Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Google Professional-Cloud-DevOps-Engineer - Google Cloud Certified - Professional Cloud DevOps Engineer Exam

As part of your company's initiative to shift left on security, the infoSec team is asking all teams to implement guard rails on all the Google Kubernetes Engine (GKE) clusters to only allow the deployment of trusted and approved images You need to determine how to satisfy the InfoSec teams goal of shifting left on security. What should you do?

A.

Deploy Falco or Twistlock on GKE to monitor for vulnerabilities on your running Pods

B.

Configure Identity and Access Management (1AM) policies to create a least privilege model on your GKE clusters

C.

Use Binary Authorization to attest images during your CI CD pipeline

D.

Enable Container Analysis in Artifact Registry, and check for common vulnerabilities and exposures (CVEs) in your container images

You recently migrated an ecommerce application to Google Cloud. You now need to prepare the application for the upcoming peak traffic season. You want to follow Google-recommended practices. What should you do first to prepare for the busy season?

A.

Migrate the application to Cloud Run, and use autoscaling.

B.

Load test the application to profile its performance for scaling.

C.

Create a Terraform configuration for the application's underlying infrastructure to quickly deploy to additional regions.

D.

Pre-provision the additional compute power that was used last season, and expect growth.

You manage a critical, user-facing application and have configured a service level objective (SLO) in Cloud Monitoring to track 99% availability over a 30-day rolling window. Recently, a series of minor issues have increased latency, causing the error budget to be consumed at an accelerated rate. You need to be proactively notified when the service is at risk of violating its SLO before the error budget is fully depleted. What should you do?

A.

In Cloud Monitoring, create an alerting policy based on the SLO's error budget burn rate. Configure the alert to trigger when the current consumption rate is projected to exhaust the budget before the end of the 30-day compliance period.

B.

Create a custom dashboard in Cloud Monitoring that visualizes the SLO compliance percentage and the remaining error budget. Configure the dashboard to send a scheduled daily report through email.

C.

Configure a log-based metric in Cloud Monitoring that tracks the rate of application error logs. Create an alerting policy on this metric that triggers when the error rate shows a significant anomalous deviation from its historical baseline.

D.

In Metrics Explorer, create an alerting policy based on the average request latency for the application's load balancer. Configure the alert to trigger if latency exceeds a predefined threshold.

You support a trading application written in Python and hosted on App Engine flexible environment. You want to customize the error information being sent to Stackdriver Error Reporting. What should you do?

A.

Install the Stackdriver Error Reporting library for Python, and then run your code on a Compute Engine VM.

B.

Install the Stackdriver Error Reporting library for Python, and then run your code on Google Kubernetes Engine.

C.

Install the Stackdriver Error Reporting library for Python, and then run your code on App Engine flexible environment.

D.

Use the Stackdriver Error Reporting API to write errors from your application to ReportedErrorEvent, and then generate log entries with properly formatted error messages in Stackdriver Logging.

You need to create a Cloud Monitoring SLO for a service that will be published soon. You want to verify that requests to the service will be addressed in fewer than 300 ms at least 90% Of the time per calendar month. You need to identify the metric and evaluation method to use. What should you do?

A.

Select a latency metric for a request-based method of evaluation.

B.

Select a latency metric for a window-based method of evaluation.

C.

Select an availability metric for a request-based method of evaluation.

D.

Select an availability metric for a window-based method Of evaluation.

You need to introduce postmortems into your organization. You want to ensure that the postmortem process is well received. What should you do?

Choose 2 answers

A.

Create a designated team that is responsible for conducting all postmortems.

B.

Encourage new employees to conduct postmortems to learn through practice.

C.

Ensure that writing effective postmortems is a rewarded and celebrated practice.

D.

Encourage your senior leadership to acknowledge and participate in postmortems.

E.

Provide your organization with a forum to critique previous postmortems.

You are creating Cloud Logging sinks to export log entries from Cloud Logging to BigQuery for future analysis Your organization has a Google Cloud folder named Dev that contains development projects and a folder named Prod that contains production projects Log entries for development projects must be exported to dev_dataset. and log entries for production projects must be exported to prod_datasetYou need to minimize the number of log sinks created and you want to ensure that the log sinks apply to future projects What should you do?

A.

Create a single aggregated log sink at the organization level.

B.

Create a log sink in each project

C.

Create two aggregated log sinks at the organization level, and filter by project ID

D.

Create an aggregated Iog sink in the Dev and Prod folders

Your organization recently adopted a container-based workflow for application development. Your team develops numerous applications that are deployed continuously through an automated build pipeline to a Kubernetes cluster in the production environment. The security auditor is concerned that developers or operators could circumvent automated testing and push code changes to production without approval. What should you do to enforce approvals?

A.

Configure the build system with protected branches that require pull request approval.

B.

Use an Admission Controller to verify that incoming requests originate from approved sources.

C.

Leverage Kubernetes Role-Based Access Control (RBAC) to restrict access to only approved users.

D.

Enable binary authorization inside the Kubernetes cluster and configure the build pipeline as an attestor.

Your company follows Site Reliability Engineering practices. You are the person in charge of Communications for a large, ongoing incident affecting your customer-facing applications. There is still no estimated time for a resolution of the outage. You are receiving emails from internal stakeholders who want updates on the outage, as well as emails from customers who want to know what is happening. You want to efficiently provide updates to everyone affected by the outage. What should you do?

A.

Focus on responding to internal stakeholders at least every 30 minutes. Commit to "next update" times.

B.

Provide periodic updates to all stakeholders in a timely manner. Commit to a "next update" time in all communications.

C.

Delegate the responding to internal stakeholder emails to another member of the Incident Response Team. Focus on providing responses directly to customers.

D.

Provide all internal stakeholder emails to the Incident Commander, and allow them to manage internal communications. Focus on providing responses directly to customers.

You need to enforce several constraint templates across your Google Kubernetes Engine (GKE) clusters. The constraints include policy parameters, such as restricting the Kubernetes API. You must ensure that the policy parameters are stored in a GitHub repository and automatically applied when changes occur. What should you do?  

A.

Set up a GitHub action to trigger Cloud Build when there is a parameter change. In Cloud Build, run a gcloud CLI command to apply the change.

B.

When there is a change in GitHub, use a webhook to send a request to Cloud Service Mesh, and apply the change.

C.

Configure Config Sync with the GitHub repository. When there is a change in the repository, use Config Sync to apply the change.

D.

Configure Config Connector with the GitHub repository. When there is a change in the repository, use Config Connector to apply the change.