Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Google Cloud DevOps Engineer Professional-Cloud-DevOps-Engineer Questions and answers with CertsForce

Viewing page 3 out of 6 pages
Viewing questions 21-30 out of questions
Questions # 21:

You are running an experiment to see whether your users like a new feature of a web application. Shortly after deploying the feature as a canary release, you receive a spike in the number of 500 errors sent to users, and your monitoring reports show increased latency. You want to quickly minimize the negative impact on users. What should you do first?

Options:

A.

Roll back the experimental canary release.


B.

Start monitoring latency, traffic, errors, and saturation.


C.

Record data for the postmortem document of the incident.


D.

Trace the origin of 500 errors and the root cause of increased latency.


Expert Solution
Questions # 22:

You support a popular mobile game application deployed on Google Kubernetes Engine (GKE) across several Google Cloud regions. Each region has multiple Kubernetes clusters. You receive a report that none of the users in a specific region can connect to the application. You want to resolve the incident while following Site Reliability Engineering practices. What should you do first?

Options:

A.

Reroute the user traffic from the affected region to other regions that don’t report issues.


B.

Use Stackdriver Monitoring to check for a spike in CPU or memory usage for the affected region.


C.

Add an extra node pool that consists of high memory and high CPU machine type instances to the cluster.


D.

Use Stackdriver Logging to filter on the clusters in the affected region, and inspect error messages in the logs.


Expert Solution
Questions # 23:

You are ready to deploy a new feature of a web-based application to production. You want to use Google Kubernetes Engine (GKE) to perform a phased rollout to half of the web server pods.

What should you do?

Options:

A.

Use a partitioned rolling update.


B.

Use Node taints with NoExecute.


C.

Use a replica set in the deployment specification.


D.

Use a stateful set with parallel pod management policy.


Expert Solution
Questions # 24:

You use Artifact Registry to store container images built with Cloud Build. You need to ensure that all existing and new images are continuously scanned for vulnerabilities. You also want to track who pushed each image to the registry. What should you do?

Options:

A.

Configure Artifact Registry to automatically trigger vulnerability scans for new image tags, and view scan results. Use Cloud Audit Logs to track image tag creation events.


B.

Configure Artifact Registry to automatically scan new images and periodically re-scan all images. Use Cloud Audit Logs to track image uploads and identify the user who pushed each image.


C.

Configure Artifact Registry to automatically re-scan images daily. Enable Cloud Audit Logs to track these scans, and use Logs Explorer to identify vulnerabilities.


D.

Configure Artifact Registry to send vulnerability scan results to a Cloud Storage bucket. Use a separate script to parse results and notify a security team.


Expert Solution
Questions # 25:

You work for a company that manages highly sensitive user data. You are designing the Google Kubernetes Engine (GKE) infrastructure for your company, including several applications that will be deployed in development and production environments. Your design must protect data from unauthorized access from other applications while minimizing the amount of management overhead required. What should you do?

Options:

A.

Create one cluster for the organization with separate namespaces for each application and environment combination.


B.

Create one cluster for each environment (development and production) with each application in its own namespace within each cluster.


C.

Create one cluster for the organization with separate namespaces for each application.


D.

Create one cluster for each application with separate namespaces for production and development environments.


Expert Solution
Questions # 26:

Your company stores a large volume of infrequently used data in Cloud Storage. The projects in your company's CustomerService folder access Cloud Storage frequently, but store very little data. You want to enable Data Access audit logging across the company to identify data usage patterns. You need to exclude the CustomerService folder projects from Data Access audit logging. What should you do?

Options:

A.

Enable Data Access audit logging for Cloud Storage for all projects and folders, and configure exempted principals to include users of the CustomerService folder.


B.

Enable Data Access audit logging for Cloud Storage at the organization level, with no additional configuration.


C.

Enable Data Access audit logging for Cloud Storage at the organization level, and configure exempted principals to include users of the CustomerService folder.


D.

Enable Data Access audit logging for Cloud Storage for all projects and folders other than the CustomerService folder.


Expert Solution
Questions # 27:

You encounter a large number of outages in the production systems you support. You receive alerts for all the outages that wake you up at night. The alerts are due to unhealthy systems that are automatically restarted within a minute. You want to set up a process that would prevent staff burnout while following Site Reliability Engineering practices. What should you do?

Options:

A.

Eliminate unactionable alerts.


B.

Create an incident report for each of the alerts.


C.

Distribute the alerts to engineers in different time zones.


D.

Redefine the related Service Level Objective so that the error budget is not exhausted.


Expert Solution
Questions # 28:

Your team is preparing to launch a new API in Cloud Run. The API uses an OpenTelemetry agent to send distributed tracing data to Cloud Trace to monitor the time each request takes. The team has noticed inconsistent trace collection. You need to resolve the issue. What should you do?

Options:

A.

Increase the CPU limit in Cloud Run from 2 to 4.


B.

Use an HTTP health check.


C.

Configure CPU to be allocated only during request processing.


D.

Configure CPU to be always-allocated.


Expert Solution
Questions # 29:

Your company runs an e-commerce business. The application responsible for payment processing has structured JSON logging with the following schema:

Capture and access of logs from the payment processing application is mandatory for operations, but the jsonPayload.user_email field contains personally identifiable information (PII). Your security team does not want the entire engineering team to have access to PII. You need to stop exposing PII to the engineering team and restrict access to security team members only. What should you do?

Options:

A.

Apply a jsonPayload.user_email exclusion filter to the _Default bucket.


B.

Apply the conditional role binding resource.name.extract("locations/global/buckets/(bucket)/") == "_Default" to the _Default bucket.


C.

Apply a jsonPayload.user_email restricted field to the _Default bucket. Grant the Log Field Accessor role to the security team members.


D.

Modify the application to toggle inclusion of user_email when the log_user_email environment variable is set to true. Restrict the engineering team members who can change the production environment variable by using the CODEOWNERS file.


Expert Solution
Questions # 30:

Your company wants to implement a CD pipeline in Cloud Deploy for a web service deployed to GKE. The web service currently does not have any automated testing. The Quality Assurance team must manually verify any new releases of the web service before any production traffic is processed. You need to design the CD pipeline. What should you do?

Options:

A.

Create two pipeline stages, and use a canary deployment strategy.


B.

Create a single pipeline stage, and use a standard deployment strategy.


C.

Create a single pipeline stage, and use a canary deployment strategy.


D.

Create two pipeline stages, and use a standard deployment strategy.


Expert Solution
Viewing page 3 out of 6 pages
Viewing questions 21-30 out of questions