Month End Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Professional-Cloud-Developer Exam Dumps - Google Certified Professional - Cloud Developer

Go to page:
Question # 9

You made a typo in a low-level Linux configuration file that prevents your Compute Engine instance from booting to a normal run level. You just created the Compute Engine instance today and have done no other maintenance on it, other than tweaking files. How should you correct this error?

A.

Download the file using scp, change the file, and then upload the modified version

B.

Configure and log in to the Compute Engine instance through SSH, and change the file

C.

Configure and log in to the Compute Engine instance through the serial port, and change the file

D.

Configure and log in to the Compute Engine instance using a remote desktop client, and change the file

Full Access
Question # 10

You are developing a corporate tool on Compute Engine for the finance department, which needs to authenticate users and verify that they are in the finance department. All company employees use G Suite.

What should you do?

A.

Enable Cloud Identity-Aware Proxy on the HTTP(s) load balancer and restrict access to a Google Group containing users in the finance department. Verify the provided JSON Web Token within the application.

B.

Enable Cloud Identity-Aware Proxy on the HTTP(s) load balancer and restrict access to a Google Group containing users in the finance department. Issue client-side certificates to everybody in the finance team and verify the certificates in the application.

C.

Configure Cloud Armor Security Policies to restrict access to only corporate IP address ranges. Verify the provided JSON Web Token within the application.

D.

Configure Cloud Armor Security Policies to restrict access to only corporate IP address ranges. Issue client side certificates to everybody in the finance team and verify the certificates in the application.

Full Access
Question # 11

You recently migrated an on-premises monolithic application to a microservices application on Google Kubernetes Engine (GKE). The application has dependencies on backend services on-premises, including a CRM system and a MySQL database that contains personally identifiable information (PII). The backend services must remain on-premises to meet regulatory requirements.

You established a Cloud VPN connection between your on-premises data center and Google Cloud. You notice that some requests from your microservices application on GKE to the backend services are failing due to latency issues caused by fluctuating bandwidth, which is causing the application to crash. How should you address the latency issues?

A.

Use Memorystore to cache frequently accessed PII data from the on-premises MySQL database

B.

Use Istio to create a service mesh that includes the microservices on GKE and the on-premises services

C.

Increase the number of Cloud VPN tunnels for the connection between Google Cloud and the on-premises services

D.

Decrease the network layer packet size by decreasing the Maximum Transmission Unit (MTU) value from its default value on Cloud VPN

Full Access
Question # 12

Your application is deployed in a Google Kubernetes Engine (GKE) cluster. You want to expose this application publicly behind a Cloud Load Balancing HTTP(S) load balancer. What should you do?

A.

Configure a GKE Ingress resource.

B.

Configure a GKE Service resource.

C.

Configure a GKE Ingress resource with type: LoadBalancer.

D.

Configure a GKE Service resource with type: LoadBalancer.

Full Access
Question # 13

You are working on a new application that is deployed on Cloud Run and uses Cloud Functions Each time new features are added, new Cloud Functions and Cloud Run services are deployed You use ENV variables to keep track of the services and enable interservice communication but the maintenance of the ENV variables has become difficult. You want to implement dynamic discovery in a scalable way. What should you do?

A.

Create a Service Directory Namespace Use API calls to register the services during deployment, and query during runtime.

B.

Configure your microservices to use the Cloud Run Admin and Cloud Functions APIs to query for deployed Cloud Run services and Cloud Functions in the Google Cloud project.

C.

Deploy Hashicorp Consul on a single Compute Engine Instance Register the services with Consul during deployment and query during runtime

D.

Rename the Cloud Functions and Cloud Run services endpoints using a well-documented naming

convention

Full Access
Question # 14

You need to containerize a web application that will be hosted on Google Cloud behind a global load balancer with SSL certificates. You don't have the time to develop authentication at the application level, and you want to offload SSL encryption and management from your application. You want to configure the architecture using managed services where possible What should you do?

A.

Host the application on Compute Engine, and configure Cloud Endpoints for your application.

B.

Host the application on Google Kubernetes Engine and use Identity-Aware Proxy (IAP) with Cloud Load Balancing and Google-managed certificates.

C.

Host the application on Google Kubernetes Engine, and deploy an NGINX Ingress Controller to handle authentication.

D.

Host the application on Google Kubernetes Engine, and deploy cert-manager to manage SSL certificates.

Full Access
Question # 15

Your security team is auditing all deployed applications running in Google Kubernetes Engine. After completing the audit, your team discovers that some of the applications send traffic within the cluster in clear text. You need to ensure that all application traffic is encrypted as quickly as possible while minimizing changes to your applications and maintaining support from Google. What should you do?

A.

Use Network Policies to block traffic between applications.

B.

Install Istio, enable proxy injection on your application namespace, and then enable mTLS.

C.

Define Trusted Network ranges within the application, and configure the applications to allow traffic only from those networks.

D.

Use an automated process to request SSL Certificates for your applications from Let’s Encrypt and add them to your applications.

Full Access
Question # 16

You are developing an application that will allow users to read and post comments on news articles. You want to configure your application to store and display user-submitted comments using Firestore. How should you design the schema to support an unknown number of comments and articles?

A.

Store each comment in a subcollection of the article.

B.

Add each comment to an array property on the article.

C.

Store each comment in a document, and add the comment’s key to an array property on the article.

D.

Store each comment in a document, and add the comment’s key to an array property on the user profile.

Full Access
Go to page: