01. You are the data compliance officer for Mountkirk Games and must protect customers' personally identifiable information (PII). Mountkirk Games wants to make sure they can generate anonymized usage reports about their new game and delete PII data after a specific period of time. The solution should have minimal cost.
You need to ensure compliance while meeting business and technical requirements. What should you do?
a) Archive audit logs in Cloud Storage, and manually generate reports.
b) Write a Cloud Logging filter to export specific date ranges to Pub/Sub.
c) Archive audit logs in BigQuery, and generate reports using Google Data Studio.
d) Archive user logs on a locally attached persistent disk, and cat them to a text file for auditing.
02. Data engineers are transferring approximately 50 TB of data from Microsoft Azure to Google Cloud Cloud Storage. They would like to follow Google recommended practices. What data transfer method should they use?
a) Use Storage Transfer Service
b) Copy data with gsutil
c) Copy data with bq
d) Use Transfer Appliance
03. Mountkirk Games wants you to make sure their new gaming platform is being operated according to Google best practices. You want to verify that Google-recommended security best practices are being met while also providing the operations teams with the metrics they need.
What should you do?
(Choose two)
a) Ensure that you aren’t running privileged containers.
b) Ensure that you are using obfuscated Tags on workloads.
c) Ensure that you are using the native logging mechanisms.
d) Ensure that workloads are not using securityContext to run as a group.
e) Ensure that each cluster is running GKE metering so each team can be charged for their usage.
04. You need to implement Virtual Private Cloud (VPC) Service Controls for Mountkirk Games. Mountkirk Games wants to allow Cloud Shell usage by its developers. Developers should not have full access to managed services. You need to balance these conflicting goals with Mountkirk Games’ business requirements.
What should you do?
a) Use VPC Service Controls for the entire platform.
b) Prioritize VPC Service Controls implementation over Cloud Shell usage for the entire platform.
c) Include all developers in an access level associated with the service perimeter, and allow them to use Cloud Shell.
d) Create a service perimeter around only the projects that handle sensitive data, and do not grant your developers access to it.
05. Your new game running on Google Cloud is in public beta, and you want to design meaningful service level objectives (SLOs) before the game becomes generally available. What should you do?
a) Define one SLO as 99.9% game server availability. Define the other SLO as less than 100-ms latency.
b) Define one SLO as service availability that is the same as Google Cloud's availability. Define the other SLO as 100-ms latency.
c) Define one SLO as 99% HTTP requests return the 2xx status code. Define the other SLO as 99% requests return within 100 ms.
d) Define one SLO as total uptime of the game server within a week. Define the other SLO as the mean response time of all HTTP requests that are less than 100 ms.
06. HRL wants you to help them bring existing recorded video content to new fans in emerging regions. Considering the HRL business and technical requirements, what should you do?
a) Serve the video content directly from a multi-region Cloud Storage bucket.
b) Use Cloud CDN to cache the video content from HRL’s existing public cloud provider.
c) Use Apigee Edge to cache the video content from HRL’s existing public cloud provider.
d) Replicate the video content in Google Kubernetes Engine clusters in regions close to the fans.
07. Your organization has a 3-tier web application deployed in the same Google Cloud Virtual Private Cloud (VPC). Each tier (web, API, and database) scales independently of the others. Network traffic should flow through the web to the API tier, and then on to the database tier. Traffic should not flow between the web and the database tier.
How should you configure the network with minimal steps?
a) Add each tier to a different subnetwork.
b) Set up software-based firewalls on individual VMs.
c) Add tags to each tier and set up routes to allow the desired traffic flow.
d) Add tags to each tier and set up firewall rules to allow the desired traffic flow.
08. Your company wants to try out the cloud with low risk. They want to archive approximately 100 TB of their log data to the cloud and test the serverless analytics features available to them there, while also retaining that data as a long-term disaster recovery backup.
Which two steps should they take?
(Choose two)
a) Load logs into Cloud SQL.
b) Load logs into BigQuery.
c) Import logs into Cloud Logging.
d) Insert logs into Cloud Bigtable.
e) Upload log files into Cloud Storage.
09. You are designing a large distributed application with 30 microservices. Each of your distributed microservices needs to connect to a database backend. You want to store the credentials securely.
Where should you store the credentials?
a) In the source code
b) In an environment variable
c) In a key management system
d) In a config file that has restricted access through ACLs
e) In a secret management system
10. You are the data compliance officer for TerramEarth and must protect customers' personally identifiable information (PII), like credit card information. TerramEarth wants to personalize product recommendations for its large industrial customers. You need to respect data privacy and deliver a solution.
What should you do?
a) Use AutoML to provide data to the recommendation service.
b) Use the Cloud Data Loss Prevention (DLP) API to provide data to the recommendation service.
c) Process PII data on-premises to keep the private information more secure.
d) Manually build, train, and test machine learning models to provide product recommendations anonymously.