIs
- By using APIs to track customer shipments
- By allowing developers to access their data for free
- By developing new products and services internally
|
17
|
Which is a benefit of cloud security over traditional on-premises security?
|
- Having physical access to hardware.
- Large upfront capital investment.
- Only having to install security updates on a weekly basis.
|
18
|
Which cybersecurity threat occurs when errors arise during the setup of resources, inadvertently exposing sensitive data and systems to unauthorized access?
|
|
19
|
Which cloud security principle ensures that security practices and measures align with established standards and guidelines?
|
|
20
|
Which definition best describes a firewall?
|
- A security model that assumes no user or device can be trusted by default
- A set of security measures designed to protect a computer system or network from cyber attacks
- A network security device that monitors and controls incoming and outgoing network traffic based on predefined security rules
- A software program that encrypts data to make it unreadable to unauthorized users
|
21
|
Which is the responsibility of the cloud provider in a cloud security model?
|
- Configuring the customer's applications.
- Maintaining the customer's infrastructure.
- Securing the customer's data.
- Managing the customer's user access.
|
22
|
What common cybersecurity threat involves tricking users into revealing sensitive information or performing actions that compromise security?
|
|
23
|
Which cloud security principle relates to keeping data accurate and trustworthy?
|
|
24
|
Which cybersecurity threat demands a ransom payment from a victim to regain access to their files and systems.
|
|
25
|
Which three essential aspects of cloud security form the foundation of the CIA triad?
|
- Compliance, identity, and access management
- Confidentiality, integrity, and availability
- Certificates, intelligence, and authentication
- Containers, infrastructure, and architecture
|
26
|
Which security principle advocates granting users only the access they need to perform their job responsibilities?
|
|
27
|
Which is a powerful encryption algorithm trusted by governments and businesses worldwide?
|
- Isomorphic encryption (IE)
- Advanced Encryption Standard (AES)
- Post-quantum cryptography (PQC)
- Lattice-Based Cryptography (LBC)
|
28
|
Which practice involves a combination of processes and technologies that help reduce the risk of data breaches, system outages, and other security incidents in the cloud?
|
- Site reliability engineering (SRE)
- Cloud security posture management (CSPM)
- Security operations (SecOps)
|
29
|
What metric does Google Cloud use to measure the efficiency of its data centers to achieve cost savings and a reduced carbon footprint?
|
- Total cost of ownership (TCO)
- Power Usage Effectiveness (PUE)
- Energy Efficiency Ratio (EER)
- Data Center Infrastructure Efficiency (DCiE)
|
30
|
Google Cloud encrypts data at various states. Which state refers to when data is being actively processed by a computer?
|
|
31
|
Which aspect of cloud identity management verifies the identity of users or systems?
|
|
32
|
What security feature adds an extra layer of protection to cloud-based systems?
|
- Data loss prevention (DLP)
- Firewall as a service (FaaS)
- Security information and event management (SIEM)
- Two-step verification (2SV)
|
33
|
What Google Cloud product provides robust protection from harmful distributed denial-of-service (DDoS) attacks?
|
|
34
|
Select the correct statement about Identity and Access Management (IAM).
|
- IAM is a cloud security information and event management solution that collects and analyzes log data from cloud security devices and applications.
- IAM provides granular control over who has access to Google Cloud resources and what they can do with those resources.
- IAM is a cloud service that encrypts cloud-based data at rest and in transit.
- IAM is a system that detects and prevents malicious traffic from entering a cloud network.
|
35
|
Which is one of Google Cloud’s seven trust principles?
|
- We give "backdoor" access to government entities when requested.
- Google Cloud uses customer data for advertising.
- All customer data is encrypted by default.
- Google sells customer data to third parties.
|
36
|
Where can you find details about certifications and compliance standards met by Google Cloud?
|
- Cloud Storage client libraries
- Compliance resource center
|
37
|
Which Google Cloud feature allows users to control their data's physical location?
|
|
38
|
Which report provides a way for Google Cloud to share data about how the policies and actions of governments and corporations affect privacy, security, and access to information?
|
|
39
|
Which term describes the concept that data is subject to the laws and regulations of the country where it resides?
|
|
40
|
Why is it a benefit that the Google Cloud resource hierarchy follows inheritance and propagation rules?
|
- Permissions set at higher levels of the resource hierarchy are automatically inherited by lower-level resources.
- Resources at lower levels can improve the performance of cloud applications.
- Inheritance in the hierarchy reduces the overall cost of cloud computing.
- Faster propagation can simplify a cloud migration.
|
41
|
Which Google Cloud tool lets you estimate how changes to cloud usage will affect costs?
|
- Google Cloud Pricing Calculator
|
42
|
Which feature lets you set limits on the amount of resources that can be used by a project or user?
|
|
43
|
Which feature lets you set alerts for when cloud costs exceed a certain limit?
|
- Cost optimization recommendations
|
44
|
Which offers a reactive method to help you track and understand what you’ve already spent on Google Cloud resources and provide ways to help optimize your costs?
|
- Google Cloud Pricing Calculator
|
45
|
Which term describes a centralized hub within an organization composed of a partnership across finance, technology, and business functions?
|
|
46
|
Which represents the lowest level in the Google Cloud resource hierarchy?
|
|
47
|
Which of these measures should be automated on a regular basis and stored in geographically separate locations to allow for rapid recovery from disasters or failures?
|
|
48
|
Why is escalating a support ticket not always the best course of action when trying to resolve an issue?
|
- It can result in increased power consumption, impacting carbon neutrality.
- It can increase the monthly cost of support plans.
- It may disrupt the workflow of the Customer Care team and lead to delays in other cases.
- It may reduce the number of available virtual machines.
|
49
|
Which metric shows how well a system or service is performing?
|
|
50
|
One of the four golden signals is latency. What does latency measure?
|
- How long it takes for a particular part of a system to return a result.
- How close to capacity a system is.
- How many requests reach a system.
- System failures or other issues.
|
51
|
Google Cloud Observability provides a comprehensive set of monitoring, logging, and diagnostics tools. Which tool collects latency data from applications and provides insights into how they’re performing?
|
|
52
|
Which Google Cloud Customer Care support level is designed for enterprises with critical workloads and features the fastest response time?
|
|
53
|
Whose job is to ensure the reliability, availability, and efficiency of software systems and services deployed in the cloud?
|
- Site reliability engineer
|
54
|
What does the Cloud Profiler tool do?
|
- It collects and stores all application and infrastructure logs.
- It identifies how much CPU power, memory, and other resources an application uses.
- It provides a comprehensive view of your cloud infrastructure and applications.
- It counts, analyzes, and aggregates the crashes in running cloud services in real-time.
|
55
|
How does replication help the design of resilient and fault-tolerant infrastructure and processes in a cloud environment?
|
- It scales infrastructure to handle varying workloads and accommodate increased demand.
- It duplicates critical components or resources to provide backup alternatives.
- It monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- It creates multiple copies of data or services and distributes them across different servers or locations.
|