Arcade Lesson Quiz Answer Quicklab
Arcade Lesson Quiz Answer Quicklab
Select
four.
- Name
- Price
- ChangeTimestamp
- Address
What steps must you take when designing the data for your app? Select three.
- Determine the tables to use and the column structure that will store data in each
table.
- Determine the relationships between the tables in your app.
- Determine the key column that will provide a unique identity for each row in the
table.
What are some characteristics of app column formulas and initial value expressions
in AppSheet? Select 3.
- An app column formula is used to update the value in a table column whenever a
change is made to that table’s data via a form in the app.
- An app user can edit a table column’s value with an initial value expression.
- The initial value expression of a table column is not re-computed after that
column’s value is updated by the app user.
A key is a column whose value provides a unique identity for each row in the table.
What types of keys are used in tables in AppSheet apps? Select three.
- Natural keys
- System generated keys
- Row number keys
Which of the statements regarding offline app access are correct? Select three.
- As the app creator, you can enable the app user to control when the app syncs
data between the device and the backend.
- AppSheet apps can be used on a mobile device even when that device is offline and
disconnected from the network.
- For offline access to work, the app must initially be launched on the device when
it is online.
What does the update mode of a table or slice in AppSheet allow an app creator to
do?
- Control whether an app user can update, add, or delete data rows in a table or
slice.
To control individual user access to an AppSheet app, what should an app creator
do? Select three options.
- Create a list of allowed users or email domains.
- Select an authentication provider.
- Enable the Require user signin option.
Access mode refers to the identity that AppSheet uses when it communicates with the
cloud provider to access the sheets and tables used by your app. What are the two
access modes used by AppSheet?
- App User
- App Creator
To invoke the AppSheet API, which items must the calling application send in the
request? Select four.
- Application ID
- Content-Type
- ApplicationAccessKey
- Table name
Which AppSheet components are required to create a webhook for an app? Select four.
- Process
- Event
- Bot
- Task
What can the AppSheet API be used for? Select three options.
- The AppSheet API can be used to invoke a predefined action on an app.
- The AppSheet API enables an external application to access the data used by an
AppSheet app.
- The AppSheet API can be used to read, update, add, and delete rows from a table
used by the app.
What actions are performed when data is fetched and stored via an app in AppSheet?
Select three.
- The app running on the user’s device fetches data from the AppSheet backend
server.
- The AppSheet backend server fetches the data from the cloud provider.
- The app stores the data on the user’s device.
AppSheet enables team collaboration for app development. What steps should you take
to create a team and co-author an app with other team members? Select three.
- Create a team, and then invite members to create their AppSheet accounts and join
the team.
- Share the app with other team members, and assign appropriate app permissions.
- Create and use a team-shared data source.
What steps should you take to upgrade an app to a new major version in AppSheet?
Select three.
- Make a copy of the app to be upgraded, and name it appropriately.
- In the AppSheet editor, upgrade the app from the copy, and create a new major
version of the app.
- Implement any changes in a copy of the app, test the copy, and deploy it.
What are the purposes of the stable version of an app in AppSheet? Select three.
- It can be used to control the rollout of future app versions.
- It can be used to assign specific app users to that version of the app.
- It allows an app creator to continue making and saving minor changes to an app
without affecting users that use the stable version.
The stable version of an app is 1.000007, and its latest version is 1.000008. If
the setting to control the rollout of the latest version is set to 5 percent in the
AppSheet editor, which statement is correct for app users who are not already
assigned an app version?
- Five percent of app users are assigned app version 1.000008, and 95% are assigned
version 1.000007.
When the sync process attempts to update queued data changes from the app to the
AppSheet server, an error report might indicate that the changes cannot be applied
because the app definition (including table structure) has been changed on the
AppSheet server. What are two ways to resolve this issue?
- Use manual recovery.
- Use recovery mode.
What data- and access-related problems might be reported for your app in AppSheet?
Select three.
- A 401 authorization error is reported in AppSheet.
- The column structure in the app’s definition doesn’t match the underlying table.
- AppSheet cannot identify a table’s column headers.
An image does not load or display in the app. What is the likely cause of this
issue?
- The relative folder path to the image file is incorrectly specified in the app’s
table.
What CLI tool is used to create and manage Anthos clusters on bare metal?
- bmctl
What is the CLI tool used to create and manage Anthos clusters on bare metal?
- bmctl
Why does the Anthos on bare metal installer create a kind cluster?
- To reuse the software used to create and configure other clusters.
What component do we use to get cluster credentials so we can access the cluster
through Google Cloud?
- Anthos Connect Gateway
What command can you use to get the state of an Anthos on bare metal cluster, to
help diagnose cluster issues?
- bmctl check cluster –snapshot
System metrics and logs collected by Anthos clusters on bare metal are included
with the Anthos license.
- True
Which of the following Apigee entities are only scoped to a single environment?
- Caches
When a customer uses the hybrid deployment model, which part of the deployment
infrastructure is managed by Google?
- Only the management plane
For a REST API, which API request would best represent updating an existing
student?
- PUT /students/15
API-First development specifies that APIs should be designed and documented before
they are implemented. Why is API-First development a recommended practice? Select
two.
- API-First development increases the ability to do parallel development.
- API-First development allows issues to be found by technical and business
stakeholders earlier in the API lifecycle.
Which parts of a REST API request together typically represent the operation being
performed? Select two.
- The HTTP verb
- The path suffix
Which of the following combinations of proxy and target endpoints is not legal for
an API proxy?
- Zero proxy endpoints and one target endpoint
Which part of a proxy determines the target endpoint that will be used?
- Route rule
Which type of developer is configured in the Publish section of the Apigee console?
- App developer
Which of the following statements about API products are true? Select two.
- API products should be designed based on the needs of app developers.
- API products may be used to control access or service levels for APIs.
Which status code range indicates an error caused by an issue with the client's
request?
- 4XX
Which of the following conditions might cause a fault to be raised in an API proxy?
Select two.
- Executing a RaiseFault policy
- A 404 Not Found status code received from a service callout
Which of the following policies can be used to call an external REST API? Select
two.
- JavaScript policy
- ServiceCallout policy
Which policy can be used to validate that a request matches an approved pattern?
- OASValidation
Which of the following statements about shared flows are true? Select two.
- A shared flow attached to a flow hook will execute for all proxies in an
environment.
- A shared flow cannot be tested without calling it from an API proxy.
Which of the following statements about the ResponseCache policy are true? Select
two.
- In the ResponseCache policy, cache lookup should be skipped for requests used to
update data.
- When the API returns user data, a unique user identifier should always be used as
a cache key fragment.
Which of the following statements about the Quota policy are true? Select two.
- When Distributed is set to true in a Quota policy, message processors will share
counts for a given identifier.
- The Quota policy does not limit the rate at which requests can be received.
Which of the following statement about Apigee's analytics are correct? Select two.
- Analytics data can be exported to tools like BigQuery.
- Metrics captured using the DataCapture policy may be used in custom analytics
reports.
Which of the following are features of the Apigee Adapter for Envoy?
- Token validation and quota enforcement
Which of the following is a reason to select the hybrid cloud deployment option?
- The customer has strict requirements for running API traffic and hosting data
within their network boundaries.
Which of the following statements about CI/CD with Apigee are correct? Select two.
- Enterprise teams should use source control for proxy development.
- The Apigee API may be called from CI/CD toolchains to manage the API lifecycle.
Which phase of a machine learning project occurs before collecting and preparing
data?
- Assess whether a problem is right for machine learning.
You own a new local private transport service and want to use machine learning to
adjust the pricing of your service throughout the day instead of using a fixed-
pricing approach that does not change automatically. What data would a machine
learning model need in order to predict when to adjust transport pricing?
- The time of day and customer demand
You work for a graphic design software company that offers a 7-day trial of your
products to potential paying customers. You analyze why users convert their free
trial into a software purchase. You are curious whether machine learning can
predict which customers will convert their trial into a purchase and which users
might need additional persuasion. Assess the following use case against a two-
factor grid:“How could we use machine learning to predict whether a trial user will
convert to a paid purchase after using the software’s unique color editing tools?
- This use case is clear and challenging.
A franchise movie-rental store has decided to launch their own streaming rental
service to expand their presence in the online market. The stores are well known
for their in-depth and personalized recommendations by the store clerks. The CEO
wants the new rental streaming service to also provide relevant recommendations for
its customers. What data should be collected and used to provide the most accurate
customer recommendations in an online film and movie streaming service?
- A customer’s genre preferences and previous purchases
At a national energy provider company, the data analytics team has been suggesting
long-term energy pricing based on customer usage reports from each region. You are
the new manager of the data analytics team and want to introduce machine learning
into the analytics process for repeatability and scalability. What effect can
predictive insights using machine learning have on energy pricing in this use case?
- Machine learning can determine and adjust pricing in different regions instantly.
You work at a toy manufacturer that assembles action figures aimed at young
children. Due to manufacturing faults, unsafe parts regularly need to be removed
from the assembly line. How can machine learning scale the business intelligence
needed in this quality control situation?
- Machine learning makes repeated decisions on which parts to remove.
You own a model trained to predict life expectancy that was trained on data
collected from Norwegians. This model is successful in the Norwegian region;
however, when used in nearby Lithuania, performance declines considerably. What is
most likely the source of this issue?
- Data coverage
Machine learning has existed since the 1970s. However, there has been a surge in
usage across all industries only recently. As a manager, why might you choose to
introduce machine learning processes into your business now? Choose TWO answers.
- Machine learning algorithms are becoming more sophisticated and mature.
- The compute resources required for machine learning are more accessible.
You are a doctor at a small medical clinic studying the symptoms and effects of
common health conditions. You want to use machine learning to predict which of your
patients might have an increased probability of heart disease. However, you have a
limited dataset due to having fewer patients than a full-sized hospital. What would
be the preferred solution to identify patients with an increased probability of
heart disease using machine learning?
- Use existing data from a large nearby hospital as proxy data.
You work at a medical research facility that analyzes patient data for local
hospitals. You want to use machine learning for specialized image recognition in
order to identify bacterial infections in patients’ x-ray images. What is the
preferred method of obtaining a labeled dataset for this custom image recognition
use case?
- Use AutoML Vision to classify the x-ray images.
Input data in a machine learning model is often made of three parts, which are: the
features of an example, the resulting label, and the label type. How can the
‘features’ be defined in a machine learning context?
- The characteristics that give meaning to a piece of data
You are working on the data team at a global banking company. You are gathering a
wide variety of labeled data from different departments and locations for future
machine learning experiments. Before you can introduce the data to train the
machine learning model, what do you need to do?
- Prepare the data and store it in a single location.
You work at a car manufacturing company that is ready to deploy a machine learning
model. However, you want to evaluate the model first and decide to evaluate your
model with a small set of data. You cannot measure how accurate the model is on all
the original training data because it could memorize all answers and perform badly
after deployment. What is a reasonable percentage of the data to reserve when you
are evaluating the accuracy of a machine learning model?
- 10–25%
You work in the customer retention team at a bank and have noticed an increase in
customers leaving your service. To solve this problem, you use machine learning
with an objective to improve customer retention at your bank by personalizing
services and loans. What is the preferred optimization of your objective to improve
customer experience and retention at your bank?
- Provide offers based on customer spending behavior.
An organization wants to build a machine learning model that can recognize the
architectural style of a building, from a set of their own custom images of
buildings. Which Google ML product should the organization use for this use case?
- AutoML Vision, as this model is trained on your data set with your labels
You are the communications manager at a marketing company. Recently, you noticed an
increase in spam marketing emails disguised as popular brand emails that you want
to filter out of your inbox. You want to use machine learning to predict which
emails are spam and should be filtered. What are some possible features in this
machine learning use case to detect deceptive spam emails?
- Word sequence that is closer to those found in spam emails versus safe ones
You work at a mobile phone manufacturer and are preparing to launch the newest
version of your high-end phone. You want to analyze the battery efficiency of your
new phone against previous models. You have a backlog of historical data on
previous models and their results, but these datasets exist in silos separate from
the data for your new phone. How can you acquire a labeled dataset in this scenario
when datasets exist in separate silos?
- Use a data warehouse to join the datasets into one source.
You lead the marketing team for a startup accommodation booking website. You want
to provide users with personalized accommodation recommendations, but lack
sufficient historical labeled data of customer bookings to use as an exclusive data
source. Instead, you and your team have only been using user clicks and
accommodation viewings as a proxy for your entire dataset. What is the issue of
only using user clicks and accommodation viewings as your dataset that might lead
to few converted bookings?
- Customers might browse accommodations while having no intention of booking them.
A survey is delivered over the internet through links within ads that appear on the
homepage of popular newspapers' websites. The survey asks sensitive questions about
readers' health and medical history. It can be argued that selection bias exists in
this scenario. What justification is there for this reasoning?
- The ads might not be seen by older people who typically read physical newspapers.
Google has developed a set of AI principles that govern its research and product
development and impact its business decisions. One of the AI principles is to avoid
creating or reinforcing unfair biases. However, what should AI applications not do
according to Google’s AI principles?
- Breach human rights
A survey is delivered over the internet through links within ads that appear on the
homepage of popular newspapers' websites. The survey asks sensitive questions about
readers' health and medical history. What type of bias is caused by not stating
that surveyees might only include people who read the front page and not those who
might consume primarily sports-related news?
- Reporting bias
An owner of a national live sports TV channel has had ongoing success for 15+
years. Recently, the viewership on the channel has decreased due to viewers moving
to online streaming platforms. The owner finds data indicating social media
discussion for the sporting events on the channel is increasing every year, and
argues that viewers are very much still engaged. The owner uses this data to
justify the channel to advertisers who can buy advertisement time across the day.
In this scenario, what is an indisputable example of confirmation bias?
- The owner used social media discussion data as justification for viewer interest
in the channel.
You are a data collector at a movie review aggregation company that is aimed toward
family and children’s movies. As audience members are leaving the screening room at
the cinema, you survey their opinion of the movie on an alphabetical grading scale.
Your company only surveys audiences within the first week of a movie’s release and
then locks the grades. The aggregate grade is provided to film production companies
who want to improve future family and children’s films. In this scenario, what
would be an example of selection bias?
- Only the opinions of the initial audiences at a cinema are included in the grade.
Google has developed a set of AI principles that govern its research and product
development and affect its business decisions. One of the AI principles is to avoid
creating or reinforcing unfair bias. Why does a company need to adhere to a set of
agreed-upon standards when working with AI?
- How AI is developed and used will affect society.
You are a translation vendor manager who has been tasked by a publishing company to
translate historical Finnish texts. The translation is from Finnish, which has no
gender-distinctive pronouns, to English. To save time, your experienced Finnish
team decides to use a popular machine learning translation tool for longer texts
while they translate the shorter texts manually. In this scenario, where might you
expect an increased amplification of biases?
- The translation tool will amplify biases through its gender pronoun assumptions
in English.
You run a furniture store that accepts and sells used furniture. Until now, you
have asked traders and employees to inspect the items and judge the condition of
various parts. This information would be used to create a cost evaluation for the
item. However, this business process is time consuming and laborious and is prone
to oversights. How can you best use machine learning to automate the business
processes in this scenario?
- Train a machine learning model that can predict the cost of furniture based on
specific photos.
You work in a large technology company that has decided to create an app which uses
the cloud to provide users with photo and image storage. You want to use machine
learning to add features to the app such as search capabilities, automatic filters,
facial recognition, subject recognition, and automatic album creation. To create
such an app with these features would require many machine learning models working
together. Which machine learning models would you expect to be used to
automatically curate an album named “Cooking From Home”?
- Location detection and subject image recognition
You manage a website that provides users with personalized fashion and style
advice. You do this through a machine learning model that is given a user’s style
preferences, and the algorithm recommends clothing available from various websites.
You receive a percentage of the sale if a customer decides to purchase the items.
What are the benefits of personalization in machine learning in this use case?
- It allows the system to provide more valuable services and scalability.
Machine learning is becoming more affordable for businesses of all sizes. However,
it can be tempting to use only one machine learning model in your business to save
on costs, time, and maintenance. Why is it a good idea to divide a large machine
learning use case into smaller use cases and then build separate models for each
case?
- Combining multiple small models is more powerful than using one model to do
everything.
You are the manager of a startup energy provider. You have a variety of
unstructured and structured data from your customers that you want to organize,
including correspondence emails, customer zip codes, phone numbers, average energy
consumption information, and copies of letters sent to customers. How can
unstructured data be defined?
- Data that cannot be easily stored or queried in a relational database
You run a machine learning project at a startup gaming app development business.
You want to improve the user experience of your games and increase the sales of
microtransactions. The business has some data that they can use to train a machine
learning model but not enough to create the accurate results you want. How can you
enrich and improve your existing dataset before training your machine learning
model?
- Join your existing data with third-party data.
You work at an international sales organization and are planning a machine learning
project. You are in the process of gathering and organizing customer data but have
discovered that it is traditionally stored in offices around the world. You have
contacted the global offices, which are willing to share their data with you but
have no method of doing so. What is the best solution you could suggest that will
help gather data for your project and also for other projects and processes in the
future?
- Convert data to digital formats and place customer data into one database.
You work in a company that is using legacy systems for data storage. Your current
business processes occur slowly and rely on sharing data. You want to implement
data lake modernization and make better use of data warehouses, but first you need
to convince your teams and machine learning engineers to support this change. What
current problems might teams and machine learning engineers experience while using
traditional data storage solutions?
- Inseparable combination of compute and storage
Organizations that are successful with ML, often have a solid strategy around their
data. Select the answer that is aligned with a best practice and pillar of a
successful data strategy?
- Design systems that will produce more data next year, so that your ML models can
improve over time.
You manage a large e-commerce store with various departments that use sensitive
customer data to improve business efficiency and processes. A customer can store
their payment card details for faster online checkout. Also, the last 4 digits of a
payment card are used to confirm a customer’s identity if they need to contact the
customer service team. What technique can be used to protect payment card details
when the customer service team needs to confirm a customer’s identity?
- Redact all but the last 4 digits of a customer’s payment card details from the
system.
Organizations can use innovation principles to create a culture that organically
encourage teams to generate bigger ideas and to think differently about problem
solving with the capabilities of machine learning. Which of the following
principles will help foster a culture of innovation?
- By focusing on the user, you can identify the most essential problems to solve
and create more value
You have convinced the decision makers at your small business to allow a pilot
machine learning project. The leaders have provided a reasonable, but not high,
budget for the project. Also, they do not want to spend too much of the employees’
time, which might affect the core business. The team you have formed is excited
about the project but currently lacks the skills needed for the pilot. How can you
best garner the expertise needed for the machine learning project?
- Up-skill your current team using online learning platforms.
How does Cloud Data Fusion help you accelerate time to insight?
- It pulls data into data warehouses, data lakes, and data marts on Google Cloud.
Your organization is implementing new machine learning processes. How can you use
your data as you’re building out these processes?
- Share your data to break silos and enable data-driven decision making.
You’re organizing your resources in Google Cloud, and you need to allocate
resources and set up billings. What should you use?
- A project.
The data of your organization has already been processed and stored, and you’re
ready to start analyzing the data. Which tool should you use?
- BigQuery
You have enabled BigQuery and need to set up a dataset that is region specific.
What should you do?
- Import your dataset and specify the location in the project.
What is an exchange?
- A collection of dataset listings for sharing and discovery.
How does Google Cloud ensure that data is shared securely and inexpensively?
- Centralized governance and security.
Which Analytics Hub role creates data assets and publishes exchanges?
- Publisher
You need a data storage solution for a Business Intelligence application. Which
data storage solution should you use?
- A Data Warehouse
You need to unify distributed data to help automate data management. Which Google
Cloud tool should you use?
- Dataplex
Lakehouse merges:
- BigQuery and data.
What are some features and benefits of using Cloud Functions? Select four. Cloud
Functions:
- Are triggered by HTTP requests and events from Cloud Services.
- Supports seamless authentication with IAM.
- Can be integrated with Cloud databases.
- Can be locally developed and tested.
Which of these statements about Cloud Functions are correct? Select three. Cloud
Functions:
- Can be used to extend Cloud services.
- Is integrated with Cloud Logging.
- Is a scalable functions-as-a-service platform.
Which of these statements about Cloud Functions triggers are correct? Select three.
- Triggers are specified during function deployment.
- Multiple functions can be triggered by the same trigger source settings.
- An event trigger reacts to cloud events.
Cloud Functions uses IAM to authorize the requesting identity. Which predefined IAM
roles are used by Cloud Functions? Select four.
- Cloud Functions Admin
- Cloud Functions Invoker
- Cloud Functions Viewer
- Cloud Functions Developer
To limit access to Cloud Functions, what methods can you use? Select two.
- Use identity-based access controls.
- Use network-based access controls.
Which network setting allows Cloud Functions to route all outbound traffic from a
function through a VPC network?
- Egress setting to route all traffic through a Serverless VPC connector.
Which statements about triggering Cloud Functions from Firestore database events
are correct? Select two.
- A function can be triggered when a Firestore document is created, updated, or
deleted.
- To trigger a function, you must specify an event type and the document path.
Which three statements about using environment variables with Cloud Functions are
correct? Environment variables:
- Are key-value pairs that are accessed by the function code at runtime.
- Can be stored in a YAML file, whose filename can be provided during function
deployment.
- Are provided during function deployment.
What are three best practices to use when implementing IAM policies for Cloud
Functions?
- Limit the number of user and service accounts that can access the function.
- Ensure that a function sends requests only to a subset of your other functions
that are needed to perform its job.
- Allocate the minimum set of permissions required to develop and use your
functions.
To optimize networking for your cloud function, which two approaches should you
use?
- Persistent HTTP connections.
- Serverless VPC Access connectors to connect your cloud function to project
resources.
Which two statements about retrying of Cloud Functions are correct? Function retry:
- Can be enabled or disabled in Google Cloud console or with the gcloud CLI.
- If enabled, causes the function to be retried on failure for up to 7 days.
To improve the performance of your cloud function, what are three best practices to
follow?
- Set a minimum number of instances when deploying your function.
- In your function code, reuse objects with global variables.
- Remove any unused dependencies from the function source.
Why might a Google Cloud customer use resources in several zones within a region?
- For improved fault tolerance
Which one of the following statements is true regarding the ability to scale cloud
computing resources up and down?
- CPU, memory, and storage resources are elastic.
What cloud computing service binds application code to libraries that give access
to the infrastructure an application needs?
- Platform as a service
Who benefits the most from billing by the second for cloud resources, such as
virtual machines?
- Customers who create and run many virtual machines
What cloud computing service provides raw compute, storage, and network resources
that are organized similarly to physical data centers?
- Infrastructure as a service
Which statement best describes how Google Cloud resources are associated within the
resource hierarchy?
- All Google Cloud resources are associated with a project.
How does the resource hierarchy control how IAM policies are inherited?
- IAM policies that are implemented by lower-level policies can override the
policies defined at a higher level.
What is the difference between Identity and Access Management (IAM) basic roles and
IAM predefined roles?
- Basic roles affect all resources in a Google Cloud project. Predefined roles
apply to a specific service in a project.
Select the option that displays IAM roles from general to specific.
- Basic roles, predefined roles, custom roles
Which way of accessing Google Cloud lets you control services through the code you
write?
- APIs
Your company has two Google Cloud projects and you want them to share policies.
What is the least error-prone way to set this up?
- Place both projects into a folder, and define the policies on that folder.
A Google Cloud customer wants to load-balance traffic among the backend VMs that
form part of a multi-tier application. Which load-balancing option should this
customer choose?
- The regional internal load balancer
Which statement best describes how VPC routers and firewalls work?
- They are managed by Google as a built-in feature.
Select the true statement about Google’s VPC networks and subnets.
- Networks are global, and subnets are regional.
Preemptible VMs can offer advantages over a standard Compute Engine VM. What is a
reason customers choose preemptible VMs?
- To reduce cost
Your application needs to store data with strong transactional consistency, and you
want seamless scaling up. Which storage option is the best choice for your
application?
- Cloud Spanner
You manufacture devices with sensors and need to stream huge amounts of data from
these devices to a storage option in the cloud. Which storage option is the best
choice for your application?
- Bigtable
How do you keep your Kubernetes version updated in Google Kubernetes Engine?
- The Google Kubernetes Engine team periodically performs automatic upgrades of
your cluster to newer stable versions.
How do containers access an operating system?
- Containers use a shared base operating system stored in a shared kernel layer.
Anthos provides a rich set of tools for monitoring and maintaining the consistency
of your applications across which of the following locations?
- Applications hosted on-premises, in the cloud, or in multiple clouds.
Where do the resources used to build Google Kubernetes Engine clusters come from?
- Compute Engine
Which Google Cloud service should you choose to perform business analytics and
billing on a customer-facing API?
- Apigee Edge
App Engine is best suited to the development and hosting of which type of
application?
- A web application
What are the advantages of using App Engine’s flexible environment instead of its
standard environment? (Select 3).
- You can install third-party binaries.
- You can use SSH to connect to the virtual machines on which your application
runs.
- Your application can write to the local disk.
Select the managed compute platform that lets you run stateless containers through
web requests or Pub/Sub events.
- Cloud Run
Why would a developer choose to store source code in Cloud Source Repositories?
(Select 2)
- To keep code private to a Google Cloud project
- To reduce work
You want to create alerts on your Google Cloud resources, such as when health
checks fail. Which is the best Google Cloud product to use?
- Cloud Monitoring
There are “Four Golden Signals” that measure a system’s performance and
reliability. What are they?
- Latency, traffic, saturation, errors
Which option describes a commitment made to your customers that your systems and
applications will have only a certain amount of “downtime”?
- Service level agreement
What is a benefit of using Google Earth Engine for imagery with large amounts of
cloud cover?
- Imagery can be compressed into a cloud free mosaic.
The Earth Engine Data Catalog includes which of the following data types?
- All of the Above
You must analyze soil moisture over time, not just during a single season. What can
you use to accomplish this in Google Earth Engine?
- A time series
In the Google Earth Engine code editor, what can you adjust to enhance a
composite’s image quality?
- The date filter, to gather more imagery and pixel data.
What is a benefit of using Google Earth Engine for research purposes in the Public
Sector?
- Earth Engine is free for all research purposes.
Google Earth Engine integrates with which product?
- Vertex AI
How long does it take for an image to go from a satellite to Earth Engine?
- 12 hours
Which of the following statements about Cloud Build are correct? Select two.
- In addition to Cloud Source Repositories, Cloud Build integrates with different
source code repositories such as GitHub, Bitbucket, and GitLab.
- With Cloud Build, you can continuously build, test, and deploy your application
on Google Cloud.
Which of the following statements about Buildpacks are correct? Select three.
- When processing a source directory, a builder executes two phases of a buildpack:
the detect phase and the build phase.
- Google Cloud’s buildpacks are built into Cloud Run.
- Buildpacks are a way to turn your application source code into a container image
without writing a Dockerfile.
What are three best practices to use when working with containers or container
images?
- Launch the container process with the CMD or ENTRYPOINT instruction in your
Dockerfile.
- Scan your container images for software vulnerabilities.
- Remove unnecessary files and tools from the container image.
Which of the following statements about using Docker are correct? Select three.
- A multi-stage build is used to create optimized and secure container images.
- A Dockerfile contains a set of instructions that is used to build a container
image.
- Dockerfiles provide a powerful, and flexible mechanism to create container
images.
Which of the following statements about Kubernetes and Google Kubernetes Engine are
correct? Select three.
- A Kubernetes cluster consists of a control plane and machines called nodes.
- Google Kubernetes Engine is a fully managed Kubernetes service that runs on
Google Cloud.
- In Kubernetes, you can create and configure various kinds of resources in the API
either imperatively or declaratively.
From which of these container registries can Cloud Run pull container images?
Select three.
- Docker Hub
- Artifact Registry
- Container Registry
Which of the following statements about Cloud Run are correct? Select three.
- You can use Cloud Run to execute scheduled tasks or jobs.
- Cloud Run runs and autoscales containers on-demand.
- To deploy your container to Cloud Run, you can use the Google Cloud console,
gcloud CLI, YAML configuration file, or Terraform.
What are some benefits of no-code application development platforms? Select two.
- Improved security and compliance
- Faster time to deployment
After connecting a data source to your app, what is one of the first steps you
should take to build the app?
- Define the column types of the data and how the data will be used by the app.
AppSheet lets you connect spreadsheets as data sources for use with your app. What
are two best practices for using spreadsheets with AppSheet?
- Ensure that the data type format is the same for each cell in a column.
- Name your spreadsheet columns appropriately using a header row.
As you build and customize your app, which is the quickest and easiest way to test
it?
- Use the live app preview feature in the AppSheet editor.
How can you start creating an app in AppSheet? (Select two methods)
- Copy an existing template.
- Start by configuring a data source for the app.
Which statements about the key column of a table that is used in AppSheet are
correct? (Select 2)
- The value in a key column uniquely identifies each row in the table.
- Any table used in AppSheet must define a key column.
AppSheet provides various types of views. Which type of view displays data in a
scrollable list format?
- Deck
What options do creators have to position views for user navigation in the app?
Select two.
- In the app’s main menu
- Use the navigation bar at the bottom of the app’s screen.
Which view type can you enable to give new users a sequence of information about
your app?
- Onboarding
What are the two kinds of app deployment methods supported by AppSheet? (Select 2)
- Instant deployment
- Traditional deployment
What is one of the first steps that you should perform before making your app
available to end users?
- Run a deployment check on the app.
Which statements regarding the sharing of apps with end users are correct? (Select
2)
- You can enable users to share the app using the in-app share button.
- You can use the Share icon in the AppSheet UI to add users to the app.
You have an application that uses Oracle as the backend database. The application
currently takes snapshots of the Oracle tables every 1,000 entries and keeps the
snapshots for 72 hours. You need to convert the backend database of the application
to BigQuery and want to use the most efficient method to meet the same data
retention level. What should you do?
- Use BigQuery's time travel window.
What is one of the main reasons BigQuery can scale effectively to store and query
large datasets?
- Storage and compute are handled separately and automatically scale to match
consumption.
Which two statements about BigQuery resources are true? (Choose two.)
- A BigQuery slot is a combination of CPU, memory, and networking resources.
- BigQuery is optimized for high-read data.
In Oracle, tables are organized into schemas within a database. How does this
compare with the data resource hierarchy in BigQuery?
- In BigQuery, tables are stored within datasets.
You work on Project A. You need to run a query on BigQuery datasets stored in
Project B, which is another project in your organization. Where will the query
charges be billed?
- To Project A
Your application uses Oracle as the backend database. You have a database-level
account to perform the backend tasks for the application including creating tables
and views, performing queries, and deleting tables. You want to migrate the backend
database of your application to BigQuery and provision an account to perform the
same tasks by using Google best practices. What should you do?
- In Google Cloud’s Identify and Access Management (IAM), create a service account
for the application; in BigQuery, assign it the role of BigQuery data editor on the
specific datasets.
You want to follow Google-recommended practices to limit the rows of all tables in
your dataset for a specific access group in your organization. What should you do?
- Create a separate dataset as an authorized dataset based on the original source
dataset.
Oracle can ingest streaming data by using Oracle Cloud Infrastructure (OCI)
Streaming. How does BigQuery ingest streaming data?
- BigQuery can ingest streaming data by using the BigQuery Storage Write API.
You want to automate the loading of external third-party data into BigQuery on a
scheduled basis without writing any code. Which ingestion option can you use to
automatically load external data without writing code?
- BigQuery Data Transfer Service
You are loading multiple CSV and JSON files into BigQuery and want to optimize for
load speed. Which Google best practice can help to optimize load speed?
- Load uncompressed CSV and JSON files.
You are coming from a row-based system and want to migrate your table schemas to
BigQuery. Which best practice can help you optimize your table schemas in BigQuery?
- Identify columns that can be used to partition and cluster your data.
In Oracle, indexes are applied as optimization techniques and can be created using
primary and foreign keys or other columns in a table. How are indexes applied
differently in BigQuery?
- BigQuery offers optional indexes such as search indexes on the columns defined in
the table schema.
Which type of statements supported by Google Standard SQL allows you to execute
multiple SQL statements in one request?
- Procedural language statements
You have an application that currently uses Oracle as the SQL backend. The
application uses data aggregation queries to provide approximate summary values to
users. You want to migrate from Oracle to BigQuery, and leverage the efficient data
aggregation queries. What should you do?
- Use data sketches in BigQuery.
You need to explore a non-clustered table in BigQuery that has a billion rows.
Which option is a cost-effective Google best practice to review a sample of the
data?
- Use table preview options in BigQuery to view data.
You have an application that uses Redshift as the backend database. The application
currently takes snapshots of the Redshift tables every 1,000 entries and keeps the
snapshots for 72 hours. You need to convert the backend database of the application
to BigQuery and want to use the most efficient method to meet the same data
retention level. What should you do?
- Use BigQuery's time travel window.
In Redshift, tables are organized within schemas. How does this compare with the
data resource hierarchy in BigQuery?
- In BigQuery, tables are stored within datasets.
Your application uses Redshift as the backend database. You have a database-level
account to perform the backend tasks for the application including creating tables
and views, performing queries, and deleting tables. You want to migrate the backend
database of your application to BigQuery and provision an account to perform the
same tasks by using Google best practices. What should you do?
- In Google Cloud’s Identify and Access Management (IAM), create a service account
for the application; in BigQuery, assign it the role of BigQuery data editor on the
specific datasets.
Redshift can ingest streaming data by using Amazon Kinesis or Amazon-managed Apache
Kafka. How does BigQuery ingest streaming data?
- BigQuery can ingest streaming data by using the BigQuery Storage Write API.
You have an application that currently uses Redshift as the SQL backend. The
application uses data aggregation queries to provide approximate summary values to
users. You want to migrate from Redshift to BigQuery, and leverage the efficient
data aggregation queries. What should you do?
- Use data sketches in BigQuery.
You have an application that uses Snowflake as the backend database. The
application currently takes snapshots of the Snowflake tables every 1,000 entries
and keeps the snapshots for 72 hours. You need to convert the backend database of
the application to BigQuery and want to use the most efficient method to meet the
same data retention level. What should you do?
- Use BigQuery's time travel window.
In Snowflake, tables are organized into schemas within a database. How does this
compare with the data resource hierarchy in BigQuery?
- In BigQuery, tables are stored within datasets.
Your application uses Snowflake as the backend database. You have a database-level
account to perform the backend tasks for the application including creating tables
and views, performing queries, and deleting tables. You want to migrate the backend
database of your application to BigQuery and provision an account to perform the
same tasks by using Google best practices. What should you do?
- In Google Cloud’s Identify and Access Management (IAM), create a service account
for the application; in BigQuery, assign it the role of BigQuery data editor on the
specific datasets.
Snowflake can ingest streaming data by using the Snowpipe Streaming API. How does
BigQuery ingest streaming data?
- BigQuery can ingest streaming data by using the BigQuery Storage Write API.
You have an application that currently uses Snowflake as the SQL backend. The
application uses data aggregation queries to provide approximate summary values to
users. You want to migrate from Snowflake to BigQuery, and leverage the efficient
data aggregation queries. What should you do?
- Use data sketches in BigQuery.
You have an application that uses Teradata as the backend database. The application
currently takes snapshots of the Teradata tables every 1,000 entries and keeps the
snapshots for 72 hours. You need to convert the backend database of the application
to BigQuery and want to use the most efficient method to meet the same data
retention level. What should you do?
- Use BigQuery's time travel window.
In Teradata, tables are stored in a database within a warehouse. How does this
compare with the data resource hierarchy in BigQuery?
- In BigQuery, tables are stored within datasets.
Your application uses Teradata as the backend database. You have a database-level
account to perform the backend tasks for the application including creating tables
and views, performing queries, and deleting tables. You want to migrate the backend
database of your application to BigQuery and provision an account to perform the
same tasks by using Google best practices. What should you do?
- In Google Cloud’s Identify and Access Management (IAM), create a service account
for the application; in BigQuery, assign it the role of BigQuery data editor on the
specific datasets.
Teradata can ingest streaming data by using Teradata Parallel Transporter (TPT)
Stream. How does BigQuery ingest streaming data?
- BigQuery can ingest streaming data by using the BigQuery Storage Write API.
You have an application that currently uses Teradata as the SQL backend. The
application uses data aggregation queries to provide approximate summary values to
users. You want to migrate from Teradata to BigQuery, and leverage the efficient
data aggregation queries. What should you do?
- Use data sketches in BigQuery.
Which types of managed services are used to modernize retail and ecommerce
applications?
- All of the above
What statement does NOT describe the larger retail modernization landscape?
- Ecommerce was a trend during the pandemic, but is no longer a relevant avenue for
consumer shopping experiences.
What statement does NOT describe Google Cloud’s benefits to cloud practitioners in
the retail and ecommerce industry?
- Google Cloud gives cloud practitioners a small set of managed services for
modernizing real and ecommerce applications.
What answer does NOT describe the value of Google Cloud in the retail industry?
- Google Cloud provides many disconnected services that retailers can use
individually to accelerate their digital transformation.
What does NOT describe Google Cloud’s mission in the retail industry?
- Google Cloud helps retailers deliver their ecommerce goods.
You’re deploying an application for high availability and have created web servers
in multiple zones in a region. What should you do for the database to also be
highly available?
- Create a failover replica in another zone.
You have a microservice responsible for managing customer accounts and orders.
Strong consistency, ACID transactions, and strong schemas are all important. What
type of database would you use?
- Relational
What are some things you should do when migrating an enterprise database to the
cloud?
- All of the options.
You’ve been hired to help a customer with their migration to the cloud. They have a
heavy investment in Oracle and want to move their existing Oracle databases to
Google Cloud. What is your advice to them?
- Run Oracle using Bare Metal Solution.
'You are creating an application to sell to customers. Customers will run it on the
public cloud of their choice - either Google Cloud, Azure, or AWS. Some customers
may even want to run the application on-premises. What would be the best deployment
choice for the database?'
- Kubernetes.
You have a SQL Server database running on a Windows server on-premises. You want to
move it to the cloud as quickly as possible with minimal changes, and the database
must continue to run on a Windows server. You should run the database using which
service below?
- Compute Engine.
Your company needs to move a large Oracle database to Google Cloud. There are many
clients, some of which are customer-facing, core business services. Minimizing
downtime is extremely important. What migration strategy would you recommend?
- Use a data access service and replication.
You’ve completed the migration of a large monolithic application and its database
to Google Cloud. The database included web session management data, which you’ve
decided to move to a separate microservice. Which managed database service would be
easiest and cheapest to use to store the session data?
- Firestore.
You need to move your WordPress site to Google Cloud. It uses a LAMP stack on a
single machine, and some downtime is OK. What migration strategy would you
recommend?
- Lift and shift.
Your DBA wants to securely connect to databases in a private Google Cloud VPC. You
want to allow them to directly connect from their workstation in their office using
their Windows workstation. What should you do?
- Set up a VPN between their network and the VPC.
Why would you use Terraform instead of the Google Cloud Console to create network
infrastructure?
- All of the options.
You’ve created two Google Cloud VPCs:a public one for web servers and database
clients, and a private one for the databases. You want to connect them to allow
communication via private IP addresses. Which should you use?
- VPC Peering.
Your company wants to move a large SQL Server database to Google Cloud. They
currently run Enterprise edition with a failover cluster, and they want to
replicate the database across multiple regions. They also want to integrate with
their Active Directory for authentication. What would you recommend?
- Deploy SQL Server using Compute Engine.
What is an advantage of Cloud SQL over Compute Engine for running SQL Server
databases?
- Automatic storage increases.
You want to download a patch from your Oracle bare metal server and you can’t
access the internet. What is likely the solution?
- Set up a NAT gateway in your peered VPC network.
How do you connect to your Oracle database servers running in Bare Metal Solution?
- Connect using SSH from a Jump Server running in your peered network.
What is an advantage of running Oracle on Bare Metal Solution over a managed cloud
platform like AWS RDS?
- All of the options.
You want to automate a recurring job that runs every night. The job needs to
extract data from an on-premises database, copy it to Cloud Storage, then run a
Dataflow job to transform the data and load it into BigQuery. Which would be best?
- Cloud Composer.
Your company needs to upload about 500 TB of data to upload to Google Cloud
Storage. Which data transfer service would you recommend?
- Transfer Appliance.
What would be a good criterion for deciding on the best candidate application for
moving to the cloud first?
- All of the options.
Which is considered the best strategy for moving to the cloud?
- It depends on the application.
What are the key components used to create automation in AppSheet? Select four.
- Event
- Bot
- Step
- Process
What are some patterns or use cases where you can use AppSheet’s automation
capabilities? Select three.
- Human “in the loop”
- Data change
- Notifications and information sharing
What are some types of steps available in AppSheet automation? Select four.
- Run a task
- Wait
- Branch on a condition
- Run a data action
What can you monitor with the AppSheet automation monitor app? Select three.
- Bot runs
- Bot metrics
- Document parses
Which statements on integrating Apps Script with AppSheet are correct? Select two.
- Collect data from multiple sources with Apps Script, and use AppSheet to interact
with that data.
- Trigger Apps Script workflows in Google Workspace from AppSheet.
What are some categories of automation tasks available in AppSheet? Select three.
- Send an SMS.
- Call a webhook.
- Send a notification.
A bot that is triggered by an update to a table row in an AppSheet app can access
the value that each column had before and after it is updated. Which two variables
can be used to access the value in a column before and after the update?
- <<[_THISROW_AFTER].[Column Name]>>
- <<[_THISROW_BEFORE].[Column Name]>>
What are the requirements to receive push notifications from AppSheet? Select
three.
- The user must have signed in to an AppSheet app with the same email address that
is configured in the notification task.
- The app must be deployed.
- The user email address must be translated to an AppSheet user ID.
What types of documents can be parsed with AppSheet Document AI? Select three.
- Invoice documents
- W-9 forms
- Receipt documents
Which statements on embedded app view emails in AppSheet are correct? Select two.
- Dynamic content in embedded app view emails is interactive for a period of 30
days.
- Only Gmail is supported.
Sasha checked the VPC flow logs and observed that traffic ingresses and egresses
through a load balancer. Sasha wants egress traffic to bypass the load balancer.
What can they do?
- Create a new cluster using Dataplane V2, and deploy your applications to the new
cluster.
- Create an external passthrough Network Load Balancer for use with your Ingress.
(Choose all that apply) For a cluster in autopilot mode, you can set:
- The node subnet
- The service address range
- Network tags
(Choose all that apply) Which statements about GKE standard mode clusters are true?
- An Alias IP range is used to assign IP addresses to pods.
- Standard mode clusters support more pods than autopilot mode.
The Anthos Service Mesh control plane interacts with the Envoy proxies to
- Configure them on pod creation.
Which CLI tool is used to install and manage Anthos Service Mesh?
- asmcli
Wasm plugins can be used to send telemetry to external backend such as Cloud
Monitoring.
- True
You need to disguise pod addresses in an autopilot mode cluster. What can you do?
- Configure a GKE NAT ingress policy.
(Choose all that apply) To use Cloud NAT with GKE, you
- Create firewall policies as needed.
- Create a NAT configuration using Cloud Router.
- Enables Cloud NAT on the cluster VPC network.
Your autopilot mode cluster has run out of IP addresses. What can you do?
- Add secondary IP ranges to the cluster.
Which of the following best describes the ideal use cases for setting up a budget?
Select the two correct options.
- To monitor resource consumption at specific intervals before the end of the
billing cycle (e.g., at 25%, 50%, etc.).
- To receive an email alert notification for when your costs hit, or are forecasted
to hit, a specified amount.
Which of the following is not a usage-based credit type that you can filter your
billing data by? Select the correct answer.
- Tax reductions issued by Google Cloud for using cloud resources.
A budget can only be set for _______________ and configured to cover the scope of
_____________ and/or ________________. Fill in the blanks by selecting the correct
answer.
- A single billing account, projects, products
You run a query for the fifth time in BigQuery, and you receive the following error
message - 'Custom quota exceeded: Your usage exceeded the custom quota for
QueryUsagePerUserPerDay, which is set by your administrator.' What does this
message mean? Select all that apply.
- Only your project administrator can adjust the quota limit.
- The limit will be reset the following day.
- You’ve exceeded the limit on the amount of queries that you can run for the day.
In AWS, you have an admin user, Tamara, who manages the organization with an
attached policy that allows all IAM actions on all resources within the
organization. How would you grant similar permissions in Google Cloud?
- Add Tamara to an admin group that is assigned the
roles/resourcemanager.organizationAdmin on the organization.
The AWS resource hierarchy uses organizational units to organize accounts, which
then contain resources. How would you create a similar hierarchy in Google Cloud?
- Folders, projects, resources
In AWS, you have been using AWS CloudShell for writing and running bash scripts to
manage your AWS resources without setting up credentials and installing packages on
the multiple local machines you use. You need to reimplement your scripts in Google
Cloud. Which similar tool could you use?
- Cloud Shell
In your current AWS environment, you have an IAM role and instance profiles set up
for use by a web application to access other services and resources. You need to
set up the equivalent environment in Google. Which type of identity should you use
in Google Cloud?
- Google Cloud IAM service account
What is the key difference and similarity in the scope of AWS VPCs and Google VPC
networks?
- AWS VPCs are regional and contain Availability Zone subnets; Google Cloud VPCs
are global and contain regional subnets.
Which service in Google Cloud enables you to connect two VPC networks from
different organizations?
- VPC Peering
You have an AWS EC2 instance without an external IP address assigned, but that
connects to AWS services and APIs through an AWS NAT Gateway. You want to configure
a similar scenario with a Compute Engine VM. What should you do?
- Use Google APIs and services by enabling Private Google Access on the subnet used
by the VM's network interface.
You have an AWS security group that is set up on a VPC, and then associated with
instances. You want to replicate this environment in Google Cloud. What technology
should you choose?
- Google firewall rules defined at the network level
You want to connect to Google Workspace and YouTube, but your organization cannot
meet Google’s peering requirements. What network connection service should you
choose?
- Carrier Peering
Why might a Google Cloud customer choose to use Cloud Source Repositories?
- They don't want to host their own git instance, and they want to integrate with
IAM permissions.
What is the advantage of using Cloud Functions for event-driven components of your
application?
- Cloud Functions handles scaling these components seamlessly.
You use AWS Elastic Beanstalk to autoscale your container application in response
to HTTP traffiC: What service in Google Cloud provides you similar compute
functionality? What is one of the key differences about AWS Elastic Beanstalk and
Cloud Run?
- AWS Elastic Beanstalk requires the user to configure scaling targets.
In AWS, you use Amazon CloudWatch to define alarms that notify you when health
checks on your AWS resources fail. Which product can you use in Google Cloud to
define similar alerts for your Google Cloud resources?
- Cloud Monitoring
AWS X-Ray lets you report on latency to manage performance of your AWS
applications. What Google Cloud service can you use to report on latency for your
applications in Google Cloud?
- Cloud Trace
You need to take your existing Amazon EC2 launch templates and reimplement them for
a Google Cloud solution. Which Google Cloud tool can you use?
- Instance Templates
You have been asked to train a junior team member who is familiar with AWS in the
lifecycle of a Google Cloud virtual machine (VM). How can you describe the
equivalent of the Amazon EC2 instance shutting-down state in Google Cloud?
- Terminating
You currently store data from Amazon EC2 instances in an EBS volume with automated
snapshots providing availability across availability zones. You need to reimplement
this scenario using Google Compute Engine. What should you use?
- Regional persistent disks
You need to create virtual machines that are optimized for high-end remote
visualization, deep learning, and predictive analytics. What machine family in
Compute Engine should you use?
- A2 series
You have a Virtual Machine that is running data pipeline batch Extract, Transform,
and Load (ETL) jobs. If the VM fails, the ETL package should gracefully recover the
data pipeline and it will restart at the point of failure. You want to choose the
most cost-effective solution in Google Cloud. What should you do?
- Use a Spot VM to deliver the batch data pipeline job.
Which Google Cloud load balancing services support IPv6 clients? (Choose two).
- Global HTTP(S) load balancing
- SSL proxy load balancing
You need to set up a load balancer that operates at layer 4 of the Open Systems
Interconnection (OSI) model. The load balancer needs to handle SSL layer traffic.
What option should you choose in Google Cloud?
- External SSL Proxy Load Balancing
You need to automatically create virtual machines (VMs) in Google Cloud when demand
increases for your application and delete VMs when demand drops. You want to have
the VMs grouped together for convenient management. What should you use?
- A managed instance group with autoscaling enabled
Your organization uses AWS Application Load Balancer to load balance between your
servers in a region at the application layer. You need to implement similar load
balancing functionality in Google Cloud. What technology should you use?
- Application Capacity Optimizations with Global Load Balancing
In your AWS environment, you are using Amazon Athena, AWS Glue DataBrew, and Amazon
S3 to analyze structured and unstructured data. You need to set up a data lake
environment using Google Cloud. As part of this requirement, you have opted to
choose a low-code, no code solution similar to AWS Glue DataBrew. Which option can
you use to load data?
- Cloud Data Fusion
In your AWS environment, you have set up an AWS RDS database. To authorize
connections, you have set up VPC security groups. You have been asked to set up a
Cloud SQL database of an equivalent size. You want to use a Google-recommended
method to authorize connections in a Cloud SQL database. What should you do?
- Use VPC firewalls.
You have a requirement to serve media files. Which is the best storage option?
- Cloud Storage
Which of the following is one of the key differences between an S3 bucket and cloud
storage?
- Amazon S3 lets users tag individual objects with key-value pairs
How do Pods within the same node communicate with one another?
- Through the node networking namespace
In Amazon Elastic Kubernetes Service, a cluster has at least one node which is an
EC2 instance. In Google Cloud, where do the compute resources come from that are
used to build Google Kubernetes Engine clusters?
- Compute Engine
You use Azure Container Apps to autoscale your application in response to HTTP
traffic. What service in Google Cloud provides you similar serverless compute
functionality?
- Cloud Run
In Azure, you use Azure Monitor to define alerts that notify you when health checks
on your Azure resources fail. Which product can you use in Google Cloud to define
similar alerts for your Google Cloud resources?
- Cloud Monitoring
Azure Application Insights lets you report on latency to manage performance of your
Azure applications. What Google Cloud service can you use to report on latency for
your applications in Google Cloud?
- Cloud Trace
In Azure, PowerShell can be used to script, automate, and manage the Windows
workloads running on Azure Virtual Machines. You need to reimplement your scripts
in Google Cloud. Which similar tool could you use to reimplement your scripts in
Google Cloud?
- Cloud SDK
Which option best describes the difference in how user identities are managed
between Azure and Google Cloud?
- In Azure, user identities are managed using Active Directory; in Google Cloud,
user identities are managed outside IAM.
Your organization uses Active Directory as its corporate directory. Which managed
service in Google Cloud automates best practices to sync your data and manage
authentication and directory operations for Active Directory dependent cloud
applications?
- Google Cloud Directory Sync
You have an Azure Network Security Group that is set up across a region, and then
associated with subnets. You want to replicate this environment in Google Cloud.
What technology should you choose?
- Google firewall rules defined at the network level
What is the key difference and similarity in the scope of Azure VNets and Google
VPC networks?
- Azure VNets are regional and contain regional subnets; Google Cloud VPCs are
global and contain regional subnets.
You have been asked to train a junior team member who is familiar with Azure in the
lifecycle of a Google Cloud virtual machine (VM). How can you describe the
equivalent of the Azure VM’s deallocating state in Google Cloud?
- Terminating
You store data from Azure virtual machines in an Azure zone-redundant storage,
which distributes data over different zones in the same region. You need to
reimplement this scenario using Google Compute Engine. What should you use?
- Regional persistent disks
You have a Virtual Machine that is running data pipeline batch Extract, Transform,
and Load (ETL) jobs. If the VM fails, the ETL package will gracefully recover the
data pipeline and it will restart at the point of failure. You want to choose the
most cost-effective solution in Google Cloud. What should you do?
- Use a Spot VM to deliver the batch data pipeline job.
You need to take your existing Azure Virtual Machine Resource Manager templates and
reimplement them for a Google Cloud solution. Which Google Cloud tool can you use?
- Instance Templates
Your organization uses Azure Load Balancer and Azure Application Gateway to load
balance between your servers in a region at the application layer. You need to
implement similar load balancing functionality in Google Cloud. What technology
should you use?
- Application Capacity Optimizations with Global Load Balancing
In your Azure environment, you are using Azure Synapse Analytics, Azure Data
Factory, and Azure Data Lake Gen 2 to analyze structured and unstructured data. You
need to set up a data lake environment using Google Cloud. As part of this
requirement, you have opted to choose a low-code, no code solution similar to Azure
Data Factory. Which option can you use to load data?
- Cloud Data Fusion
In your Azure environment, you have set up an Azure SQL database. To authorize
connections, you have set up VNet firewall rules. You have been asked to set up a
Cloud SQL database of an equivalent size. You want to use a Google-recommended
method to authorize connections in a Cloud SQL database. What should you do?
- Use VPC firewalls.
In your current Azure environment, you have blobs stored in a container, which is
owned by an Azure account. You need to move these files to Cloud Storage. Which
option describes the hierarchy in Google Cloud?
- Project -> Bucket -> Object
In Azure Kubernetes Services, a cluster has at least one node which is an Azure
Virtual Machine. In Google Cloud, where do the compute resources come from that are
used to build Google Kubernetes Engine clusters?
- Compute Engine
What product should an enterprise use if they don’t have any ML expertise?
- Generative AI App Builder
What tool should you use to provide search functionality in your financial services
product?
- Enterprise Search
Which products should you use for your enterprise use cases?
- Vertex AI + Generative AI App Builder
In which of the following scenarios should you use Enterprise Search? (Choose two).
- You lack the time to build a custom search system that is scalable and available.
- Improve developer productivity using code completion and code generation
features.
- Quickly search and summarize your company’s annual compliance training videos and
create study guides.
- Improve existing search result experiences with LLM-based capabilities such as
summarizing results.
Choose the answer that best describes the security posture of Gen App Builder.
- Gen App Builder offers the same security capabilities as other Google Cloud
products like BigQuery, including data encryption in flight and disk and no data
sharing across customers
The website team is creating a microservice that will be responsible for creating
controls and serving configs to filter out what data is presented to users after
they perform a query. Which role should you assign them?
- Discovery Engine Admin
The security team needs to perform some audit tasks to your datastores on Gen App
Builder to make sure the right documents and user events are being ingested. Which
role should you assign them?
- Discovery Engine Viewer
How can you improve the quality of recommendations and search results leveraging
user actions? Select all that apply.
- All of the above are correct.
Which metric indicates whether your users are finding what they were looking for?
- Click-through rate
Cymbal Healthcare’s surgical training team has asked for a location in Google Drive
to store resources that will be shared with surgical residents. A member of the IT
team has created the shared drive. Two senior members of the surgical training team
will move files from their own Google Drive folders to the new shared drive and
need the ability to modify its settings. Five junior members of the team will be
creating new guides on operative procedures but are not permitted to reorganize
content. This repository will also be augmented by a few vendors who should have
access to a single folder within the shared drive. When attempting to move files
into the shared drive, one of the senior surgical trainers was blocked from adding
content. You must resolve the issue and set permissions to align with the
requirements for the rest of the collaborators on the shared drive. What should you
do?
- Change the Migrations Settings in Google Drive to Allow users to migrate files to
shared drives for the organizational unit that the senior surgical team member
belongs to. Assign Manager access to the senior surgical team members. Assign
Contributor access to the junior team members. Create a folder within the shared
drive, and give the vendors Editor access.
Cymbal Healthcare’s IT help desk handles first-level support tickets for Google
Workspace. The responsibilities for help desk members include checking the status
of users, resetting passwords, managing Google Groups, reviewing logs, and
transferring Drive files and folders between users. They should not be able to
reset passwords for any C-level executives. You want to limit the Google Admin
console privileges of help desk team members to their specific responsibilities.
What should you do?
- Assign the Help Desk Admin role but specify the organizational units that the
help desk are allowed to interact with. Assign the Services Admin and Groups Editor
roles to the help desk members. Create a custom role with the Reports privilege,
and assign it to the help desk members.
When Google Workspace was initially implemented, the IT team planned on most Google
Groups to be created and managed through Google Cloud Directory Sync. However,
several scenarios require Google Groups to be created solely in the Google Admin
console. The human resource department requires a way to receive and respond to
employee questions about upcoming changes to the benefits plan. Questions can be
received through email or by using the web interface for the group. Both questions
and answers should be viewable by full-time employees to reduce redundant queries.
A member of the marketing department requires a group for mailing information about
an upcoming event to celebrate the anniversary of the founding of Cymbal Health.
This will be a one-way communication with the members that consists of periodic
messages from the marketing department to promote the event. The member list will
include employees, contractors, vendors, local politicians, business leaders, and
donors. How should each group be created and configured?
- For the human resource department, create a group with the name “Benefits
Questions.” Select the Access type as Team. Remove access for the Entire
Organization and External. Add the “Full-time Employees” group as a member. The
Access type will become Custom after the modifications. For the marketing
department, create a group with the name “Cymbal Health Anniversary Event.” Set the
Access type to Announcement Only, and set the Access settings to allow Group
Members to view conversations. Set Who can join the group to Only invited users.
Set Allow members outside your organization to “ON.”
The CIO of Cymbal Labs has asked that all department managers are given the ability
to create and manage groups to improve communication and collaboration at the
company. No other associates, aside from the IT team and department managers,
should be able to create groups. The groups cannot be accessible to anyone outside
of Cymbal Labs employees, although they can receive messages from contractors
working on research projects. The groups created by the managers should not be
visible to non-members of the group. Any group created by a manager must be
visually distinct from other groups. You want management staff to utilize groups as
directed by the CIO. What should you do?
- Change the service status for Groups for Business to ON for everyone. In Groups
for Business settings, enable Group owners can allow external members. Set
Accessing groups from outside this organization to Private. Set the Default for
permission to view conversations to All group members. Set Apply this suffix to all
group names in your organization to “mgr.” Create a custom admin role to allow the
managers to create groups and assign the role to their accounts. Have the managers
change their groups’ settings for Who can see group to Group members.
Cymbal Labs has an annual program for summer interns across departments. During
their participation in the program, interns are given an email address and access
to dedicated shared drives. Due to the limited nature of their involvement in
research and development and the need to secure intellectual property, interns do
not receive an Active Directory account. You have been asked to create 346 accounts
from a list that you received from the director of the intern program. The list
also contains several accounts for students that no longer participate in the
internship program. What is the minimum that you must do to create the interns’
accounts separate from employee accounts and prevent any ex-interns from accessing
their accounts?
- Create a new organizational unit called “Interns” in the Google Admin console.
Use the bulk user update template to create a CSV file. Populate the columns First
Name, Last Name, Email Address, Password, and Org Unit Path for each new user. For
the ex-interns, enter their email address and change the cell data in the New
Status column to Suspended. Upload the file.
The program manager for patient experience at Cymbal Health will be leaving the
organization in less than a week. The new program manager will need access to the
historical email of the former program manager. How will you transfer the email
between accounts?
- Use the Data migration tool to migrate Gmail data to the new program manager’s
Gmail.
Cymbal Labs is beginning trials for a new drug that prevents coronary heart disease
and will be storing the data in a shared drive. How can you configure the shared
drive so that only the IT department is able to change the shared drive membership
and the shared drive settings?
- Add the team leaders and members as Content Managers, Contributors, and
Commenters.
Cymbal Health has hired a public relations consulting firm and an advertising
agency to create a campaign that will raise awareness of their hospital’s
designation as a Level I trauma center. The public relations consultants will use a
Cymbal Health email account to correspond with the media. Both the public relations
consultants and the advertising agency will store digital campaign assets in Google
Drive. The consultants’ Google Workspace accounts should be associated with the
marketing department. The marketing department has both the Gmail and Google Drive
services enabled for all employees. You need to reconfigure the Gmail and Google
Drive services to give appropriate access to the consultants. What should you do?
- Create separate organizational units for the public relations consultants and the
advertising consultants as child organizational units of the marketing department
org unit. Turn off the Gmail service for the advertising agency consultants.
Cymbal Health has acquired a large physicians group to increase the geographic
reach of its healthcare network. The physicians group uses an on-premises email
server and will continue to do so for the next seven months, when their mail server
licensing expires. A small pilot group of employees from the physicians group will
be using Gmail prior to the eventual migration of all of the group’s mail to Google
Workspace. The domain for the physicians group has been added to the Google Admin
console and verified. What are the steps you must take to configure Gmail in the
Google Admin console for the physicians group employees who will continue to use
their on-premises email server?
- Change the MX records for the physicians group domain to point to Google servers.
Create an organizational unit for the physicians group employees. In Gmail
settings, add the on-premises email server as a host. Create a list with the users
that will continue to use the on-premises email server. Create a Routing setting to
apply to the organizational unit. Choose the Inbound and Internal - Receiving
options for Email messages to affect. Configure the rule to route mail to the on-
premises email server for the users on the list you created.
Cymbal Labs has decided to disallow access to Gmail from third-party desktop
applications in order to improve security, provide a consistent email experience,
and enable integration with other Google Workspace services such as Google Meet and
Google Calendar. Several employees have already submitted requests, supported with
business cases, to continue using third-party desktop email applications on their
Windows PCs. These requests are specific to the use of Microsoft Outlook as a
client and require sync with Google Calendar, Contacts, Notes, Tasks, and the
Global Address List. You want to enable access to Microsoft Outlook as a client for
Gmail with sync of the additional Google Workspace services like Calendar and
Contacts for only those employees with approved requests. What should you do?
- Create an organizational unit for the users who will be using Microsoft Outlook.
Turn on Enable Google Workspace Sync for Microsoft Outlook for my users for the
organizational unit. Install the Google Workspace Sync for Microsoft Outlook app
for each user on their Windows PC.
You have been tasked with helping to set up a pilot program for Google Chat at
Cymbal Labs. Each department will have at least three employees who will
participate as pilot users of Chat. The rest of the employees will not have access
to Google Chat until the pilot users have had 45 days to evaluate the service. How
would you enable access to Google Chat for only the employees in the pilot program
without affecting the service configurations that are applied to them?
- Create a Google Group called “Google Chat pilot.” Add the employees that will be
participating in the pilot of Google Chat to the group, and turn on the Google Chat
service for the group.
The director of quality assurance at Cymbal Labs will be taking a leave of absence
for three months. During their absence, they will not be responsible for any work-
related communication. Several colleagues in the quality assurance department will
share the duties of the director during the leave period. The director wants emails
to be forwarded to these colleagues, but the conditions of the leave require them
to not appear in the director’s Gmail account. How will you configure forwarding
for the director’s messages during their leave?
- In Gmail Routing settings, configure Email forwarding using recipient address
mapping. Create a map for each recipient for the director’s email address. Make
sure that All incoming messages is selected and that Also route to original
destination is not selected.
Cymbal Health has started a visiting nurses program that will initially utilize
contractors. The contractors will require the Gmail and Google Calendar services
but should not have access to any other Google Workspace services. How would you
configure their access dynamically to account for turnover in personnel?
- Create an organizational unit for the contractors and disable all Google
Workspace services other than Gmail and Google Calendar for its members.
To combat a tremendous increase in spam messages sent to email addresses that are
publicly available on Cymbal Health websites, the security team has added a
filtering server to the flow of inbound email which will append a custom header
identifying messages as spam. How would you configure Gmail to accept these
messages?
- Add the public IP address of the filtering server to the Spam, Phishing and
Malware setting for Gmail.
Since Cymbal Labs switched from its former email system to Gmail in Google
Workspace, there has been a marked increase in the number of complaints from
employees that their messages to external contacts are received in spam folders.
The CTO has asked you to reduce how often Cymbal Labs emails are classified as spam
by external recipients. What should you do?
- In the DNS records for your domain, add an SPF record for Google Workspace. In
Gmail > Authenticate email, generate a DKIM record, and add it to your DNS records.
To further harden the systems of Cymbal Health, you suggested and received approval
to implement spam, phishing, and malware policies for Gmail. After adding the
policies to the Admin console, the help desk has reported an increase in tickets
related to incoming messages from external senders that were not received, but
seemingly come from legitimate sources. You want to identify why the messages were
not received. What should you do?
- Ask the recipient for the email address of the sender. Use Email Log Search to
identify the policy that causes the messages to be blocked, then modify the policy
that is blocking emails.
The CIO of Cymbal Health has initiated an audit of interactions between the
organization and technology solutions providers that store or interact with
sensitive corporate data. They have asked you to document the process of sharing
sensitive information with Google Cloud Support when troubleshooting Google
Workspace service issues. How should you describe the process for securely sharing
data with Google Cloud Support during troubleshooting?
- Files are shared to a Google-owned Workspace environment with an expiration date
to revoke access when the case is closed.
The help desk has forwarded you a ticket with high priority because a researcher is
locked out of their Google Workspace account. The researcher is traveling, and
their login was flagged as suspicious. They also lost their mobile phone that
morning. The researcher needs immediate access to help complete a time-sensitive
government filing for a drug trial. The help desk has already changed the password
for the researcher, but they are still unable to log on. What can you do to help
the researcher regain access to their account?
- Temporarily turn off the login challenge.
One of the lab managers at Cymbal Labs has contacted you to investigate and resolve
an issue with a mail-enabled app that their team uses to send email messages.
Messages sent from members of the lab to external recipients are not being
received. You confirm the recipient addresses and the dates that the messages were
sent with the lab team. When you use Email Log Search to find the messages, the
search results reveal that the message status for the sent messages is “Rejected.”
What would be your next step to troubleshoot the delivery issues for these
messages?
- Confirm that you added the app as an allowed sender to the Simple Mail Transfer
Protocol (SMTP) relay settings in the Google Workspace Admin console.
A new employee has opened several help desk tickets in the last week about messages
that exist but do not appear in their mailbox. You have been asked to investigate
the issue. The missing messages are all related to a project to expand the
children’s wing of Cymbal Health’s main hospital campus. The messages come from
both internal and external senders, and the employee uses the web interface for
Gmail. You check the policies for spam, blocked senders, and routing, and rule out
a problem due to Gmail settings. What should be the next step in your
troubleshooting?
- Use Email Log Search to search for the messages and identify how they were
handled by Gmail by viewing the post-delivery status.
The Cymbal Health human resource department outsourced payroll processing to a
local service provider. The system of the service provider sends automated
informational emails that are always marked as spam when they are received by a
member of the HR team. In addition, several HR employees have received messages
that appeared to be sent by the service provider but were determined to be phishing
attempts. You want to configure Gmail settings to resolve both issues. What should
you do?
- Add the external IP address of the service provider’s email server to the Email
allowlist. Create a list of the sender email addresses that sent phishing attempts
and use it to configure a blocked senders policy.
The marketing department at Cymbal Health has started using a third-party email
newsletter service. Test newsletters have been marked as spam. How can you ensure
that the newsletters will reach their recipients' inboxes?
- Add the domain of the third-party newsletter service to your SPF record.
An admin at Cymbal Labs made a change to Gmail settings that disrupted mail flow
for a short time before it was reversed. The CIO wants to be notified every time a
Gmail setting is changed. What should you do?
- Create a custom Alert rule for Admin log events that sends a notification when
settings are changed.
To comply with a cyber insurance policy, all employees at Cymbal Labs must sign in
using 2-Step Verification. Employees in IT and C-level executives need a second
factor of authentication that cannot be phished. How would you deploy additional
security for user logins in this scenario?
- Create a Google Group for IT and executive employees. Set 2-Step Verification
Enforcement to On, and also set the Methods option to Only security key. At the
top-level organization level, set Allow users to turn on 2-Step Verification, and
activate the Enforcement option.
Security personnel at Cymbal Health have each been issued a company-owned Android
phone. These devices must be unlocked with a complex passcode. If there are more
than five failures when unlocking the screen, the device should be blocked from
accessing Google Workspace, and an administrator should be notified. What mobile
device policies should be applied to the organizational unit for the security
personnel to meet the requirements?
- Set mobile management to Advanced. Set Universal settings > General > Password
requirements > Require users to set a password to Strong. Create a rule with the
template Block account on multiple failed screen unlocks, and set it to Block
mobile device and send an alert.
A manager in the Cymbal Health accounting department has requested that emails
containing the words “confidential,” “payroll,” and “salaries” must be prevented
from being sent to anyone outside the company. When messages are flagged, the
manager wants to be notified. What steps should you take to fulfill the request?
- Create a Gmail quarantine and make the manager a member of the reviewers group
with the option to get periodic notifications. Create a content compliance rule for
Gmail at the top-level organizational unit to do a simple content match on outbound
messages, and send matches to the quarantine.
The Cymbal Health facilities department purchased a third-party app for scheduling
that needs to integrate with Google Calendar. The current company policy for third-
party apps is to prohibit untrusted apps from accessing any Google Workspace core
service data. While reviewing the access required for the scheduling app, you
discovered other apps that have been authorized by end users. How can you enable
secure access for the new scheduling app while you prevent the continued use of
other untrusted apps?
- In app access control, select the scheduling app in the Configured apps list and
change the access to Trusted. Change third-party API access to Don't allow users to
access any third-party apps. Review the Accessed apps list and change the Access
setting to Trusted for any trusted applications.
The help desk at Cymbal Health has received a call from the urgent care facility.
One of the physicians misplaced their personal Android phone during a busy evening
shift. The device has an Android work profile. A help desk representative has asked
for your help in resolving the situation. How do you secure the device and prevent
potential unauthorized access to company data?
- In the Google Admin console, select the device on the Mobile & endpoints list and
wipe the account. Reset the Google Workspace account password for the physician,
and sign out all sessions.
A third party auditor recently identified that documents from a drug trial were
shared externally. It is not clear yet whether the exposure was deliberate or
accidental. The Cymbal Health Chief Information Security Officer (CISO) wants
automated safeguards in place immediately to restrict external sharing of Drive
files related to drug trials. What changes should you make to Drive sharing
policies?
- Create a new label for file sensitivity, and require users to pick an option.
Create a data protection rule that searches for a Google Drive label that reads
“File Sensitivity” with the options restricted, confidential, or internal. As an
action, choose Block external sharing for Google Drive in the rule options to
receive an alert in the alert center.
After a recent policy change to block all Google Workspace Marketplace apps, a
ticket that lists Google Docs add-ons that are no longer working is escalated.
After verifying with the user and their manager that the add-ons are necessary for
their work, you must allow the add-ons by using as few permissions as possible.
What policies would you implement?
- Set the Manage Google Workspace Marketplace allowlist access option to Allow
users to install and run only selected apps from the Marketplace. Add the add-on to
the allowlist for the organizational unit that the user resides in. Audit the OAuth
Scopes to review the access to core services and data.
Cymbal Labs has Windows desktop PCs and laptops in their research labs that are
shared among the research personnel. Visiting partner policies must be applied to
the Chrome browser including blocking unauthorized extensions, ending processes
that use the Chrome task manager, and blocking all downloads. You must ensure that
these Chrome policies are enforced on company devices regardless of who is logged
on to Windows and whether they have signed on to the Chrome browser. How should you
manage the Chrome browser on these Windows computers?
- Add a Chrome Browser Cloud Management subscription in the Google Admin console.
Enroll the browsers and apply policies to each organizational unit.
Cymbal Labs entered into a partnership agreement with a company based in France to
assist with development and reduce the go-to-market time for several new
medications. The employees of the partner company will be given Google Workspace
accounts to collaborate with Cymbal Health employees. You must ensure that the
partner employees only connect from their main office and that third-party apps
cannot access their Drive files. What policies would you implement?
- Create a context-aware access policy that has a Meet attributes condition of the
IP subnet of the partner office. Assign the policy to the core services enabled for
their organizational unit. Turn off the Drive SDK for their organizational unit.
You’re part of a team that is implementing a new single sign-on (SSO) service with
a third-party identity provider (IdP) that uses SAML. A group of employees across
Cymbal Health will participate in a pilot of the new system. You will be
configuring the SSO profile in Google Workspace for the pilot. What steps must you
complete to create a working SSO profile?
- Enter a sign-in page URL and upload an X.509 PEM certificate in a new SSO
profile.
At Cymbal Health, the Google Vault retention policy for Gmail messages is five
years with an expiration action of purge only permanently deleted messages. A
doctor has moved messages that they received ten years ago to Trash. When will the
messages be purged from Gmail?
- They will be purged in 60 days.
The director of compliance for Cymbal Health wants detailed information about files
that are shared externally. You must give the director a simple way to access more
detailed information about externally shared files whenever it's necessary. What
should you do?
- Create an admin role with the Dashboards privilege for the security center,
assign it to the director’s account, and instruct them to view the widget for file
exposure.
Cymbal Labs will spin off a small research team into its own company, led by one of
the current executives. As part of the agreement between the companies, research
data will be transferred to the new company from Google Workspace. The data resides
in Google Drive, but the new company will not use Google Workspace. How will you
transfer the data to the new company in a cost-efficient, centrally managed way?
- Utilize a third-party migration solution to migrate the Google Drive data to the
Cloud Storage account of the new company.
Cymbal Health has acquired a primary care clinic group with three locations and 90
employees. The group uses Exchange Online for email, calendars, and contacts. The
email of former employees is stored in PST files on a file server at one of the
clinics. How would you migrate the email to Google Workspace?
- Install Google Workspace Migration for Microsoft Exchange on one of the clinic’s
Windows PCs to migrate the email.
You’re part of the IT security task force for Cymbal Labs. Part of your
responsibility is to improve the security posture of Google Workspace policies
based on Google best practices. You must identify potential risks and mitigate them
quickly and efficiently. What should you do?
- Review the security health page and dashboard for policy recommendations and
trending information for security reports.
Cymbal Labs has acquired a small research company with 18 employees. They used a
hosted mail provider. You have created accounts in Google Workspace for their
employees. Their IT person has asked for a recommendation for a centrally managed
migration of their historical data into their new accounts with minimal cost. What
would you recommend as a method for migration?
- Configure and run the data migration service in the Google Workspace Admin
console.
Cymbal Labs uses Google Vault for email eDiscovery. The current retention period
for Gmail, applied at the root organizational unit, is seven years. To comply with
new email retention regulations, emails related to the testing of a particular drug
product must be retained for ten years. How would you ensure that the organization
meets the requirements of the retention regulations with minimum disruption to
policies?
- Create a custom retention rule for Gmail with a scope of the root organization
and conditions of: terms of the drug name; and a retention period of 3,650 days.
You are asked to create a shared drive for sensitive data about Cymbal Health
company financials. Several employees will be made managers of the shared drive.
It’s important that there is no unauthorized access to the data. The CTO wants the
shared drive settings to be monitored and the help desk to be notified of any
changes. How do you set up monitoring for the shared drive?
- Create a group with the shared drive managers. Create an Activity rule for Drive
log events for shared drive settings changes and a condition of the shared drive
managers group as actor group name. Set alert severity to high, and send email
notifications to the help desk.
A manager at Cymbal Health has left the company. A new manager has been hired to
replace them, starting tomorrow. You need to give the new manager access to the
Google Drive files and folders that the former manager owns as efficiently as
possible. What should you do?
- Delete the former manager’s account and choose the option to transfer the files
and folders to the new manager’s account.
Cymbal Labs currently has a retention policy for Gmail of ten years. In compliance
with HIPAA laws, and to adhere to a new corporate legal policy, the retention
period must be changed to six years. You will modify the retention policy in Google
Vault to the new retention period. What will happen to messages in Gmail that were
sent or received more than six years ago?
- They will be immediately purged from user mailboxes, except for data that is part
of a hold.
Which hybrid runtime component provides an API interface to the management plane?
- MART
Which mechanism is used by the Apigee API to authenticate and authorize management
API requests in hybrid?
- OAuth
Which three services are part of the Apigee hybrid management plane?
- Unified Analytics Platform (UAP)
- Apigee API
- Hybrid UI
How are API proxy changes made available in the runtime plane?
- The Synchronizer polls the management plane for proxy changes and makes them
available to the Message Processors.
Which one of the following is true regarding API proxy deployment in Apigee hybrid?
- A deployed proxy revision is immutable.
Which one of the following statements about authentication between the hybrid
management plane and runtime plane components is true:
- The Synchronizer runtime component uses a sidecar container to generate OAuth
tokens used for securely communicating with the hybrid management plane.
In Apigee hybrid, roles that are granted to a user at the Google Cloud project
level are inherited at:
- The Apigee hybrid environment level for all environments in the Apigee hybrid
organization by default.
To securely communicate between the API proxy running in Apigee hybrid and the
target backend, as a best practice:
- Create a TargetServer configuration with TLS and client authentication enabled.
Use references to a truststore and keystore in the configuration of the target
server.
In Apigee hybrid, the KMS, key-value map, and cache data are encrypted using
organization- or environment-scoped encryption keys. Which one of the following is
correct:
- KMS data is encrypted using an organization-scoped encryption key.
What are three factors to consider when planning capacity for your hybrid runtime
infrastructure?
- Business strategy
- Service level agreements
- API processing logic
What is the recommended best practice to scale the Apigee hybrid runtimecomponent?
- Declare the min and max replica counts in the overrides.yaml file, and run the
apigeectl apply command.
When upgrading Apigee hybrid in a production environment, what sequence should you
follow to upgrade the runtime plane components in the cluster?
- Upgrade Cassandra, telemetry components, Redis components, organization-level
components, environments, and virtualhosts in that order.
What is the recommended best practice to perform a rolling incremental (A/B) update
to a hybrid runtime component?
- Set the revision property in the overrides.yaml file, and run the apigeectl apply
command.
Which is a valid critical path of components to troubleshoot when there are issues
in the runtime execution of an API proxy?
- Ingress gateway, Message Processor, Cassandra
To properly monitor the health of the Apigee hybrid runtime plane, which metrics
should be monitored?
- Metrics for the Kubernetes cluster, node, pod, container and application
workloads
What are two of the key benefits of using generative AI features in Dialogflow CX?
(Select two options)
- Chatbots provide accurate and helpful information
- Generated content is restricted to what you want it for
What are two of the main generative AI capabilities that have been added to
Dialogflow CX? (Select two options)
- Generators
- Generative AI Agent
You have been asked to add generative AI capabilities to your Dialogflow CX virtual
agent that will enable it to reference the existing FAQs on the company website.
What generative AI feature would you add to your solution to enable this
functionality?
- Generative AI Agent
Recently, some of your customers have been asking questions that your Dialogflow CX
virtual agent is unable to answer. You realize that intents have not been defined
for these types of questions. What generative AI feature would you add to your
solution to handle conversations that have gone off-track?
- Generative Fallback
Which two language models can a Generator use to generate code? (Select two
options)
- code-bison
- text-bison
Read the text prompt below and answer the following question. What information
would the highlighted $conversation placeholder parse into the prompt? Your goal is
to summarize a given conversation between a Human and an AI. Conversation:
$conversation{USER:"Human:" AGENT:"AI:"}Human: $last-user-utterance A concise
summary of the conversation in 1 or 2 sentences is:
- The conversation between the agent and the user, excluding the very last user
utterance.
When configuring a Generator there are some controls that can be used to customize
the behavior of the generative responses. What are the controls available to you to
customize the generative AI responses? (Select two options)
- LLM parameters, such as Temperature, Top P and Top K
- Text Prompt
With generators, you can make a prompt contextual by marking words as placeholders
by adding a $ before the word. These placeholders usually hold a position in the
prompt that will be substituted for user input data at runtime. What session
parameter can you associate with the $text prompt placeholder?
- Any of the session parameters identified in the Intents
You have been asked to enable generative responses for no-match events for specific
pages, by enabling it in the Agent response section of the event handler. Where
would you provide the information for the LLM to reference to generate its
response?
- Intent description
A Dialogflow CX flow has been designed for booking diving trips. A particular page
in the flow is configured to assist users with group reservations or full charters,
the intent description states: ‘Currently you can assist users who are looking for
a group reservation or a full charter. Initially collect travel details including
departure period, destination, number of guests (min 4 max 15 people), contact
details. The destination must be one of the following in the Pacific: Costa Rica,
Mexico, Galapagos Islands.’ Which Generative Fallback enablement levels would be
triggered if the user tries to book a full charter for 18 people? (Select two
options)
- The page-level would be triggered as the minimum and maximum number of guests is
specified in the intent description. The LLM also uses this description to generate
the response.
- The parameter-level would be triggered as the minimum and maximum number of
guests is defined as an entity parameter. The LLM uses the intent description to
generate the response.
You can add a list of banned phrases for your Generative Fallback response. What
happens if a banned phrase has been entered by a user as part of their response?
- A prescribed answer defined in Agent Says will be used to respond.
Which two features are used by Generative AI Agents to provide a response based on
your data? (Select two options)
- Large Language Models
- Data stores
Data stores are used to find answers for end-user's questions. A data store can
consist of different sources. What types of source data are available for data
stores in a Vertex AI Search and Conversation?
- Website, structured and unstructured data.
A Virtual Agent uses intent detection to route customer questions to the relevant
information. Generative AI capabilities can be added to handle certain intent
detection routes. Which aspect of Dialogflow CX Agent intent detection do
Generative AI Agents cover?
- State handlers
What are two other important and useful features that are part of Generative AI
Agents and data stores? (Select two options)
- Data store prompt
- Grounding confidence
Which two statements are true for Generative AI Agents? (Select two options)
- With Hybrid Agents you can use a mix-and-match approach to leverage both intent-
based flows and generative AI use cases.
- Keep what is working well in Dialogflow CX and add generative AI capabilities.
Choose the answer that best describes the security posture of Vertex AI Search and
Conversation.
- Vertex AI Search and Conversation offers the same security capabilities as other
Google Cloud Perimeter products like BigQuery, including data encryption, no data
sharing across customers, and Google will never use your data to train foundation
models.
The security team needs to perform some audit tasks to your datastores on Vertex AI
Search and Conversation to make sure the right documents and user events are being
ingested. Which role should you assign them?
- Discovery Engine Viewer
What are two powerful features of Generative Playbooks? (Select two options)
- Playbooks can leverage LLMs for instruction-driven flow development.
- Playbooks enable LLMs to access APIs and tools.
What are two of the limits of Generative Playbooks? (Select two options)
- 5 LLM calls per conversation turn
- 15k input tokens and 500 output tokens summed across a conversation turn
What are two key steps in connecting a Generative Playbook with a data store?
- Create a Playbook tool for the Generative AI Agent
- Select the data store in the tool user interface and save the tool.
What are two generative AI related features of Dialogflow CX that can be used with
Playbooks? (Select two options)
- Data stores
- Generative AI Agents
Sherrie is active in many direct conversations. She notes that one conversation
with a colleague hasn’t been active in six months and decides she wants to hide it
from view. What does she need to do?
- Select the name of the direct conversation, then select Hide Conversation
Kaina is having a long conversation with Sherrie using Google Chat. She mentions a
Google Meet may be easier than typing so much, and Sherrie agrees. What can Kaina
do quickly to avoid interrupting the conversation’s flow?
- Select Add video meeting in the reply area of their chat
Anthony starts a direct Google Chat with Sherrie. She mentions some technological
improvements that the Head Office intends to implement at the store level. Anthony
wants to retain a few of her messages for quick reference in the future. What
should he do?
- Click More actions then, Forward to inbox in Google Chat
Sherrie wishes to wish Kaina a happy birthday over chat. She wants to make the
message extra special. Which of the following actions can Sherrie NOT take?
- Select the option to have her text animate on the screen
Sherrie, head of HR and Employee Development sees Jaspar is currently online and
wishes to message him quickly. She doesn’t want to risk him not seeing his email
until later. What should she do?
- Click on his name in the Chat list in chat.google.com, type her message, and
press Enter or click the Send message icon
Kaina wants her team to be aware of current tasks being assigned amongst the group
and when they finish. She would rather this be incorporated into everyone’s current
work tools than create a new process. How should she proceed?
- Utilize the Tasks tab in the team Space
Store owners use a space to discuss recipes. Yousef sees a thread about possible
changes to cinnamon buns and wants to receive notifications whenever there is new
activity. What does he need to do?
- Click the thread and select Follow
Dao wants to strengthen the culture of On the Rise by encouraging more dialogue for
shared interests amongst the team. He doesn’t want to add another recurring meeting
to people’s agenda and doesn’t want people to feel pressure to engage, this should
be fun. What can he do?
- Create a space entitled “Off the Clock” for teammates to discuss their passions
and hobbies
Yousef is an On the Rise store owner located in Fort Lauderdale, Florida. He and
other On the Rise store owners like to frequently communicate in order to share and
store their collective knowledge for later reference. What is the best way for them
to communicate their shared learning?
- A space in Google Chat
Roberto and his team at On the Rise Seattle are all members of the Cat Lovers
space. He heard about an app that populates chats with cat photos via simple key
commands. He wants to use it to delight his team. How can he search for the app?
- In the Start a chat submenu, search and add the app by selecting Find apps
You can reduce errors in your applications with the help of Anthos Service Mesh by
(select all that apply)
- Mirroring traffic to new versions.
- Introducing retries in the Envoy proxies.
- Doing canary deployments using weights in your VirtualServices.
- Setting connection pools on mesh services.
Each request is checked against the Mesh CA to establish trust between the client
and the server.
- False
Authorization policies define access control for mesh workloads using the following
mechanisms: (select three)
- Check that service accounts are allowed.
- Check that specific networks are allowed.
- Check that specific API endpoints are allowed.
Multi-cluster gateways
- Balance load across clusters.
Sherrie West has been speaking with the On the Rise Leadership Team and would like
to draft a project proposal. She knows similar company docs already exist. What
should she do?
- Start a new document from a template and select a proposal template from her
organization
Seroja Malone has a series of recipes that she’d like to share with the On the Rise
team. These files are currently Microsoft Word documents. What is one way for
Seroja to turn them into Google Docs?
- Upload the Word docs to her Google Drive, select Open with Google Docs, select
File, and Save as Google Docs
Sherrie West is working on an important Google Doc. She decides she’d like to make
it easily available by adding it to her starred label. What does she need to do?
- Select the Star icon next to the document title
On the Rise partner owner Thomas Omar has completed a Google Doc and would now like
to move it from his personal drive to the team shared drive. What is one way he can
move the Doc?
- Select the Move icon
On the Rise partner owner Seroja Malone is traveling to Italy to meet with a new
cinnamon supplier. Seroja wants to ensure she can work on her Google Doc for the
duration of her flight. How can she check that the file is available for offline
access?
- She can select See document status
Sherrie wants to make sure readers can easily move around the training document.
She decides to add bookmarks to key sections. How does she create her bookmarks?
- She needs to select the text she wishes to bookmark and select Insert, then
Bookmark
Sherrie decides to add a Chart that is linked to a survey she has recently shared
with the On the Rise team via Google Forms. How can Sherrie ensure the chart in the
Google Doc stays up to date as team members complete the survey?
- The chart in Google Docs is integrated with Google Sheets and will automatically
update
Thomas Omar makes some changes in the new hire training document, but later decides
he’d like to return to the version shared by Sherrie. What does he need to do?
- Select File, then Version history, then See version history, choose the version
from the correct point in time, and then select Restore this version
Seroja Malone has just created a Google Doc featuring a new cinnamon bun recipe.
She shares this Doc with On the Rise store owner Yousef Amadi. She’d like him to be
able to download and print the file, but not make any changes. What type of
collaborator role should she assign him?
- Viewer
Sherrie West has just completed a Google Doc that will serve as a new hire training
manual. She would now like to transfer Doc ownership to On the Rise partner-owner
Thomas Omar who is already an editor of the document. What does she need to do?
- Select Share, and choose Editor to the right of Thomas Omar, then Make owner
Kaina Gao would like to assign an action item to Anthony Dylan. What does she need
to do? Select all that apply.
- <a href=mailto:
[email protected]>[email protected]</a>, then
check Assign to Anthony Dylan
- @<a
href=mailto:[email protected]>[email protected]</
a>, then check Assign to Anthony Dylan
- [email protected], then check Assign to Anthony Dylan
- @[email protected], then check Assign to Anthony Dylan
Anthony is working on the Google Doc when he notices that Kaina Gao is online as
well. Anthony would like clarification regarding a few comments that Kaina Gao has
left him. What is the best way for Anthony to collaborate with Kaina Gao?
- Use Google Chat to message her directly in the Google Doc
Kaina Gao is working on a Google Doc about new bakery trends. She’d like to leave a
comment on a chart found on Page 2 of the document. What does she need to do?
- Place her cursor on the chart, select Add a comment, type her comment, and select
Comment
Sherrie West has recently received a new version of the OTR new hire training
manual from Thomas Omar. Unfortunately, rather than updating the original, Thomas
has made his updates directly in a new Google Doc. How can Sherrie easily compare
this new version with the version she sent him last week?
- She can use the Compare documents feature
Sherrie wants to email a very large file to her team. What is the best option?
- Select Insert files using Drive from Gmail
Sherrie West is busy at work when she receives an email from a store owner. She
doesn’t have time to write back immediately, but she also doesn’t want to forget to
respond later. What can she do? Select all that apply.
- Apply her custom label “Follow Up”
- Star the email
- Snooze the email
Sherrie is active in numerous On the Rise Google groups. She often receives
notification emails. Sherrie decides to enable categories to better manage her
Inbox. In which category will she now find messages from her Google groups?
- Forums
Sherrie and her team are about to send out a survey to On the Rise store employees.
Sherrie wants to keep their feedback organized in her Inbox by creating a project
label named “OTR Survey Feedback.” How can she create this label?
- Select More in the label list, then Create new label
Thomas Omar wants to email a confidential financial statement to his head office
team. The document is stored in his personal Google Drive. Thomas wants his team to
be able to read the document, but otherwise not alter it in any way. Which of the
following share settings should he select?
- View
On the Rise store owner, Yousef Amadi, is responsible for three separate bakery
locations. In order to manage his workload, he uses a task list to keep track of
what needs to get done. He adds the task “Email Anthony Dylan Wastage Report.” What
does he need to select to make this task repeat on a weekly basis?
- Select Task, then Edit Details, then choose the time and date details
On the Rise store owner, Yousef Amadi, is piloting a new Point of Sale (POS) system
at one of his locations. The system automatically sends him daily reports, yet
these reports are automatically filtered as Spam. What steps can Yousef take to
ensure future messages make it to his Inbox? Select TWO correct answers.
- Add the system sender email “[email protected]” to his contact list
- Go into his Spam folder, select one of the messages incorrectly marked as spam,
then select Not spam
Sherrie West often intends to email Thomas Omar, yet when she starts to type, her
“To:” field in Gmail automatically populates with the name “Thomas O’Malley”. This
name is only replaced by “Thomas Omar” once Sherrie reaches the fourth letter of
his family name. Sherrie has accidentally sent Thomas O’Malley three emails meant
for Thomas Omar. What can Sherrie do to fix this problem?
- Add Thomas Omar to her personal contacts
Sherrie West is creating an onboarding package for new On the Rise hires. One of
the important steps is getting staff set up with their Gmail account, which
includes adding a personalized signature line. Which of the following instruction
lines should she include?
- From Settings, scroll to Signature, select Create new, add your name and the On
the Rise logo, then select Save
Seroja Malone is traveling to Italy next week to meet with a new cinnamon
distributor. She knows she will have limited access to her Gmail account and wants
to set an Out-of-Office AutoReply while she is out of office. What does Seroja need
to do?
- From Settings, select Out-of-Office AutoReply, type her subject and message, then
select Out of Office AutoReply on
Kaina Gao wants to search for a message she sent to Anthony Dylan last May. She
remembers the email related to a new store in Manila and included an attachment
named “New Opportunities.pdf.” What are some ways she can narrow her search in
order to quickly find this email?
- She can search for “Manila”
Anthony Dylan occasionally receives emails from On the Rise partner owner, Seroja
Malone. Anthony wants to ensure that Seroja’s messages are automatically labeled as
important in his Inbox. What does he need to do? Select TWO correct answers.
- Create a new filter and select the action <strong>Always mark it as
important</strong>
- Open message from Seroja Malone and click to <strong>enable the important
marker</strong> to the left of the label
Kaina has decided on some recipe changes to the current menu. She needs to create a
video meeting to discuss these changes with Seroja. Which option will NOT achieve
this?
- Type <strong>Start Meeting</strong> in the Chrome browser
Seroja has scheduled a video conference to take place next week to check in with
her team. She realizes she forgot to include Kaina. What should she do?
- Edit the event in Google Calendar to add Kaina as a guest
While the Google Meet video conference is in progress, Thomas wants to invite his
wife, Seroja. Which is NOT a way he can add her to the call?
- Type her email address into the Google Meet chat
Later during the meeting, Kaina wants to share a supplier's webpage to Yousef for
him to review prices on his own after the meeting. How can she do this using Google
Meet?
- Paste a link to the webpage in the meeting chat box for Yousef to retrieve
Kaina Gao is head of Global Marketing at On the Rise. She organizes a Google Meet
video call but realizes her audio isn’t working. What steps should she take to
investigate this issue? Select two.
- Speak into her microphone and ensure that three green bars appear in response to
her voice
- Click <strong>More options</strong>, select <strong>Settings</strong> and check
if her microphone is set to her device’s defaults
During the video conference, Yousef Amadi wants to access some marketing resources
that are attached to the meeting’s calendar event. What should he do? Select two.
- Open the attachments in the Google Calendar invite in her Inbox
- Click Meeting details, to view attachments
There are many people in the meeting and Kaina is having trouble identifying who is
speaking. She wishes to modify her settings to better see the current speaker. What
should she do?
- Adjust the <strong>Change layout</strong> setting in the <strong>More
options</strong> menu to <strong>Spotlight</strong>
Kaina wants to see what everyone in the call thinks about some marketing campaigns
she’s presented. She’d like a way to take a vote. What can she do?
- Start a poll using the <strong>Activities</strong> panel
Dao was invited to the meeting, but Kaina sees that he is not present and noticed
he left a note in the Calendar invite saying he had a doctor appointment. Karina
wants him to review important information being discussed. What should she do?
- Ask everyone present for their permission and select <strong>Record
meeting</strong> from the <strong>More</strong> <strong>options</strong> menu. The
recording will be sent to all invited.
Kaina wishes to brainstorm new menu ideas with the group but is concerned that
certain people will speak so much that others may stay quiet. She wishes to
separate the team into small working groups momentarily, to have a better chance of
everyone getting involved. What should she do?
- Use the Activities function to split the call into smaller discussion groups
You want to examine messages generated by running code. Which tool might be best
for doing this?
- Logs Explorer
You want to calculate the uptime of a service and receive alerts if the uptime
value falls below a certain threshold. Which tool will help you with this
requirement?
- Cloud Monitoring
Users have reported that an application occasionally returns garbage data instead
of the intended results, but you have been unable to reproduce this problem in your
test environment. Which tool might be of best help?
- Error Reporting
You want a simple way to see the latency of requests for a web application you
deployed to Cloud Run. What Google Cloud tool should you use?
- Trace
You want to analyze the error rate in your load balancing environment. Which
interface helps you view a chart with a ratio of 500 responses to all responses
- MQL
You want to be notified if your application is down. What Google Cloud tool makes
this easy?
- Uptime check
In the statement “Maintain an error rate of less than 0.3% for the billing system”,
what is an SLI?
- Error rate
You want to compare resource utilization for VMs used for production, development,
and testing. What should you do?
- Add a label called “state” to your VMs with the values “dev”, “test”, and “prod”
and group by that label in your monitoring chart.
Why are the Data Access audit logs off by default? Select three.
- They can be large
- May contain sensitive information
- They can be expensive to store
If you want to provide an external auditor access to your logs, what IAM role would
be best?
- Logging Viewer
On the Rise store owner Yousef Amadi wants to create a presentation for his
employees. How does he create a new Google Slides presentation? Select all that
apply.
- Go to web address slides.new
- Go to Google Drive, select New, then select Google Slides
Yousef wants his presentation to match other On the Rise files and documents. How
can he access his organization’s available Google Slide templates?.
- Go to Google Drive, select New, then select Google Slides, then select a From a
template
On the Rise partner owner Thomas Omar will be taking a few days off and heading out
of office. He is about to shut down his work computer, but wants to ensure the
changes he has made in Google Slides have been saved. Choose the best answer?
- Select See document status
Kaina Gao has just inserted an image on-screen. She would now like to reposition it
so it is in the middle of the page. What are some of the ways she can move the
image? Select all that apply.
- She can select the image and use the arrow keys
- She can select the image and use the Arrange menu
- She can select the border lines of the image and drag it with her mouse
Kaina Gao is preparing a Google Slides presentation that she will present to the On
the Rise marketing team next week. She’d like to add speaker notes so she doesn’t
forget key points. What does she need to do?
- At the bottom of the slide in “Speaker notes” section, click Click to add speaker
notes
Anthony Dylan is designing a Google Slides presentation for the On the Rise head
office team. He’d like to add a chart so that data dynamically changes when updates
are made in Google Sheets. How does he do this?
- Go to Insert, then Chart, then From Sheets
Anthony is working on a slide and decides he’d like to change the slide background
from the default white to an image on his desktop. How does he do this? Select all
that apply.
- He can open the Slide menu, select Change background, and then Choose image
- He can right-click an empty area of the slide, select Change background, and then
Choose image
Thomas reviews his Google Slides presentation and determines that Slide 3 is not
relevant for the head office meeting. How can he skip that slide while in
presentation mode? Select all that apply.
- He can go to Slide 3, open the Slide menu, and select Skip slide
- He can right-click on Slide 3 in the preview panel and select Skip slide
Thomas would like to import a single slide from a previous presentation he has
stored on his Google Drive. What does he need to do?
- Open the File menu, select Import slides, select the presentation, select the
specific slide, then select Import slides
On the Rise store owner Yousef Amadi has recently been added to a Google Slides
presentation as a viewer. What can he do in View Mode? Select all that apply.
- Download it, as long as the owner allows it
- Print and copy it, as long the owner allows it
Seroja assigns Sherrie West as an editor. Seroja would like Sherrie to make content
updates, but does not want her to share the file with additional collaborators. How
can she set this up?
- Open the Share with people settings and disable editor sharing permissions
Seroja would like to review all the comments that have been added, edited, and
resolved within the presentation. What does she need to do?
- Select Open comment history
Anthony decides he wants to edit the comment he has left for Seroja. How can he do
this?
- He must select More options, then Edit
Anthony Dylan is working on a Google Slides presentation in which he and Seroja are
both editors. He leaves a comment for @SerojaMalone, asking for her feedback. How
does Seroja reply to Anthony’s comment?
- Select the Comment card, type her response, and select Reply
During the presentation, Thomas wants to quickly reference his speaker notes. How
can he do this?
- He can select Notes
It’s Wednesday morning, and the On the Rise head office team is gathered for Thomas
Omar’s Google Slides presentation. Thomas wants to move his slide deck into
presentation mode. What does he need to do?
- Click the Present button
Thomas begins his presentation, but decides the deck is advancing too quickly. How
does he update his settings so that the slide deck auto-advances every minute?
- He can select Options, then Auto-advance (when played), and choose Every minute
Which of the four golden signals are part of the Istio service mesh by default?
Mark all that are true (2 correct answers).
- The time it takes for your traffic to service a request.
- The number of requests sent to your system.
Which of the following is a method of showing how much traffic is routed to each
version of a service?
- In Kiali, use service graph traffic animation with requests percentage.
Which of the following are required to create a new, custom metric? Mark all that
are true (3 correct answers).
- A rule resource with actions.
- An instance resource with a template.
- A handler resource with an adapter.
The base image of Grafana is preconfigured with which data source and dashboard?
- The Prometheus data source, and the Istio dashboard.
How can service operators verify the traffic management configuration setup in a
service mesh?
- Use kubectl get and describe commands to review virtualservices and
destinationrules for the details of the applied configurations.
Istio's abstract model informs how Pilot programs the Envoy proxies to route
traffic. Which of the following are part of the Istio abstract model? Mark all that
are true (3 correct answers).
- A set of policies applied to requests after routing decisions.
- A way to represent requests to services that reside outside the service mesh.
- Rules to control how requests are routed.
You have a cluster service, backed by 4 pods. How can you efficiently send 3% of
your service traffic to a proposed new version of your service?
- Add VirtualService and DestinationRule configuration for your service mesh to
define multiple versions with destination weights.
What can you do with service mesh to test the resiliency of your multi-service
application without changing any of your source code?
- Use VirtualService configuration to introduce delays or abort faults in a small,
random percentage of your requests.
Which of the following are traffic management capabilities you can configure in
your service mesh? Mark all that are true (3 correct answers).
- Configure a VirtualService with the maximum number of retries that requests can
be attempted to avoid clogging the network with requests to unavailable services.
- Configure a VirtualService with conditional routing based on checking the request
header for a specific end user.
- Configure a VirtualService with conditional routing based on source labels, for
calls from a specific version of a service.
You want to employ a zero-trust network, for your microservice communication. What
should you do to decouple the tasks for securing your network from developing your
application, while maintaining a consistent approach whether on cloud or on-
premises?
- Use service mesh and Envoy proxies to enforce mTLS and authorization policies
close, but separate from your services.
You're planning on enabling mTLS to enforce your zero-trust network policies. Which
mTLS configuration should you use when starting with some services that don't yet
accept or send encrypted traffic?
- Use PERMISSIVE mode to test whether it's safe to turn on authorization.
You're planning on enabling mTLS to enforce your zero-trust network policies. What
is the easiest way to consistently enable mTLS for all of your services?
- Set a MeshPolicy for for mTLS in your service mesh.
What service mesh capability should you enable for the most secure service-to-
service authentication?
- Enable mutual authentication which involves both sides of each request checking
that requests are allowed.
Which entities are part of the Istio access control model? Mark all that are true
(3 correct answers).
- An abstract persona with a set of permissions.
- Mappings of users or services to personas with permissions.
- Concrete users or services.
Which are the known states of your Anthos Config Management installation? Mark all
that are true (3 correct answers).
- Anthos Config Management is synchronized with your config repo..
- Anthos Config Management is installed.
- Anthos Config Management is configured.
With Anthos Config Management, configs describe objects to be managed. Which are
supported management operations? Mark all that are true (3 correct answers).
- Delete managed objects.
- Enable management of objects.
- Temporarily disable management of an object.
You want your service mesh to manage multiple services in many clusters. Which
setup should you pick to minimize single points of failure, and to scale well?
- Use a multiple control-plane topology for your service mesh, which installs a
control-plane in each cluster.
Which technique is used to identify services that reside outside of your service
mesh?
- ServiceEntries are tagged with MESH_EXTERNAL when they reside outside the service
mesh.
Which of the following is the process of importing feature values computed by your
feature engineering jobs into a featurestore?
- Feature ingestion
What are the two methods feature store offers for serving features?
- Batch serving and Online serving
Which of the following are the requirements to build an effective machine learning
model?
- All of the options are correct.
Which of the following statements are true regarding the ML.BUCKETIZE function?
- Both options are correct.
True or False: Feature Engineering is often one of the most valuable tasks a data
scientist can do to improve model performance, for three main reasons: 1. You can
isolate and highlight key information, which helps your algorithms "focus" on
what’s important. 2. You can bring in your own domain expertise. 3. Once you
understand the "vocabulary" of feature engineering, you can bring in other people’s
domain expertise.
- True
Which of the following statements are true regarding the ML.EVALUATE function?
- All of the options are correct.
Your development team is about to execute this code block. What is your team about
to do?
- We are compiling our Cloud Dataflow pipeline written in Java and are submitting
it to the cloud for execution.Notice that we are calling mvn compile and passing in
--runner=DataflowRunner.
True or False: The Filter method can be carried out in parallel and autoscaled by
the execution framework:
- True: Anything in Map or FlatMap can be parallelized by the Beam execution
framework.
Which of these accurately describes the relationship between Apache Beam and
Dataflow?
- Apache Beam is the API for data pipeline building in Java or Python and Dataflow
is the implementation and execution framework.
True or False: A ParDo acts on all items at once (like a Map in MapReduce).
- False
What is one key advantage of preprocessing your features using Apache Beam?
- The same code you use to preprocess features in training and evaluation can also
be used in serving.
True or False: In TensorFlow Playground, in the output layer, the dots are colored
orange or blue depending on their original values. The background color shows what
the network is predicting for a particular area. The intensity of the color shows
how confident that prediction is.
- True
True or False: In TensorFlow Playground, orange and blue are used throughout the
visualization in slightly different ways, but in general orange shows negative
values while blue shows positive values.
- True
True or False: We can create many different kinds of feature crosses. For example:
• [A X B]: a feature cross formed by multiplying the values of two features. • [A x
B x C x D x E]: a feature cross formed by multiplying the values of five features.
• [A x A]: a feature cross formed by squaring a single feature.
- True
Fill in the blanks: In the __________ layers, the lines are colored by the
__________ of the connections between neurons. Blue shows a _________ weight, which
means the network is using that _________ of the neuron as given. An orange line
shows that the network is assigning a __________ weight.
- Hidden, weights, positive, output, negative
Fill in the blank: The ______________ _______________ is the most important concept
of tf.Transform. The ______________ _______________ is a logical description of a
transformation of the dataset. The ______________ _______________ accepts and
returns a dictionary of tensors, where a tensor means Tensor or 2D SparseTensor.
- Preprocessing function
What can happen when team members don't feel psychologically safe?
- Moments of learning are lost.
What is your team's clear and compelling goal that it strives to achieve?
- Mission
Which bias is the tendency to find information, input, or data that supports your
preconceived notions?
- Confirmation bias
Which type of IT role does Google recommend as a possible new SRE hire?
- Systems administrator
Which Google team can support you in jumpstarting your SRE implementation?
- Google Cloud Professional Services team
What practice does Google recommend that you establish before forming your first
SRE team?
- Blameless postmortem culture
What does a blameless postmortem not help with?
- Decreasing engineering costs incurred after launch
What often accompanies toil automation that leaders should be prepared for?
- Resistance to change
Which is the term that describes breaking down the silos and closing gaps between
development and operations teams?
- DevOps
What can you build with your team by acknowledging your own fallibility as a
leader?
- Psychological safety
What does Google recommend you do with the four golden signals?
- Monitor the system
You've decided to adopt SRE practices and culture in your company. As change begins
to happen, you notice that Naveen, one of your operations managers is avoiding new
protocols and continuing with his normal work routine. In which group of people
would you categorize Naveen?
- Bystander
Your team members are unsure what goals they are trying to achieve within the team.
What part of your team vision should you work to clarify?
- The mission
Which type of SRE team implementation does Google recommend for an organization's
first SRE team?
- Kitchen Sink
Your developers have felt inundated with too many manual and repetitive tasks that
are tied to the production service. What is this called?
- Toil
Which DevOps pillar led to Google SRE practices, such as SLOs and error budgets,
that promote shared ownership between developers and SREs?
- Reduce organizational silos
SREs are regularly on-call and required to solve problems fast. What is a primary
skill SREs need for this?
- Troubleshooting
Which TWO of the following statements is TRUE when discussing the Organization
Policy Service?
- To define an Organization Policy, you will choose and then define a constraint
against either a Google Cloud service or a group of Google Cloud services.
- Organization Policy Services allow centralized control for how your
organization’s resources can be used.
Which of the following TWO statements about Google Cloud service accounts are TRUE?
- Service accounts are a type of identity.
- Virtual Machine (VM) instances use service accounts to run API requests on your
behalf.
Which TWO of the following statements is TRUE with regards to security in BigQuery
and its datasets?
- BigQuery has its own list of assignable IAM roles.
- A BigQuery Authorized View allows administrators to restrict users to viewing
only subsets of a dataset.
Which TWO of the following statements are TRUE when discussing storage and BigQuery
best practices?
- Do not use any personally identifiable information as object names.
- One option to serve content securely to outside users is to use signed URLs.
Which TWO of the following statements are TRUE when discussing Cloud Storage and
IAM permissions?
- Using deny rules prevent certain principals from using certain permissions,
regardless of the roles they're granted.
- Access can be granted to Cloud Storage at the organization, folder, project, or
bucket levels.
Which TWO of the following statements about Application Security are TRUE?
- Applications are the most common target of cyberattack.
- Applications in general, including many web applications, do not properly protect
sensitive user data.
Which TWO of the following vulnerabilities are scanned for when you use Web
Security Scanner?
- Mixed content.
- Outdated or insecure libraries.
Which TWO of the following statements are TRUE when discussing the threat of OAuth
and Identity Phishing?
- Being "hacked" on a social site can lead to being "hacked" on more critical
websites, depending on your social site's account settings.
- Even small, unimportant pieces of personal data need to be secured from phishing
attacks.
"Kubernetes service account" and "Google service account" are different names for
the same type of service account.
- False
Which of these Google Cloud compute services provides environments for execution of
code, in which users don't have to worry about infrastructure management? Choose
all that are correct (2 correct answers).
- Cloud Functions
- App Engine
Which statements are true about cloud computing? Mark all that are true (2 correct
answers).
- Customers pay for the resources they use or reserve.
- Customers who need more resources can get them rapidly
Within which of these Google Cloud geographic scopes are network latencies
generally less than 1 millisecond? Choose all that are correct (2 correct answers).
- Region
- Zone
What is the base-level organizing entity for creating and using Google Cloud
resources and services?
- Project
At what level in the Google Cloud resource hierarchy is billing set up?
- Project
Which of these ways to interact with give you access to the gcloud and kubectl
commands? Choose all that are correct (2 correct answers).
- Cloud Shell
- Cloud SDK
You are developing a new product for a customer and need to implement control
structures in Google Cloud to help manage the Google Cloud resources consumed by
the product and the billing for the customer account. What steps should you take to
manage costs for this product and customer?
- Set up budgets and alerts at the project level for the product.
You are considering deploying a solution using containers on Google Cloud. What
Google Cloud solutions are available to you that will provide a managed compute
platform with native support for containers?
- Google Kubernetes Engine Clusters
You need to write some automated scripts to run periodic updates to the resources
in your Google Cloud environment. What tools can you install in your own computers
to allow you to run those scripts?
- The Cloud SDK
You are ready to start work building an application in Google Cloud. What IAM
hierarchy should you implement for this project?
- Create a new folder inside your organization and create projects inside that
folder for the resources.
Which of these problems are containers intended to solve? Mark all that are correct
(3 correct answers).
- It's difficult to troubleshoot applications when they work on a developer's
laptop but fail in production.
- Packaging applications in virtual machines can be wasteful.
- Applications need a way to isolate their dependencies from one another.
What is significant about the topmost layer in a container? Choose all that are
true (2 correct answers).
- An application running in a container can only modify the topmost layer.
- The topmost layer's contents are ephemeral. When the container is deleted the
contents will be lost.
When you use Kubernetes, you describe the desired state you want, and Kubernetes's
job is to make the deployed system conform to your desired state and to keep it
there in spite of failures. What is the name for this management approach?
- Declarative configuration
What is the name for the computers in a Kubernetes cluster that can run your
workloads?
- Nodes
You are classifying a number of your applications into workload types. Select the
stateful applications in this list of applications. Choose all responses that are
correct (2 correct responses).
- A gaming application that keeps track of user state persistently.
- A shopping application that saves user shopping cart data between sessions.
You are deploying a containerized application, and you want maximum control over
how containers are configured and deployed. You want to avoid the operational
management overhead of managing a full container cluster environment yourself.
Which Google Cloud compute solution should you choose?
- Google Kubernetes Engine
You are choosing a technology for deploying applications, and you want to deliver
them in lightweight, standalone, resource-efficient, portable packages. Which
choice best meets those goals?
- Containers
Google Compute Engine provides fine-grained control of costs. Which Compute Engine
features provide this level of control? (2 correct responses)
- Fully customizable virtual machines
- Per-second billing
Which control plane component is the only one with which clients interact directly?
- kube-apiserver
In a manifest file for a Pod, in which field do you define a container image for
the Pod?
- spec
What are Kubernetes namespaces useful for? Choose all that are correct (2 correct
answers).
- Namespaces allow you to use object names that would otherwise be duplicates of
one another.
- Namespaces let you implement resource quotas across your cluster.
If you are deploying applications in your Pods that need persistent storage, which
controller type should you use?
- StatefulSet
What is the purpose of a Service? Choose all that are true (2 correct answers)
- To allow you to choose how Pods are exposed
- To provide a load-balancing network endpoint for Pods
You are designing an application, and you want to ensure that the containers are
located as close to each other as possible, in order to minimize latency. Which
design decision helps meet this requirement?
- Place the containers in the same Pod.
You have deployed a new Google Kubernetes Engine regional cluster with four
machines in the default pool for the first zone and left the number of zones at the
default. How many Compute Engine machines are deployed and billed against your
account?
- Twelve. (Four nodes are deployed in each of three zones. A control plane node is
deployed in each zone which is indirectly billed against your account through the
cluster management fee.)
Which Kubernetes component does the kubectl command connect to in order to carry
out operations on a cluster?
- kube-apiserver
You need to ensure that the production applications running on your Kubernetes
cluster are not impacted by test and staging deployments. Which features should you
implement and configure to ensure that the resources for your production
applications can be prioritized?
- Configure Namespaces for Test, Staging and Production and configure specific
Kubernetes resource quotas for the test and staging Namespaces.
When configuring storage for stateful applications, what steps must you take to
provide file system storage inside your containers for data from your applications
that will not be lost or deleted if your Pods fail or are deleted for any reason?
- You must create Volumes using network based storage to provide durable storage
remote to the Pods and specify these in the Pods.
You want to deploy multiple copies of your application, so that you can load
balance traffic across them. How should you deploy this application's Pods to the
production Namespace in your cluster?
- Create a Deployment manifest that specifies the number of replicas that you want
to run.
Which technology relies on models to analyze large amounts of data, learn from the
insights, and then make predictions and informed decisions?
- Machine learning
You’re watching a video on YouTube and are shown a list of videos that YouTube
thinks you are interested in. What ML solution powers this feature?
- Personalized recommendations
How do data analytics and business intelligence differ from AI and ML?
- Data analytics and business intelligence identify trends from historical data,
whereas AI and ML use data to make decisions for future business.
Which dimension for measuring data quality means that the data conforms to a set of
predefined standards and definitions such as type and format?
- Validity
What does the consistency dimension refer to when data quality is being measured?
- Whether the data is uniform and doesn’t contain any contradictory information.
Google's AI principles are a set of guiding values that help develop and use
artificial intelligence responsibly. Which of these is one of Google’s AI
principles?
- AI should be socially beneficial.
Which option refers to the use of technologies to build machines and computers that
can mimic cognitive functions associated with human intelligence?
- Artificial intelligence
Which feature of Vertex AI lets users build and train end-to-end machine learning
models by using a GUI (graphical user interface), without writing a line of code.
- AutoML
An online retailer wants to help users find specific products faster on their
website. One idea is to allow shoppers to upload an image of the product they’re
looking to purchase. Which of Google’s pre-trained APIs could the retailer use to
expand this functionality?
- Vision API
Google Cloud offers four options for building machine learning models. Which is
best when a business wants to code their own machine learning environment, the
training, and the deployment?
- Custom training
A large media company wants to improve how they moderate online content. Currently,
they have a team of human moderators that review content for appropriateness, but
are looking to leverage artificial intelligence to improve efficiency. Which of
Google’s pre-trained APIs could they use to identify and remove inappropriate
content from the media company's website and social media platforms.
- Natural Language API
Anthony Dylan has an On the Rise folder saved in his My Drive. He decides to invite
Sherrie West and Seroja Malone to access the folder. Who now owns the content found
in the folder?
- Anthony Dylan
Sherrie West has On the Rise employee files saved in her My Drive. What can she as
the owner do with these files? Select all that apply.
- She can share a file link
- She can add collaborators
- She can move the files
- She can delete the files and restore them from the trash
Seroja Malone has just added the file “French baguette” to her On the Rise recipes
folder, stored in her My Drive. Sherrie West has Viewer permissions to the folder.
What can she do to the “French baguette” file?
- She can view the file
Seroja Malone gives her head baker access to the “French baguette” file. She
assigns the baker as an Editor. Which of the following can he do? Select all that
apply.
- He can view the file
- He can edit the file
Kaina Gao, Global Marketing and Sales recently attended an international conference
about top trends in the bakery industry. She wants to create a new folder in her My
Drive where she can store all the conference handouts and her personal notes. How
does she do this? Select all that apply.
- Open Drive, select the My Drive label, then select New and choose Folder from the
menu
- Open Drive, select the My Drive label, right click on an open spot in the file
list and select New folder from the menu
Kaina Gao is working on a new file called “Bakery Trends”, located in her My Drive
“OTR Marketing” folder. How can she add a shortcut back to her “Conference Notes”
folder in her My Drive?
- She can right click on the OTR Marketing folder, Select Organize then Move and
place it in her Conference Notes folder
Sherrie West needs to search for an On the Rise Google Sheet in her My Drive.
Unfortunately, she can’t remember the name of the file. What are some ways she can
narrow her search? Select all that apply.
- She can manually search by content type
- She can select Advanced search and choose a date range
- She can manually search by recent collaborators
- She can right click on the folder where the file is stored and select Search
within
Sherrie West is a member of many shared drives. How can she set up her Google drive
to only see the ones that she uses most often?
- Right click on the shared drives she does not use and select Hide shared drive
from the menu
Sherrie West has just created a new file named “On the Rise employee onboarding”.
Thomas asks Sherrie to move the file to the On the Rise shared drive as opposed to
keeping it in her My Drive. Why might Thomas ask this? Select all that apply.
- This way the file is owned by everyone in the shared drive
- This way the file is available even if Sherrie leaves the company
There is a folder in the On the Rise shared drive called “Conference material”.
This folder is full of old files that are no longer used. How can Thomas Omar
delete these files from the shared drive? Select all that apply.
- He can select the files, and then select Move to trash
- He can drag all the files to the Trash
Seroja Malone would like to use the “On the Rise’ Google Docs template created by
Sherrie West. What does she need to do?
- Select New, Google Docs, then From a Template, then choose the On the Rise
template
Sherrie West often needs to list On the Rise job postings. She creates these files
in Google Docs and likes them to have the same style. How can she create a template
that she can easily re-use?
- Create a Google Doc OTR Job Posting to use as the template, then open the
template gallery for Google Docs, select On the Rise, then choose Submit template
Seroja Malone is traveling and knows she won’t have an active internet connection.
She is working on a Google Sheet named “Ingredient list”. How can she make this
file available for offline viewing?
- She can right-click on “Ingredient list” from the files list and select Available
offline
Yousef has a series of spreadsheets that he has created in Microsoft Excel. Which
of the following statements are true? Select all that apply.
- Yousef can view Microsoft Excel spreadsheets using Google Sheets
- Yousef can upload Microsoft Excel spreadsheets to Google Drive
On the Rise store owner Yousef Amadi wants to create an inventory sheet for his
employees. How does he create a new Google Sheets spreadsheet? Select all that
apply.
- Type sheets.new in the browser address bar
- Go to Google Drive, select New, then select Google Sheets
Now, Thomas wants to add some data to the Sheet. What are some of his options?
Select all that apply.
- Import it from a Microsoft Excel file
- Manually add the data
- Copy and paste it from another spreadsheet
- Paste it from within the same Google Sheet
On the Rise partner owner Thomas Omar is reviewing a Google Sheet named “On the
Rise Monthly Sales Figures.” He’d like to better analyze the data by filtering the
data. What does he need to do?
- Select one or more cells, open the Data menu, hover over Filter views, then
select Create a new filter view
Seroja wants her Sheet to include a header row that does not move when viewers
scroll through the spreadsheet. How does she set this up?
- She can select the row she wants, open the View menu, then choose Freeze and 1
row
Anthony Dylan is working on a Google Sheet that includes many long text strings. He
notices that the text keeps overflowing onto the adjacent cell. How can he format
his Sheet in order to fix this issue?
- He can select Text wrapping
Thomas Omar is working on a Google Sheet with sales data from On the Rise stores in
the Asia Pacific region. He’d like to see an average sale price. This data is found
in cells J3 through J44. Which of the following formulas should he use?
- =AVERAGE(J3:J44)
Seroja makes some changes in “On the Rise marketing data,” but later decides she’d
like to return to the version shared by Kaina Gao. What does she need to do?
- Select File, Version history, then See version history, choose the version from
the correct point in time, and then select Restore this version
Thomas wants to share a Google Sheets spreadsheet with On the Rise store owner
Yousef Amadi. He’d like him to be able to download and print the file but not make
any changes. What type of collaborator role should he assign to him?
- Viewer
Anthony is working on the Google Sheet when he notices that Sherrie is online as
well. Anthony would like clarification regarding a few comments that Sherrie has
left him. What is the best way for Anthony to collaborate with Sherrie?
- Use Google Chat to message her directly in the Google Sheet
Thomas is reviewing a Google Sheet named “On the Rise forecast report.” He’d like
to leave a comment on cell A22. What does he need to do?
- Place his cursor on cell A22, select Add a comment, type his comment, and select
Comment
What is the keyboard shortcut LookML developers can use to place themselves into
Development mode? Please choose the best answer.
- Control + Shift + D.
What role most often manages the creation, configuration and ongoing maintenance of
the Looker platform LookML project version control? Please choose the best answer.
- Looker administrator.
Where would a data explorer end user notice new LookML code you wrote, committed
and implemented as a LookML developer? Please choose the best answer.
- Explores.
LookML developers can use Looker’s SQL Runner feature to investigate and modify any
query.
- True
LookML developers cannot write, commit, or implement LookML code unless active
Developer mode in the Looker platform.
- True
All users can access, read, and write to LookML files in Production mode.
- False
What are the fundamental components Looker uses to generate a complete SQL query?
Please choose the best answer.
- Model, Explore, fields, filter, sort order.
The Looker platform can connect to other SaaS platforms, but specifically NOT
business planning or web analytics solutions.
- False
Which of these features central to the value proposition of the Looker platform
empowers the self-service of data viewers and data explorers by allowing them to
work with and visualize data without writing SQL? Please choose the best answer.
- Looker agile modeling layer.
The number dimension type is the default dimension type assigned by Looker to a
newly created dimension.
- False
Which option does NOT represent an example of a dimension? Please choose the best
answer.
- The entirety of a data table.
Which of these scenarios is possible using LookML? Please choose the best answer.
- Measuring the percentage of a COUNT function result.
What is the definition of a measure in Looker? Please choose the best answer.
- It leverages aggregate functions similar to those found in SQL to represent rows
of data.
When you create a new LookML dashboard, what's the filename convention used? Please
choose the best answer.
- new_dashboard.dashboard.lookml.
What is the default type given to a filter if one is not defined by a LookML
developer? Please choose the best answer.
- string.
How many different relationship parameters exist for how tables relate to one
another? Please choose the best answer.
- Four (4).
A one-to-many type join can result in fanout if symmetric aggregates are not
properly applied.
- True
The LookML parameter explore_source corresponds to what part of a SQL query? Please
choose the best answer.
- FROM.
Developers can implement caching in Looker to improve speed of query results.
- True
In what type of file contained within a LookML project would a LookML developer
write code for a native derived table? Please choose the best answer.
- View file.
Which of these terms is NOT used to identify new tables or sub-selects in SQL?
Please choose the best answer.
- Queries.
To what does a LookML developer add and apply a datagroup? Please choose the best
answer.
- Explore.
Where in the Looker user interface can someone best and most easily write SQL
queries for a SQL derived table? Please choose the best answer.
- Looker’s SQL Runner.
An Explore MUST be utilized for its LookML code to construct a native derived
table.
- False
End users and LookML developers alike can create their own derived tables for their
respective use cases.
- False
What is the recommended naming convention for persistent derived tables? Please
choose the best answer.
- _____.scratch.
Filter parameters can be used to apply filters to a native derived table using the
same syntax as a filtered measure.
- True
In what language are native derived tables written? Please choose the best answer.
- LookML.
Persistent derived tables remain stored within the Looker platform, just like other
derived tables.
- False
Developers can successfully utilize derived tables to roll up user data to the
month time level in order to track periods of (in)activity and analyze retention.
- True
Which of the following steps is part of continuous integration and delivery (CI/CD)
but not continuous training (CT)?
- Building the model
How does end-to-end MLOps help ML practitioners with the machine learning life
cycle?
- End-to-end MLOps helps ML practitioners efficiently and responsibly manage,
monitor, govern, and explain ML projects throughout the entire development
lifecycle.
What is the MLOps life cycle iterative process that retrains your production models
with the new data?
- Continuous training
What component of an ML pipeline is responsible for deploying the model to any edge
devices?
- Upload model and deploy endpoint
You have several complex projects spanning multiple files, with complex
dependencies. You also need to collaborate and share notebooks. Which notebook
solution offers the best option?
- Workbench instances
When should you use Vertex AI Workbench instances instead of Colab Enterprise?
- All of the above
You have a use case that requires using BigQuery, Dataproc, and Spark. Which of
these is available from the instance GUI?
- BigQuery
You want to use Colab Enterprise. You can create a Colab Enterprise notebook and
run code in it without needing to understand runtimes. When you run your code for
the first time, Colab Enterprise provides a default runtime and runs your code on
it. To configure a runtime for specific needs, you must:
- Create a runtime template with the configuration that you need, then create a
runtime based on that template, then connect to the runtime from your notebook and
run your code.
You have an existing Workbench instance and want to add a GPU to the instance. How
can you modify a Workbench instance configuration after it has been created?
- Stop the instance, then modify the hardware configuration, then click the submit
button.
Which type of DNS record determines where mail destined for your domain is routed?
- MX Record
What are common uses for a DNS TXT record when using Google Workspace? (Choose 2)
- Email security records
- Domain verification
You need to make a change to your MX records and you want the change to be
implemented as soon as possible. What approach can you take?
- Make the change in your DNS console and reduce the Time to Live (TTL) value to 1
hour. Once the change has been implemented revert the TTL value to 24 hours
In general, from where would you manage your domain's DNS records?
- In your domain registrar console
What policy defines what to do if an incoming message is not authenticated?
- DMARC
You have been asked to implement DomainKeys Identified Mail (DKIM) for your
organization. How would you do this?
- Generate a DKIM record from Apps > Google Workspace > Gmail > Authenticate email.
Add the record to your DNS records and then start authentication from the admin
console
DKIM adds an encrypted signature to the header of all outgoing messages. What
happens if you don't turn on email signing with your own domain DKIM key?
- Gmail signs all outgoing messages with this default DKIM domain key
d=*.gappssmtp.com
You have enabled protection against anomalous attachment types in emails from the
Gmail > Safety page but you are finding some emails with valid attachment types are
not being delivered. How can you resolve this?
- Add an allowlist of allowable file types to the entry in the Attachments section
on the Safety page
The attachment section in the Gmail Safety settings page allows you to protect
against malicious attachments. What actions can you perform on a suspicious
attachment? (Choose 2)
- Move email to spam
- Keep email in inbox and show warning
Google recommends against the use of the Image URL proxy allowlist?
- True
What are valid reasons for allowing per-user outbound gateways in your
organization? (Choose 2)
- An outbound gateway can prevent the appearance of "on behalf of" addresses in the
From field
- An outbound gateway ensures that the same mail server delivers all messages from
otherdomain and that server has a record that the mail has been sent
Messages from a single person that you trust are being marked as spam by Gmail.
What approach is best to ensure that these messages reach the intended recipients
inboxes?
- Add a spam setting which bypasses spam filters for messages received from
addresses within an approved senders list. Add the user's email address to the list
Your organization has been receiving unwanted emails from another organization, and
attempts by you to get the organization to stop sending the emails have failed.
What approach is best to stop messages from this organization from reaching your
users?
- Configure a blocked senders list and add the domain name to the list
In which type of compliance control can you apply a Data Loss Prevention (DLP) rule
for Gmail?
- Content compliance
Which statements are true for an objectionable content rule? (Choose 2)
- In an objectionable content setting you create word lists for filtering for
objectionable content
- An objectionable content setting works on inbound and outbound messages
You want to prevent your users from receiving mail from baddomain.com. What is the
best way to achieve this?
- Add baddomain.com to a blocked senders list
What advantages does a routing setting have over an outbound gateway when you need
to route mail through an external mail server?
- All of the options here
Which features in Google Workspace can be used to leverage Google's spam protection
for users who are on a non-Gmail mail platform? (Choose 2)
- Non-Gmail mailbox
- SMTP Relay service
What must you define before you can change the route in a routing setting?
- A mail host
Which four of these apps are Google Workspace core services that are covered in the
Google Workspace Terms of Service? (Choose 3)
- Google Calendar
- Google Drive
- Sites
What is the correct pathway in the admin console to getting to Google Workspace
core services list?
- Admin Console > Apps > Google Workspace
For a domain that has implemented an organizational hierarchy, at what levels can
Google Workspace services such as Sites and Gmail be turned on AND off? (Choose 2)
- At the group level
- At the OU level
Which of the following settings cannot be set from the Gmail service settings?
- Default language
Which of these settings do the users control from their Gmail settings? (Choose 2)
- Add POP3 accounts to the user’s inbox
- Display language for the Gmail interface
A user left your company last month and you deleted their Google Workspace account
15 days ago. You have been contacted as the administrator and asked if you can
recover the deleted user's documents. What should you do?
- Restore the user, transfer the files to a new owner, and delete the user again.
Your company allows external sharing of documents but your CEO is concerned about
how documents are shared externally. As the administrator, which additional
protections might you put in place? (Choose 2)
- Enable the feature that warns users when sharing outside the organization
- Require a Google sign in when viewing a shared file
Your company wants to adopt the policy that new documents will be shared internally
with everyone in the company. This way users won’t have to explicitly share new
documents with others. What’s the recommended way to set this up?
- Change Link Sharing Defaults to "ON - Primary target audience with the link"
From which places can you transfer file ownership from one user to another? (Choose
2)
- From the Drive and Docs service settings page
- When deleting a user from the admin console
What actions can you take as administrator from the Managed shared drives area in
the admin console? (Choose 3)
- Manage shared drive sharing settings
- Restore a deleted drive or files
- Manage members
Which of the following features are only available in advanced management? (Choose
2)
- Device approvals
- Android work profiles
An end user in your organization has lost their device. This is a personal device
with a work profile. Based on this training, what would be your next step?
- Wipe the device to remove the user's work profile
What icon do you click on the admin console in order to access the Google Device
Management toolset?
- Devices
How can you automatically manage a device that falls out of compliance with your
organization's policies?
- Add a device management rule
What information can you find on the main report (the highlights) page? (Choose 3)
- Apps usage
- External file sharing
- Users account status
Your IT manager would like to know what changes have been made to your Google
Workspace organizations settings. Where would you find this information?
- Admin audit log
Your organization has just purchased another company that has their own domain.
They will be using Google Workspace and you want them to be able to continue
receiving email to their existing address. What approach would you take?
- Add the new domain as a new (secondary) domain to your Google Workspace account.
Your company regularly works with another company that also uses Google Workspace
and you wish to make it easier for users to collaborate using Drive. What action
would you take?
- Add their primary domain, subdomains and any aliases to your list of
trusted/allowed domains
What must you do before you can start to use Google Workspace services?
- Verify that you own the domain that you want to associate with Google Workspace.
What type of DNS record allows receiving mail servers to verify that the sending
servers are authorized to send mail on your domain’s behalf?
- Sender Policy Framework (SPF) record.
Typically how long after new features are released to the Rapid release track will
they be released on the Scheduled release track?
- At least 1 week
Your company just acquired a 100-employee startup and you quickly need to add the
new employees to your domain. Using the Admin console, which is the most efficient
way to add new users all at once?
- Add all the new users at once from a .csv file.
Which of the following are required when adding multiple users via a CSV file?
(Choose 2)
- First Name
- Password
You have created an Announcement group and you want to ensure that all users in
your organization receive emails sent to the group. How would you do this?
- Check the 'Add all current and future users of <your company> to this group'
setting when adding members for the first time.
Once you have created your resources, how do you manage the resource calendar
settings?
- From Google Calendar.
When you delete a user, which of the following can be transferred to a new owner?
- Calendar.
- Email Address.
To allow a single user to receive email in their Gmail inbox addressed to multiple
addresses you would add?
- An email alias.
You want to enable Blogger for your full-time employees but restrict access to your
contractors. Which method could be used to do this?
- Move the contractors into an OU and turn off Blogger for that OU.
Which of these statements are true about Google Workspace OUs? (Choose 2)
- A user may belong to one OU only.
- A Google Workspace account may contain multiple OUs.
A user can change all the settings below from their About me page but which are
editable by default? (Choose 2)
- Birthday.
- Work Location.
Users across your organization regularly email your suppliers and would like to
have Google Workspace automatically auto-complete their email addresses in Gmail.
What should you do?
- Use the Domain Shared Contacts API to add these external users to your directory.
What can you add to a user's profile that can be used by Google as a login
challenge when they suspect that an unauthorized person is trying to access a
user’s account.
- Employee ID.
When assigning an administrative role to a single user, where in the user's account
page do you assign the role?
- Admin roles and privileges
What’s the recommended way to create a custom administrator role for your domain?
- Create a new role and choose the required privileges.
Your organization is made up of multiple companies. You want each company to have
its own set of users with their own email addresses. What type of domains would you
use?
- A primary domain for the first company, and a secondary domain for each
additional company.
How can you ensure that messages forwarded from your legacy mail servers to Gmail
are not classified as spam by Google?
- Configure the inbound gateway setting in Google Workspace.
During the Core IT phase how can you ensure that a message sent from a user on the
legacy platform to a Core IT user is correctly delivered to their Gmail inbox?
- Setup a domain alias in Google Workspace and create forwarding rules for each
Core IT user to forward intradomain messages to the shadow domain in Google
Workspace.
A message is sent to Gmail to a valid user in your organization but the user has
not yet been provisioned in Google Workspace. How can you ensure this mail is not
lost and can be delivered to the intended recipient?
- Configure the default routing policy in Google Workspace to catch any
unrecognized addresses and route those back to the legacy system.
When considering what data to migrate (mail, calendar and contacts) for the Global
Go-Live, which of the following is considered best practice?
- Migrate only what you need.
Which Google tool would you use to perform a server side migration from Microsoft
Exchange to Google Workspace?
- GWMME.
Which of the following are considered best practices for data migration?
- All of the options here.
During a deployment, what calendar coexistence challenges will your users face?
- All of the options here.
In a typical organization, what is the percentage of people who can adapt to change
independently?
- Less than 20%
Which of the following statements about the Proof Key for Code Exchange (PKCE)
extension are true? Select two.
- PKCE uses a one-way hash to prove the identity of the app.
- The authorization code grant type with PKCE should be used instead of the
implicit grant type.
Which of the following statements about JWTs are true? Select two.
- Apigee provides policies for generating and verifying JWTs.
- JWTs can be validated without sending them to a token server.
Which OAuth grant type should be used for untrusted apps that need access to user
data?
- Authorization code grant type
Why does the client credentials grant type not use refresh tokens?
- Refresh tokens are only used when user credentials are necessary.
Which of the following policies are used to protect against parsing attacks? Select
two.
- XMLThreatProtection policy
- JSONThreatProtection policy
Which of the following data stores does Apigee use when proving the proxy's
identity to the backend service?
- Keystore
Which of the following statements about KVMs are true? Select two.
- Keys and values must both be strings.
- When the KeyValueMapOperations policy is being used, values from a KVM may only
be retrieved into private variables.
Organizations are developing their own AI principles that reflect their mission and
values. What are the common themes among these principles?
- A consistent set of ideas about transparency, fairness, accountability, and
privacy.
My customer wants to have a direct deal for CCAI, and not buy through an OEM
partner or CCAI Platform. Can I do that? (Choose three)
- Yes, a third-party ISV offers a CCAI connector for the customer’s contact center.
- Yes, the customer will not need live voice features
- Yes, the customer’s telephony partner offers "bring your own AI" with a prebuilt
CCAI integration.
Which of these connectivity protocols does CCAI support for live voice
integrations? (Choose three)
- SIPREC
- SIP
- gRPC
A customer wants to upgrade their DTMF-based IVR with a virtual agent. When the
virtual agent cannot contain the call, the customer wants the call routed to a
relevant department with all of the context from the virtual agent. Which of these
integration options should you consider? (Choose two)
- CCAI Platform
- Partner integration or connector
Which of the following are sent through telephony integration’s gRPC to the CCAI
APIs? (Choose three)
- Session parameters
- Programmatic events that change the conversation state
- The caller’s audio stream
Google support asks you to share an audio recording of a problem behavior you’ve
reported with your telephony experience. Which of the following considerations
should you take: (Choose two)
- Check that the caller and agent audio are in separate files, or separate channels
of a stereo audio.
- Record calls from your CCAI contact center solution.
Which of the following features could help reliably authenticate users to your
virtual agent? (Choose three)
- I can cross-reference Caller ID with a DTMF-collected pin code
- I can use a regexp entity and collect an alpha/numeric ID with required form-
filling
- I can lookup known users from Caller ID then use Speaker ID to tell me which one
is speaking
Your virtual agent has trouble understanding users. When you check Dialogflow
conversation history, the transcripts do not match what the user said. You enable
Dialogflow’s audio export bucket to record some calls that exhibit the issue and
notice the speech is clear and understandable. How might you fix this?
- Configure a different Google speech model better suited for my use-case.
- Specify manual speech adaptations for the phrases I want to transcribe correctly.
- Ensure that I collect alpha/numeric sequences (like 12345678 or ABCD1234) through
form-filling.
- Enable call companions to offer users an alternative input method.
- Check that auto speech adaptation is enabled, then make sure the agent’s training
phrases and entities contain the phrases the users are actually saying.
Which of the following are returned from the CCAI APIs through the telephony
integration’s gRPC. (Choose three.)
- Programmatic events that change the conversation state
- Start of speech detection
- Session parameters
When you test your virtual agent through your telephony integration, you experience
long periods of silence before hearing a response to your inputs. How might you fix
this? (Choose four)
- Specify a different speech model.
- Contact my integration owner for troubleshooting any networking or other
processing issues.
- Check the performance of my fulfillments’ webhooks.
- Enable advanced timeout-based endpointing and increase the sensitivity slider.
Your employer asks you to design an AI-driven multi-channel automated voice and
text solution across telephone, website, and social media. Which approach should
you take?
- Integrate voice, web, and social channels in one solution architecture with a
common Dialogflow virtual agent.
Which are useful components when building custom Neural Network models?
- All of the options are correct.
Which API is used to build performant, complex input pipelines from simple, re-
usable pieces that will feed your model's training or evaluation loops.
- tf.data.Dataset
Non-linearity helps in training your model at a much faster rate and with more
accuracy without the loss of your important information?
- True
How does Adam (optimization algorithm) help in compiling the Keras model?
- Both by updating network weights iteratively based on training data by diagonal
rescaling of the gradients
During the training process, each additional layer in your network can successively
reduce signal vs. noise. How can we fix this?
- Use non-saturating, nonlinear activation functions such as ReLUs.
What is the significance of the Fit method while training a Keras model?
- Defines the number of epochs
Which file is the entry point to your code that Vertex AI will start and contains
details such as “how to parse command-line arguments and where to write model
outputs?
- task.py
Fill in the blanks. When sending training jobs to Vertex AI, it is common to split
most of the logic into a _________ and a ___________ file.
- task.py, model.py
When you package up a TensorFlow model as a Python Package, what statement should
every Python module contain in every folder?
- an init_.py
To make your code compatible with Vertex AI, there are three basic steps that must
be completed in a specific order. Choose the answer that best describes those
steps.
- First, upload data to Google Cloud Storage. Next, move code into a trainer Python
package. Then submit your training job with gcloud to train on Vertex AI.
Fill in the blanks. You can use either pre-built containers or custom containers to
run training jobs. Both containers require you specify settings that Vertex AI
needs to run your training code, including __________, ____________, and ________.
- Region, display-name, worker-pool-spec
Which of the following describes a discipline that uses vast volumes of data and
complex algorithms to train a model?
- Deep learning
Which API lets you understand your video's entities at shot, frame, or video level?
- Video Intelligence API
Which API lets you perform complex image detection with a single REST API request?
- Vision API
Which of the following is NOT a pre-trained Machine learning model on Google Cloud?
- Tensorflow
When creating a dataset for use in ML training, which of the below are the best
practices to keep in mind?
- For faster iteration, consider training on just a sample of your dataset
True or False: Because of the learning nature of ML Models, you will spend very
little time cleaning and processing your datasets
- False
Select the statements below that are an accurate description of machine learning:
Select all 3 correct answers.
- An iterative cycle of continual data research, model refinement, and insights
through a learning feedback loop
- A method of replacing heuristic rules and hardcoded logic trees with learning
models
- A potentially viable option if you need to perform predictive analysis like "What
is my revenue going to be next quarter?"
What does a sentiment score of -1.0 at a magnitude of 1.0 represent for text that
has been processed through the NLP API?
- A strongly negative sentiment
Which critical step is missing from the below model phases? 1. Ingest data, 2. ? 3.
Build a Training Dataset, 4. Create a Model, 5. Evaluate your Model, 6. Make
Predictions
- Preprocess data
What is the term for a resource that can fail without impacting the availability of
data?
- Failure domain
Which term describes the time it takes for data to travel from one location to
another?
- Latency
As a cloud security analyst, you have been hired to assist with a company’s digital
transformation. The company’s management team has informed you that security is
their highest priority. Based on this information, what type of hypervisor should
the company choose and why?
- Type 1, because it replaces the operating system of the underlying computer
What is virtualization?
- Technology that creates a virtual version of physical infrastructure
What are two advantages of packaging software in containers? Select two answers.
- Containers enable users to run software quickly from one computing environment to
another.
- Containers use less memory and fewer resources.
In the cloud, what is the term for computation performed by a physical computer in
a remote environment?
- Compute
A small independent book publisher considers moving its data storage to the cloud.
What are two potential benefits of this change? Select two answers.
- The publisher will be able to store more data.
- The publisher will save money.
What data type includes names, addresses, credit card numbers, and dates?
- Structured data
A music recording studio wants to store and organize a large amount of unstructured
data in the form of audio files. Which type of cloud storage should they choose?
- Buckets
A cloud service provider has data centers in multiple physical locations. One data
center experiences an outage, but users are not affected since the cloud service
provider’s resources are spread across many data centers. What cloud computing
concept is this an example of?
- Redundancy
A cybersecurity analyst recommends that their team use a cloud environment with
infrastructure and resources shared among users. Which type of cloud environment
does this describe?
- Multi-tenant
A software company creates a package that contains a file with the code and
dependencies needed to run the company’s application. What is the name for this
software package?
- A container
What is the term for the practice of duplicating data stored in the cloud across
multiple failure domains to ensure it is always available?
- Redundancy
A security analyst is working with a database. The data they are using is organized
into rows and columns. What is the term for this type of data?
- Structured data
Which data storage type splits data apart and stores it in different locations to
maximize efficiency?
- Block storage
What are two types of security controls used to defend cloud resources? Select two
answers.
- Identity
- Protective
You are attempting to log in to your email from a new device. The email system
requires you to input a code it texts to your phone before you can access your
inbox. What type of security control is this an example of?
- An identity control
What is the term for a layered approach to vulnerability management that reduces
risk?
- Defense in depth
What three things can cloud users do to prevent misconfigurations from causing
security vulnerabilities? Select three answers.
- Properly manage IAM policies.
- Incorporate automation and safe security policies.
- Closely monitor resource provisioning.
Which two elements of cloud security are CSPs generally always responsible for?
Select two answers.
- Ensuring network and resource availability
- Maintaining physical infrastructure
What is the term for the implicit and explicit agreement between the customer and
the cloud service provider (CSP) regarding the accountability for security control?
- Shared responsibility model
What cloud services model was created to increase the level of trust between the
users of cloud services and the cloud service provider?
- Shared fate
What are two characteristics of the shared fate model that improve on the shared
responsibility model? Select two answers.
- The CSP and its customers have a stronger relationship.
- The CSP provides more security resources to cloud users.
What is the term for a cloud-hosted application accessed over the internet through
a web browser or mobile app?
- Software as a service (SaaS)
In which model of cloud computing does the cloud service provider (CSP) have the
least responsibility?
- Infrastructure as a service (IaaS)
A company moving its infrastructure to the cloud selects the platform as a service
(PaaS) cloud service model. In this scenario, what is the CSP responsible for?
- Supplying and managing hardware and software resources
What is the term for a method of granting users and service accounts access to a
cloud environment using IAM?
- Federation
You are configuring IAM policies for your employer. Your development team consists
of 10 people who will all need access to the same few storage buckets and virtual
machines within your cloud environment. How can you most effectively accomplish
this objective?
- Create a group for the team members, then use an allow policy to bind the group
to a role that has the needed permissions.
What is the term for a non-human identity that is typically granted to a virtual
machine, application, or service?
- Service account
An organization moves its network to the cloud. Their cloud service provider uses
load balancing, which results in faster performance and prevents interruptions. Why
does load balancing lead to this outcome? Select two answers.
- It ensures high availability of resources.
- It prevents servers from being overwhelmed with traffic.
What two factors affect customer and CSP responsibility levels under the shared
responsibility model? Select two answers.
- Industry type and regulatory framework
- Workload and level of service
You work for a large organization that uses a variety of cloud services. How can
you prevent vulnerabilities throughout your cloud assets?
- Consider how the different services’ security controls relate to each other.
What is the term for a model where the cloud service provider is involved in the
customer’s security journey?
- Shared fate
A team of 10 people in your organization need access to the same storage bucket to
do their jobs. What is the safest, most efficient way to grant them access?
- Create a group for the team, then use an allow policy to give them access
What is the term for a culture that consists of guidelines, best practices, and
tools that cloud security teams can use to collaborate?
- DevSecOps
In the mid-2000s, the DevOps framework was developed. What two benefits did this
framework provide? Select two answers.
- Software applications were monitored and tested continuously.
- Collaboration between developers and operations improved.
What process uses automation and tools to facilitate movement through each phase of
the software development lifecycle?
- Software pipeline
Developers at a software company are creating and updating code. Next, the
developers will upload the code into a shared repository. What phase of the CI/CD
pipeline is taking place?
- Continuous integration
What is the purpose of the Supply-chain Levels for Software Artifacts (SLSA)
framework?
- To provide standards for hardening an organization’s security posture
What is the term for a digital object, like a file or image, used in the software
development lifecycle?
- An artifact
What is the term for the people, processes, and tools that play a role in software
development?
- The software supply chain
An organization adopts the SLSA framework to improve their security posture. What
new security practices might the organization start using? Select two answers.
- Examine any dependencies used in an artifact using security checks.
- Use a build platform that provides protection against tampering.
How would you change the location of the virtual machine in the Terraform file?
Select two answers.
- Change the zone
- Change the region
In the Terraform code, what cloud resource does the first resource block create?
- The Virtual Private Cloud
You are preparing a presentation for Cymbal Bank's leadership that explains how IaC
can improve the security of virtual machines. Which of the following statements
should you include in the presentation? Select all that apply.
- Automation ensures developers consistently use the same configuration settings
for provisioning infrastructure.
- IaC tools may offer the ability to scan the environment for configuration drift.
- IaC tools can help you detect invalid inputs in the build process.
In the Terraform code, what does the third resource block define? Select two
answers.
- The zone of the virtual machine
- The virtual machine
What practice includes provisioning and managing computing and storage resources
using reusable scripts?
- Infrastructure as code (IaC)
A software company is considering implementing policy as code (PaC). How can PaC
improve the organization’s compliance?
- Policies can be codified to automatically identify compliance violations.
A software company decides to move from developing software with the waterfall
method to using a software pipeline. How will their software development lifecycle
change as a result?
- The process will include more automation and tools.
An organization is using the CI/CD pipeline for software development. What will
occur during the CD phase? Select two answers.
- Builds will be released to a staging environment.
- Builds will be deployed into a production environment.
A software company learns their product contains a vulnerability, and the security
team suspects the issue was caused by a third-party dependency. What can the team
consult to learn which dependencies are included in the product?
- The software bill of materials (SBOM)
As a cloud security analyst, you are using the declarative approach to configure
IaC. What is this approach used to define?
- The system’s desired state
A software company creates an app that will collect and store sensitive user data.
How can the organization use policy as code (PaC) to protect the data’s security?
- Configuring automated settings to check for compliance errors
An organization adapts the GitOps framework. What two processes might this change
include? Select two answers.
- Using continuous integration as a method for submitting pull requests
- Using IaC as a core process for automation
As a cloud security analyst, you are assigned to choose the tools your organization
will use in its software pipeline. What two goals can these tools achieve? Select
two answers.
- Enabling modular testing
- Compiling and analyzing code
A software product is in the test stage of the CI/CD pipeline when a bug is found
in the build’s code. What step will the pipeline take next?
- Stopping the process until developers fix the problem
A cloud security analyst is monitoring cloud assets for security and compliance
with best practices, regulations, and organization policy. What is this practice
called?
- Cloud security posture management
How do cloud security analysts gather information about user actions, system
activities, errors, and other security-related events in their organizations’ cloud
environment?
- They use cloud logging tools.
What is the term for a security professional who designs and develops security
controls and measures within an organization’s cloud infrastructure?
- A cloud security architect
A cloud security analyst is hired to join a team that detects and responds to
cybersecurity incidents affecting an organization. What is the name of this team?
- Security Operations Center (SOC)
A security analyst is preparing for an audit. What two tasks might be involved in
this process? Select two answers.
- Identifying and fixing gaps
- Understanding audit requirements
A cloud security analyst has been assigned to create virtual machines in Google
Cloud. What cloud shell command group can the analyst use?
- Compute
A cloud security analyst types the following code into the command line interface:
gcloud compute networks create labnet --subnet-mode=custom What is the function of
the word “labnet?”
- It is the name of the network.
A cloud security analyst is training a colleague to use Cloud Shell. Which two
tasks might the analyst teach their colleague to do with this tool? Select two
answers.
- Create virtual private clouds (VPCs).
- Create storage buckets.
A cloud security analyst is reviewing identity and access management policies and
testing security controls throughout their organization’s cloud infrastructure.
What process is the analyst working on?
- Cloud security posture management
How can cloud security analysts keep up with the latest cyber threats?
- Reading blogs and reports published by security organizations
A cloud security analyst works for an organization that is subject to legal
requirements. Which team will the analyst work closely with to ensure the
organization’s cloud resources meet these legal requirements?
- Compliance
Why is it important for cloud security analysts to balance the needs of multiple
stakeholders?
- Different stakeholders may have different security requirements.
A cloud security analyst works for an online store that has been having issues with
bots leaving spam reviews. What tool can the analyst use to address this problem?
- reCAPTCHA
A cloud security analyst is training a new coworker to use the Linux shell. What
two tasks can the analyst train their coworker to do using this tool? Select two
answers.
- Verify the status of applications in the infrastructure.
- Filter access to non-production IPs and ports.
Your manager has asked you to build a production environment. How can you achieve
this goal?
- Execute a Terraform script in Cloud Shell.
A cloud security analyst runs the command “gcloud compute networks create labnet”
in Cloud Shell. What does this command do?
- Creates a new network with the name “labnet”
What is the name of the model family that draws inspiration from physics and
thermodynamics?
- Diffusion models
You are building a virtual agent, and that virtual agent needs to determine what a
customer is trying to achieve. What enables the virtual agent to determine customer
goals?
- An Intent.
Which Dialogflow CX feature is used to change response formats from text to buttons
or Yes/No answers?
- Rich Response Messages.
What is a benefit of using Google’s translation hub, instead of a 3rd party vendor?
- 3rd party vendors are often expensive and slow.
- There are often legal implications when using 3rd party vendors.
The Google Translation API provides translation to how many different languages?
- 100+
In the Public Sector, there are often terms and words that need to be translated
consistently in a specific way to preserve their meaning. What tool can you use in
the Enterprise Translation Hub to achieve this?
- The glossary
How does Enterprise Translation Hub reduce the effort it would typically take to
translate documents?
- Formatting is preserved, so you don’t have to reformat documents.
Which Google Cloud data storage service offers ACID transactions and can scale
globally?
- Cloud Spanner
Which data storage service provides data warehouse services for storing data but
also offers an interactive SQL interface for querying the data?
- BigQuery
What data storage service might you select if you just needed to migrate a standard
relational database running on a single machine in a datacenter to the cloud?
- Cloud SQL
A budget is set at $500 and an alert is set at 100%. What happens when the full
amount is used?
- A notification email is sent to the Billing Administrator.
A cloud security analyst works in the cloud application security domain. Which task
is included in the analyst’s job description?
- Validating software security through testing
What is the term for the process of applying regulatory or voluntary standards to
meet contractual or third-party regulatory requirements?
- Compliance
What is the term for the measure of how much a situation or circumstance affects
the confidentiality, integrity, and availability of an asset?
- Risk
How can attack path simulation help an organization choose the right preventative
security controls for their cloud environment?
- Helping the organization identify where they could be attacked
A cloud security team selects and implements a new security control throughout
their organization. Where can they communicate how the control relates to their
organization’s risk management goals?
- In the team’s security plan document
A cloud security team has identified a new security control for their organization
to use. What step should the team take next?
- Develop an implementation plan
An organization installs code locks on its office doors. Only authorized employees
are given the code. What type of security control are the locks?
- Physical
Which cloud security domain focuses on high-level security that aligns with an
organization's objectives?
- Cloud concepts, architecture, and design
A cloud security team uses two factor authentication to reduce the likelihood of an
intruder accessing its cloud network. In this scenario, what is the two factor
authentication an example of?
- A cloud security control
A cloud security team is using Security Command Center to improve its security
posture. What two tasks might the security team be working on? Select two answers.
- Detecting threats to cloud services
- Resolving web application vulnerabilities
A cloud security team is working to implement cloud security controls. What two
goals can the team achieve using the controls? Select two answers.
- Safeguarding the cloud environment from vulnerabilities
- Meeting the organization’s compliance requirements
A cloud security team is deciding which cloud security controls to implement. What
process can they use to identify the right controls for their organization?
- Threat modeling
A software company’s cloud security team has identified the security controls their
organization’s cloud environment needs. What is the next task the team should
complete?
- Develop an implementation plan.
A security team has identified a new security control their organization should
implement, and the team is creating an implementation plan. What information should
the security team include in the plan?
- Policies and procedures for applying the control
An organization is using the NIST CSF to inform its new risk management plan. What
two goals can this framework help the organization achieve? Select two answers.
- Decide where to focus their time and money for cybersecurity protection
- Understand their cybersecurity risks
Which framework is used to build trust and confidence for clients about a third-
party service providers’ system?
- SOC 2
A software company is creating a new app, and the company wants to be sure it
protects its users’ data privacy. What two protections can it include to achieve
this goal? Select two answers.
- Informing users about how their personal information is used
- Letting users delete their personal information if they choose
A cooking app is able to provide grocery store recommendations based on the users’
geographic location. When users log in to the app, they can choose whether or not
to allow the app to access location information from their phone. What concept is
this scenario an example of?
- Data privacy
What two goals was the NIST Privacy Framework developed to achieve? Select two
answers.
- To create a common language for international cooperation on privacy
- To improve privacy risk management for an organization's data
A United States-based app developer expands its operations and begins collecting
data from users throughout the European Union. Which additional regulation will the
organization need to comply with after this change?
- GDPR
Who is responsible for enforcing Payment Card Industry Data Security Standard (PCI
DSS) compliance?
- Payment card brands
A cloud security team is working to adhere to PCI DSS. They have identified all
locations of cardholder data, and analyzed processes and IT assets for
vulnerabilities that could expose the data. What two steps should they take next?
Select two answers.
- Report the process to the bank and card brands they do business with
- Repair the identified vulnerabilities
A cloud security team has been assigned to manage and reduce their organization’s
cybersecurity risk, and to help leadership decide where to focus their
cybersecurity budget. What tool can the cloud security team use to achieve these
goals?
- The NIST Cybersecurity Framework
A game developer includes settings that allow its customers to be in control of how
and when their personal information is accessed and used. What practice are these
settings an example of?
- Data privacy
How can cybersecurity frameworks help organizations achieve compliance with privacy
regulations?
- Suggesting controls organizations can use to protect data
What is the purpose of the Federal Risk and Authorization Management Program
(FedRAMP)?
- To ensure compliance of third-party cloud services for government users handling
sensitive data
A cloud security team is auditing their organization’s adherence to PCI DSS. They
have identified all locations of cardholder data. What step should they take next?
- Analyze processes and IT assets for vulnerabilities that could expose cardholder
data
In the compliance report, which cloud resource is associated with the finding
related to the control AC-6?
- [email protected]
In the compliance report, what is the severity of the finding related to the
control IA-2?
- High
In the compliance report, which cloud resource(s) have been assigned public IP
addresses? Select two answers.
- instance-2
- instance-1
In the compliance report, how many user accounts do not have multi-factor
authentication (MFA) enabled?
- 5
The developer of a user-facing app includes a piece of code that repairs damage
after unauthorized activity and then notifies administrators of this action. What
type of control is this an example of?
- Corrective controls
A cloud security team has been assigned to map security controls in their
organization’s cloud environment. Which step should the team complete first?
- Identify the controls that already exist in their cloud infrastructure
How can an organization avoid spending too much time preparing for an audit?
- They should have processes in place that align with audit standards.
How can an organization demonstrate to auditors that standards have been met?
- Prepare reports on existing security controls
How do cloud hierarchies help security teams put controls in place efficiently?
- Controls set at a higher level cascade down to lower levels.
What is the term for a security control supplied by a cloud service provider?
- An inherited control
A cloud security team is setting policies in its Google Cloud environment. At which
hierarchy level should the team set company-wide controls?
- Organization
How can an organization maximize the benefit of cloud vendor inherited controls?
- Adapt the controls to fit business needs
Which two external entities may require an organization’s cloud environment to
adhere to certain standards? Select two answers.
- One of the organization’s customers
- A regulator in the organization’s state
What are some examples of changes that could be made to improve the Identification
and Authentication policy? Select two answers.
- Require a minimum password length.
- Require multi-factor authentication (MFA) for all users.
Fill in the blank: The _____ control focuses on establishing security education
policies and procedures.
- Awareness and Training
A healthcare provider operating in the United States fails to comply with HIPAA
standards. How might reputational risk affect this healthcare provider?
- Customers may lose trust in the provider.
An app includes a piece of code that repairs damage after unwanted or unauthorized
activity and then notifies administrators of this action. What is the term for this
type of security control?
- A corrective control
A security team is using a spreadsheet to map controls. They have chosen control
titles, domain categories, and descriptions to identify related controls. What two
steps should they take next? Select two answers.
- Conduct an inventory of all assets.
- Group controls by type of asset.
An organization hires a third party to assess their cloud environment for alignment
with security benchmarks. What is the term for this process?
- A cloud security audit
An organization is moving its IT infrastructure to the cloud and has chosen a cloud
service provider. How can the organization get the most benefit from the cloud
service provider’s security controls?
- Map the controls to compliance frameworks.
An organization wants to apply different cloud security controls for each of its
departments. How can the organization most efficiently achieve this goal?
- Create folders for each department, then set controls at the folder level.
What is the purpose of the Open Web Application Security Project (OWASP®) Top Ten?
Select two answers.
- To guide security testing efforts
- To minimize vulnerabilities in cloud environments
Neha is a security engineer. As part of her work, she has to frequently consult the
Open Web Application Security Project (OWASP®) Top Ten report. What information
does the OWASP® Top Ten report have that Neha needs to refer to?
- A list of crucial security threats for web applications
What are the two main built-in services the Security Command Center (SCC) uses to
scan for vulnerabilities?
- Security Health Analytics and Web Security Scanner
What is one of the primary functions of Cloud Security Posture Management (CSPM)
tools?
- Scan cloud assets and alert security teams of potential issues.
A security professional wants to purchase cyber insurance. Which tool would they
use as part of the cyber insurance purchasing process?
- Risk Manager
What are Google Cloud's default settings for data encryption? Select two answers.
- At rest
- In transit
Which states of data does Assured Workloads control? Select two answers.
- In use
- At rest
A company purchases cyber insurance. Months later, during a cyber attack, the
company's servers shut down. How does cyber insurance help the company? Select two
answers.
- It can cover financial losses.
- It can assist in retrieving data.
Jennifer, the head of IT, considers implementing the shared fate model for better
cloud security. What is Jennifer’s main goal for the IT team when adopting this
model?
- Manage risks by fostering collaboration between the IT team and their CSP
What report does an organization need to join the Risk Protection Program?
- Risk Manager Report
A cloud security professional creates a default service account. What role includes
a large number of permissions and can pose a security risk if an account is
compromised?
- Editor role
What purpose does a list constraint serve in the context of data residency
requirements?
- It specifies a set of locations where cloud resources can be created.
What does the Open Web Application Security Project (OWASP) create?
- Guidelines and frameworks for securing software
An IT officer uses Assured Workloads to help manage their Google Cloud security and
compliance requirements. With these tools, how does the IT officer implement
necessary controls?
- They allow for automatic application per compliance.
A cloud security manager turns on the "disable automatic role grants to default
service accounts" constraint. What scenario does this constraint prevent?
- It prevents the default service accounts from automatically receiving the Editor
role.
If you cannot meet Google’s peering requirements, which network connection service
should you choose to connect to Google Workspace and YouTube?
- Carrier Peering
Which three Google Cloud load balancing services support IPv6 clients?
- SSL proxy load balancing
- TCP proxy load balancing
- HTTP(S) load balancing
Which of the following are applicable autoscaling policies for managed instance
groups?
- CPU utilization
- Monitoring metrics
- Queue-based workload
- Load balancing capacity
What type of data does a cloud professional work with when preparing storage for
their company's email server?
- Semi-structured
A company uses a data-storage system that holds its organizational data, including
all proprietary information, and data used to maintain compliance. Where would this
data be stored within a data storage area?
- The data would be stored in the systems of record.
A data analyst at a retail company is developing a new data model for the company's
product catalog. The data model will need to represent the hierarchical
relationship between product categories and products. Which of the following data
structures would be most appropriate for the data model?
- Nested array
A data engineer is designing a new database schema for a system that will store and
process customer data. The customer data will include the customer's name, address,
phone number, and email address. Which data type is appropriate for the column that
will store the customer data?
- Struct
A data analyst at a retail company is developing a new data warehouse to store and
analyze data from the company's website and point-of-sale systems. The analyst is
responsible for choosing the right data types for the columns in the data warehouse
tables. Which data type is appropriate for the column that stores the product
prices?
- Float
A data team at a social media company is developing a new dashboard to track user
engagement. The dashboard will use streaming processing. Why does the data team
choose to use streaming processing?
- It is well-suited for processing data from a variety of sources.
A data analyst at a retail company is developing a new data warehouse to store and
process data from the company's website and point-of-sale systems. The data
warehouse will need to store a large amount of historical data, such as customer
purchase history and product sales data. Which type of data processing would be
most appropriate for the data warehouse?
- Batch
A data analyst for a retail company needs to store data on customer demographics,
purchase history, and product preferences. This data is highly structured and needs
to be accessible to employees in different departments. Which type of data storage
would be most appropriate for this scenario?
- Relational database
A retailer keeps data within a pair of tables. A customer table contains customer
name, customer ID, and address. A purchase table contains the order number, product
ID, and quantity purchased. A data analyst is asked to identify which products each
customer purchased. Which type of key should the data analyst create between the
tables?
- Foreign key
A scientific research organization needs to store and analyze data from a variety
of sources, including scientific experiments, sensor readings, and satellite
imagery. This data is highly complex and needs to be accessible to researchers from
many disciplines. Which of the following data architecture types is best suited for
this scenario?
- Data lakehouse
A data analyst is creating a column in a data table to record shipping duration for
orders. Which of the following data types should the analyst use for this
information?
- DATETIME
A data analyst encounters a group of columns in a data structure that each contain
one important piece of information about a customer's address. The analyst wants to
organize this data together so that it is easier to find and query. Which data
structure should the data analyst use to organize the data?
- Struct
A data analyst is organizing customer addresses. The analyst groups the address,
city, state, and postal code columns together within a single column. Which nested
data structure is this an example of?
- STRUCT
You are a data engineer at a social media company. You need to develop a system
that can process the constant stream of user data that is generated by the
company's website and mobile app. Which data processing method would be most
appropriate?
- Streaming data processing
A data analyst working with a new dataset needs to select the correct data format.
Which factors should they consider when selecting the right data format?
- Integration capabilities
A data professional is working on a new report that needs to include the total
activity time for each customer browsing a specific website. The report needs to be
updated in near real time, so the data professional needs to use a denormalized
data modeling technique. Which of the following denormalization techniques would be
most appropriate for the report?
- Creating summary tables
Which of the following data modeling techniques makes it easier for data
professionals to avoid duplicate data and inconsistencies, and apply updates?
- Normalized data modeling
How can an organization following a data governance plan achieve data integrity and
accuracy throughout the data lifecycle?
- By implementing data quality controls and validation processes
A data team working in an organization that uses master data management (MDM) is in
the process of cleaning their data. What component of the MDM framework does the
cleaning process belong to?
- Data quality management
A data analyst for a sports team is tasked with updating career profiles for each
player. The career profiles already have text descriptions. As a next step, the
analyst will use a data catalog to add images, news articles, and video clips to
the career profiles. They have access to a data catalog with structured data,
unstructured data, reports, dashboards, visualizations, and automations. Which
element of the data catalog will help the data analyst add images, articles, and
video clips to each profile?
- The unstructured data
A software engineer is developing a data warehouse for their company. The engineer
needs to store and manage a large volume of data from different sources, including
customer data, product data, and financial data. The data needs to be easily
accessible and searchable, and meet the needs of different users in the company.
What type of metadata would be most important for this task?
- Technical metadata
A marketing team at a retail company has a massive dataset of customer data. To
help them work with this data, they decide to use a data catalog. What is the
benefit of using a data catalog for the marketing team?
- It provides a comprehensive view of available data, enabling the team to
discover, understand, and use data assets.
What are the benefits of using a data lakehouse architecture? Select two answers.
- Scalability and flexibility
- Accessibility and organization
A data engineer at a retail company has access to large amounts of data, including
structured data and unstructured data. The engineer needs to design a data
architecture that will allow them to store, process, and analyze all of this data
in a scalable and flexible manner. Which of the following data architectures should
they use?
- Data lakehouse architecture
An e-commerce company is generating a large volume of data from its website and
mobile app, including product reviews, customer transactions, and social media
posts. The company needs to design a data architecture that will allow them to
store, process, and analyze all of this data in their native formats. Which of the
following data architectures meets the company's needs?
- Data lakehouse architecture
What are the two types of data architectures that data lakehouse architecture
combines?
- Data warehouses and data lakes
You are a data analyst for a company that sells products online. You need to create
a database to store customer information. Which of the following would be a good
way to denormalize the data?
- Add a column to the customer table for each product purchased.
With the support of organizational leaders, a data governance manager and the data
governance team initiate a data governance plan. What should be the manager's next
goal?
- To automate and streamline data management processes
You are a data analyst for a sports team. You need to find all of the data you have
on player performance. Where would you search for the data first?
- Data catalog
You are a data engineer working on a project to migrate your company's data to a
new cloud-based platform. You need to create a technical metadata catalog to help
you manage the data migration process. Which of the following is an example of
technical metadata?
- Data structure
You are a data scientist building a machine learning model. You need to provide a
single place to store all of your data, making it easy to access for machine
learning models. Which of the following data storage solutions offers sufficient
access to the data?
- Data lakehouse
You are working on a data lakehouse project and need to extract data from a variety
of sources. To do that, you begin the ETL process. Which of the following actions
will you take with the data in the first step of the ETL process?
- Import and consolidate structured and unstructured data
A data analyst is working on a data lakehouse project. Which layer of the data
lakehouse architecture would they use to ensure that the data is governed and
managed effectively?
- Metadata layer
A cloud data analyst is working with several data sources. They encounter problems
with compatibility, integration, and understanding the data. What is the reason for
the problem?
- The data sources are in different formats.
A cloud data analyst is tracking the lineage of a data source. What is the cloud
data analyst’s goal?
- To have a better understanding of the context surrounding the data.
A cloud data analyst is using Analytics Hub. They find a dataset that they can use
in their project. They subscribe to the dataset. What is the term for the version
of the dataset that the cloud data analyst received?
- Linked dataset
A cloud data analyst is tasked with solving an analytic problem. They decide to use
the Analytics Hub platform as a subscriber. Why is the cloud data analyst using
Analytics Hub?
- To search for datasets that they can use in their project.
An organization wants to share their environmental data. They are considering using
Analytics Hub to do so. What is a shared dataset limitation of Analytics Hub they
should be aware of?
- There is a limit of 1,000 linked datasets to a shared dataset.
Which of the following are types of users in Analytics Hub platform? Select two
answers.
- Viewer
- Publisher
A cloud data analyst is working on a project, and they need more information about
a dataset. Using cloud tools, what can the analyst do to identify the context
surrounding a dataset?
- Examine the metadata
A data team is in the process of finding and understanding data assets. What does
the team need for this process to work well?
- The right tools and an understanding of the business goal
A data professional is using BigQuery to make the process of data exploration more
efficient. How does BigQuery do this?
- Enables users to search for specific data within datasets.
A cloud data analyst is working on a data project. They want to ensure the
integrity of their data source. What can the data analyst do to have confidence in
the data source's integrity?
- The cloud data analyst can trace the data source's origin and lifecycle movement.
A data driven retail organization decides to make their data available to other
organizations. As part of the process, they publish a collection of their data to
Analytics Hub. What is this collection of data, tables, and views called in
Analytics Hub?
- Shared datasets
A data professional is working with Analytics Hub. They are creating and giving
access permission to data exchanges. What type of Analytics Hub user is the data
professional?
- Administrator
A data team is working on a data project using a set process. They are in the step
of finding and identifying relevant patterns and relationships in the datasets.
What process is the data team performing?
- Data discovery
A data team wants to move their data operation to the cloud. They want to offer the
members of their team the option of remote work some days of the week. What cloud
advantage will help them to achieve this?
- Access
A data team wants to accelerate their data management and analysis workflows. They
consider moving their data operations to the cloud. What cloud advantage will allow
them to achieve their goal?
- Automation
What Google cloud tool provides a centralized hub where users can explore, catalog,
and manage data assets?
- Google Dataplex
A data team is using the BigQuery auto detection option to create a table. After
Big Query finishes assigning the data types, what should be the next step for the
data team?
- Check the accuracy of each field data type.
An organization revamps its cloud data team, hires new staff, and changes their
data analysis tools. A cloud data analyst on the team reuses a SQL script to
refresh a data report. The SQL script includes a group of SQL commands, and some of
these commands are not working properly. Why are the SQL commands not working
properly?
- The new data analysis tools use a different SQL dialect.
A cloud data analyst is creating a SQL statement. They want to SELECT some columns
from a table, but only if a condition is met. What SQL command should they use to
establish the condition?
- <span style="background-color:#cccccc;"><strong>WHERE</strong></span>
A cloud data analyst is creating a SQL statement. They want to sort the data
resulting from the SQL statement in descending order. What SQL command will allow
the cloud data analyst to order the results in descending order?
- <span style="background-color:#cccccc;"><strong>DESC</strong></span>
A data team is tasked with a data project. The team is in the process of compiling
the data. What does the data team need to organize the data in a structured way?
- A database schema
A cloud data analyst is working on a machine learning (ML) model. They request
access to an external organization’s data source. The external organization grants
access to the data source, and the cloud data analyst uses a code library from a
building tool as an interface to access the data. What type of interface did the
cloud data analyst use to access the data?
- Software development kit
A data team is working on a project. They need a solution that allows the team to
access and work on the same Python notebook and write comments. They also need an
environment that connects to most libraries, runs complex code, and doesn’t require
a high-performance computer. What Google tool could the team use to meet these
requirements?
- Google Colab
A cloud data analyst is tasked with creating a machine learning (ML) model. As a
part of the process, they need to select a model they will use to analyze the data.
What are two of the common types of models that the analyst can create with machine
learning? Select two answers.
- Linear regression
- Classification
A cloud data analyst is working with Vertex AI. The cloud data analyst’s team
develops a pipeline for the data. What is the next step that the team needs to
complete before the machine learning process begins?
- Automate hyperparameter tuning
A cloud data analyst is working with a large amount of data from one source. They
find that the data size is growing and becoming difficult to manage. To improve
scalability, they decide to divide the data into separate segments stored across
different database instances. What technique is the cloud data analyst applying?
- Database partitioning
A cloud data analyst is working with a table. In order to improve their query
performance, they decide to sort the table based on the value of the DATE column.
What is the cloud data analyst doing?
- Clustering the table
A cloud data analyst is working with a partitioned database. The database has an
uneven distribution of traffic due to a surge of data. What should the cloud data
analyst do to address this problem?
- Rebalance the partitions
A cloud data analyst is dividing a database. They divide the database into segments
stored in separate databases in which each partition follows the same
organizational layout. What is this process called?
- Horizontal partitioning
A cloud data analyst is working with a partitioned table. They are designing and
implementing their partition pruning strategies. What are two best practices for
partition pruning the cloud data analyst should consider? Select two answers.
- Use a constant filter expression.
- Isolate the partition column in the filter.
A cloud data analyst is working on a partitioned table. They use a process called
partition pruning. What is the cloud data analyst doing?
- Querying only in the partitions that have relevant information.
A cloud data analyst is creating a query to prune a table. The table is partitioned
by a time-unit column. What column is the cloud data analyst using to filter the
unnecessary partitions?
- The partitioning column
A data team is planning to integrate Dataproc into their workflows. What are the
benefits of this integration? Select two answers.
- Lower cost
- Faster processing
A data team is planning to use Dataproc to manage a Spark process. What are two of
the processes they can automate using this software combination? Select two
answers.
- Querying data
- Streaming data
A cloud data analyst is working with a large dataset. They decided to use Dataproc.
What two software platforms should they use for the best results? Select two
answers.
- Hadoop
- Spark
A data team is creating a database schema for a project. They decide to use the
auto-detect schema option in BigQuery. How is the field type established with the
auto-detect schema?
- By scanning a representative sample of the data in each field
A cloud data analyst constructs the following SQL statement: SELECT Product_ID,
name, price, stock FROM products WHERE Price > 1 and <10 ORDER BY Price Which part
of the statement sorts the results in ascending order?
- ORDER BY
A cloud data team is working with machine learning. They are trying to teach the
system to establish a pattern for recommending products to customers based on
customer preference. What type of model is the cloud data team using in their
machine learning algorithm?
- Ranking
A data team is partitioning a database. They divide the data using the customer_ID
column. The database partitions will follow the same organizational layout and will
be a unique piece of the whole dataset. What partitioning strategy is the data team
using?
- Horizontal
A cloud data analyst is partitioning a table. What are two common reasons for the
cloud data analyst to partition the table? Select two answers.
- The cloud data analyst needs to delete specific partitions without scanning an
entire table.
- The cloud data analyst’s table operation exceeds the expected volume of data.
A cloud data analyst is working with a table that is arranged in storage blocks.
What type of table is the cloud data analyst using?
- Clustered table
A cloud data analyst is pruning a table using a specific range of the transaction
number. What technique did the cloud data analyst use to partition the table?
- Integer-range
A cloud data analyst is constructing a SQL statement. In the statement, they need
to filter the data to display only the products whose stock is less than 10 units.
What general SQL syntax will the cloud data use to include this condition in their
SQL statement?
- WHERE stock is < 10
A data team is tasked with a machine learning project. What does the data team do
in a machine learning project?
- The data team develops algorithms and statistical models.
A cloud data analyst is gathering all the data they need for a data project. Next,
they need to bring the data together and get it ready for processing. In which step
of the data collection stage is the cloud data analyst working?
- Data staging
In cloud data analysis, what is the term for the process in which the data that can
be used to meet a specific business need is identified, found, and brought
together?
- Data collection
A cloud data analyst is working in one of the stages of the data journey. They are
presenting visualizations to stakeholders. In which stage of the data journey is
the cloud data analyst working?
- Activate
A cloud data analyst is working in the fourth stage of the data journey process.
What is a task they perform in this stage?
- Identify trends
A cloud data analyst is working on a data project. As part of the process, they
need to transform a large dataset. The cloud data analyst needs to get the results
in near real time. What should the cloud data analyst use to transform the data?
- An automated transformation tool
A cloud data analyst is transforming data with SQL. What type of data
transformation are they using?
- Manual transformation
A cloud data analyst is working on a data project. As part of the process, they
convert the data into a usable format. What is the goal of this data
transformation?
- To provide data that can be accessed and used
A cloud data analyst begins a new project. They are following the data journey
process and are in the transformation stage. What issues can the data have that the
cloud data analyst will need to fix? Select two answers.
- The data is duplicated.
- The data is incomplete.
Why is it important to understand and use the data journey process when analyzing
data?
- To have a structured way to collect and prepare data for analysis and data-driven
decision-making.
A cloud data analyst is working on the last stage of the data journey process. What
does the cloud data analyst do in this stage?
- Present the results to the stakeholders
A cloud data analyst following the data journey process is in the collect stage.
They are working on finding the data and bringing it together. What step of the
collect stage is the cloud data analyst working in?
- Data discovery
What is the term for the area where the data is gathered during the collect stage
of the data journey?
- Staging area
A cloud data analyst is working on a data project. They begin the stage when they
will identify trends and patterns. Which step did they complete before reaching
this stage?
- Store
What is the process of taking raw data and converting it into a usable format
called?
- Data transformation
A cloud data analyst is tasked with a data project. They are following the data
journey. As a part of the process, they use data smoothing when working with the
data. What is the cloud data analyst doing?
- Transforming data
A cloud data analyst is transforming data using only a coding language. Which type
of data transformation is the cloud data analyst using?
- Manual transformation
A cloud data analyst is tasked with creating a pipeline to solve a data problem.
Based on the characteristics of the problem, they choose an ELT pipeline. What are
two reasons why the cloud data analyst chose the ELT pipeline over the ETL
pipeline? Select two answers.
- They need to have flexibility to transform the data as needed.
- The data needs to be tracked as soon as it is available.
What are two key benefits of a data pipeline? Select two answers.
- Automates the processes of extract, load, and transform
- Helps organizations save time and resources
A cloud data analyst is solving a data problem. After careful consideration, they
decide to create an ELT pipeline. What process illustrates the correct sequence for
an ELT pipeline?
- Extract the data from the company databases and the smart sensors around the
company, load the data into the destination system, and then clean and format the
data.
A cloud data analyst is solving a data problem using a pipeline. As part of the
process, they move the data into a temporary staging area. In what stage of the
data pipeline is the cloud data analyst working?
- Extract
In which stage of a data pipeline does a cloud data analyst check the data for
duplicate entries or obvious errors?
- Transform stage
A cloud data analyst is creating a data pipeline. As a part of the process, they
are mapping the data. What does the cloud data analyst do when mapping data?
- Match the fields between data sources.
A cloud data analyst is in the process of mapping their data. As a part of the
process, they identify the fields that need to be mapped and standardize the fields
names. What is the next step that the cloud data analyst should do?
- Create the data mapping rules.
A cloud data analyst is designing a data pipeline. They are in the extract stage
and are deciding which ingestion technique to use. What is a key factor in the
decision?
- If the data is time sensitive
A cloud data analyst is designing the first step in a data pipeline. They decide to
use batch ingestion. Why does the cloud data analyst choose batch ingestion over
streaming ingestion? Select two answers.
- The data is not critical.
- They want lower costs.
A cloud data analyst is analyzing a dataset. As part of the process, they find the
names and types of the 8 dataset columns. They also identify that the data has
duplicate records and some of the data in one of the columns does not follow the
same format. Which data process is the cloud data analyst using?
- Data profiling
What is the term for the manipulation technique that changes the format of data to
improve compatibility?
- Data conversion
A cloud data analyst is analyzing a dataset. As part of the process, they identify
duplicate records, inconsistencies in the data format, and missing values. What
should the cloud data analyst do next?
- Clean the data
A cloud data analyst is working with a data project. They decide they need to
enrich the dataset to obtain more valuable information. What can the cloud data
analyst do to enrich the dataset? Select two answers.
- Join the data with other data sources
- Add new fields to the data
A cloud data analyst is working with a dataset. They notice that the fields
containing dates do not follow the same format, and they find format
inconsistencies in a few other fields. What manipulation technique can the cloud
data analyst use to fix these format issues?
- Data standardization
A cloud data analyst is ready to start the loading phase of their pipeline. As a
next step, they need to prepare the storage to receive the data. What is an action
they should perform before starting to load the data?
- Create new tables and/or directories.
A cloud data analyst validating data, checks the uniqueness of the data. What
validation technique are they using?
- Duplicate validation
A cloud data analyst is using batch load to load the data into their final
destination. What could be a consequence of this type of load?
- Overload of the destination storage.
A cloud data analyst is validating a dataset. They find errors in the data. What
are two validation rules that the cloud data analyst can use to handle these
errors? Select two answers.
- Flag the data.
- Discard the data.
A data pipeline has three main processes. When working with data, how should a
cloud data analyst follow these processes?
- The analyst should tailor the processes for each data problem.
What does the “E” stand for in the ETL pipeline technique?
- Extract
A cloud data analyst is designing a pipeline. They are working on a design for the
ingestion process. What do they decide in this process?
- They decide which technique they will use to move the data sources to the staging
area.
A cloud data analyst is designing a data pipeline. As the first step, they plan to
collect the data over a period of time and move it to the staging area in groups.
What technique is the cloud data analyst using?
- Batch ingestion
A cloud data analyst is creating a data pipeline. As the next step, they identify
fields, standardize names, and create rules to convert some fields. What is the
cloud data analyst doing?
- Mapping the data
A cloud data analyst is working on a data project. As the next step, they need to
identify if the data contains missing values, duplicate records, inconsistent data
formats, or a combination of these issues. What process will help the cloud data
analyst identify these issues?
- Data profiling
A cloud data analyst is working with a dataset that has many errors. What can the
cloud data analyst do to speed up the data cleaning process?
- Manipulate the data
A data analyst is in the loading stage of the data pipeline. They decide to load
the data as soon as it becomes available. What type of loading is the cloud data
analyst using?
- Streaming
What is the term for the process of checking the quality of data to verify that it
is complete, accurate, secure, and consistent?
- Data validation
A cloud data analyst is checking the dataset before loading it into their final
destination for analysis. They verify that all the data in the age field is between
18 and 70 years. What is the cloud data analyst doing?
- Validating the data using range validation
How does data segmentation using RFM analysis help a marketing team address a
business need?
- Allows the marketing team to tailor ad campaigns and marketing efforts for better
results
What is one way you could improve the testing proposed in the data transformation
plan?
- Compare results with known customer behavior patterns or historical insights to
confirm validity.
Which of the following statements best addresses how business goals outlined in the
RFM analysis plan align with proposed data transformation techniques?
- The techniques can be used to calculate RFM scores based on recency, frequency,
and monetary value, which aligns directly with the desired customer segments.
A cloud data analyst is working on a data project. They search for errors in the
dataset. Why is it so important to find the dataset errors?
- Errors affect the integrity of the data.
A data team is planning a project that involves a large dataset. As a next step,
they evaluate the resources they need for the project. Which resource should they
manage effectively to avoid unnecessary fees?
- Storage
A cloud data analyst is working with a dataset. As part of their process, they need
to convert the data from a string format into a numeric format. When they finish,
they discover errors in the dataset. What likely caused these errors?
- Errors during data transformation
A cloud data analyst is working with a dataset. They are checking the dataset for
records that are identical, or partially identical, to delete or fix these records.
What is the cloud data analyst doing?
- Deduplicating the dataset
A cloud data analyst is working with a large dataset. The dataset is growing at a
rapid rate because it is tracking a website. What can the data analyst do to reduce
the amount of raw data and have the data they need for the project?
- The cloud data analyst can aggregate the data.
A cloud data analyst is helping the sales team find trends in customers’ shopping
habits. What technique will help the cloud data analyst find the trends in the
data?
- Data aggregation
A cloud data analyst is working with a large dataset. They perform some
aggregations, and their results are inconsistent with their expectations for this
data. They check the process, conditions, and mathematical equations, and
everything else is correct. What is causing the inconsistencies with the results?
- The data has duplicate records.
A cloud data analyst is joining two tables. For their project, the cloud data
analyst needs only the information that matches both tables. What type of join
should the cloud data analyst use?
- Inner join
A cloud data analyst is working with a dataset that is the result of a data
derivation process. What data problem should the analyst consider when using
derived data?
- The data is not always as accurate as the original data.
A cloud data analyst is joining two tables using an outer join. As a part of the
process, the result table has some rows with NULLs values. What do the NULLs values
represent?
- The unmatched values
A cloud data analyst is tasked with creating a report. The data they need for
creating the report is not found directly in the raw data. As a next step, they
decide to use data derivation. What does the cloud data analyst do in the data
derivation process?
- The cloud data analyst creates an algorithm to transform the raw data.
A cloud data analyst is working with a large dataset. They decide to transform and
analyze the dataset using cloud computing resources. How will this action help the
cloud data analyst?
- They will have access to the required computational power virtually.
A cloud data analyst is working with a large dataset. They make a mistake and
choose the wrong aggregation method. Which type of errors will this introduce to
the data?
- Data transformation process errors
A cloud data analyst is tasked with optimizing the storage space of a large dataset
from a music streaming service. The dataset generates a data point with the time
and day every time a song is played. The streaming service only wants to know how
many times per day a song is played. How can data aggregation help the cloud data
analyst optimize the storage space to have only one data point?
- By aggregating the total plays per song by day.
A cloud data analyst is tasked with helping a streaming service determine the
trends in songs per music genre. How can the cloud data analyst use data
aggregation in this scenario?
- The cloud data analyst can group the songs per genre and count the times each
song is played.
In a dataset, what can cause inaccurate reporting, wasted resources, and increased
storage costs?
- Duplicated data
You are working as a data analyst deduplicating data. Based on the information in
the following table, which is a partial duplicate record? ProductPriceStockCostToy
B$2.5058000$1.50
- Product: Toy B, Price: $2.05, Stock: 58000, Cost: $1.50
A cloud data analyst is joining two tables, table A and table B. Table A has three
columns: product_id, stock, and warehouse_id. Table B has four columns:
product_name, cost, price, and product_id. What column should the cloud data
analyst use to join the tables?
- <span style="background-color:#cccccc;"><strong>Product_id</strong></span>
Which join method does the following Venn diagram illustrate? [Alt_text: A Venn
diagram. Two circles, A and B. The circles overlap in the center to show the
joining values. The overlap is blue.]
- Inner join
A cloud data analyst is using data derivation in their data project. Which of the
following is an example of the data derivation process after the cloud data analyst
creates the algorithm?
- The algorithm transforms the raw data. The new data is used to create insights.
A cloud data analyst is working with derived data. To gain the insight they need,
they will need to use data derivation aging. What is a problem they can encounter
by doing this?
- The data may not be accurate
In Command Center, when creating a new status assessment, can you add a severity
above 100?
- False
Multiple incidents can be transferred into the Command Center from a single or
multiple Environments
- True
All playbook triggers except "All" can be scoped with the following parameters:
(select all that apply)
- "() Contains"
- "= Equal"
- "*_Starts With"
You are limited to inviting internal users to the Command Center when collaborating
on incidents
- False
When creating a playbook if you select "All Environments" button, what does such
scope mean?
- This function created within playbook will run on all current environments as
well as on all future environments.
What can you find within the Chronicle SOAR Marketplace? (select all that apply)
- Power Ups
- Integrations
- Analytics
Do you require multiple dashboards in order to configure data widgets that show
results from multiple Environments?
- False
You need to configure an integrations before using it with the downloaded use cases
- True
What module should be used within Chronicle SOAR to monitor health checks and
synchronization tasks?
- Jobs
When selecting an active incident within Command Center, what filters can be
applied under Workstation tab?
- All of the above
What tabs are available within Homepage? (select all that apply)
- Workspace
- Pending Actions
- My Tasks
- Announcements
When a playbook is activated, the toggle next to a playbook name appears green
- True
In playbook designer when you toggle the "Simulator" button what is the expected
behavior?
- The playbook can now be tested with simulated alerts.
Who typically has sufficient rights to turn off the "simulator" mode? (select all
that apply)
- SOC Manager
- Admin
What are the mandatory checks required for installing a Use Case? (Select all that
apply)
- Configuration of integrations
- Selection of integrations
______ allows you to ingest raw source data into the platform?
- Connector
Which of the following fields are displayed under "Entities Highlights" section?
(select all that apply)
- File Name
- Email Subject
- User Name
- IP Address
A playbook will only run if its priority is defined within the logic
- False
Analysts can communicate with any internal Chronicle SOAR user as part of the
platform
- True
A new rule has been developed and historical data over the last year must be
investigated, you must run a ______ to perform the investigation?
- Retrohunt
The feeds option in settings allows you to add new data sources in the UI?
- True
What section of a detection rule describes the events that must match?
- Condition
You can use filters to further organize data ingestion when configuring the
Chronicle Forwarder?
- True
You are asked to assign the least privelaged role in Chronicle, which do you
choose?
- ViewerWithNoDetectAccess
Each Chronicle Forwarder may have multiple connectors each corresponding to a data
source?
- True
Name spaces can be used to identify distinct network segments when configuring the
Chronicle Forwarder?
- True
You are writing a rule that must only look within the last 20min, what section of
the rule do you place this condition in?
- Match
Multiple syslog data sources can use a single port on the Chronicle Forwarder?
- False
What search component is used for threat hunting and other indepth use cases?
- UDM Search
Which of the following ways is the correct one when investigating threats in
Chronicle?
- Each of those provide a starting point, however for optimal experience it’s
recommended to start the investigation in the ticketing/investigation platform of
choice
What type of identity provider must be used for Single Sign On?
- SAML 2.0
What information do you need to store after creating a rule with the detection API?
- Rule ID and Rule Version
How does the Chronicle Forwarder recognize what data format is being ingested?
- Data labels
What key pieces of information should every analyst be able to obtain by looking at
the main screen of the case? (select all that apply)
- When did it happen?
- Who is involved?
- What happened?
What does the letter "R" stands for in the PICERL incident Handling methodology?
- Recovery
What mechanism is used to translate raw information from different product event
fields into Chronicle SOAR Objects of Interest?
- Mapping & Modeling
Where in the platform can you see why a playbook action failed?
- Review the execution log of this action under the case wall
What does the letter "E" stand for in the PICERL incident Handling methodology?
- Eradication
Where can you find and re-open a case that has already been closed?
- All closed cases / alerts are available under the Search tab.
How would you un-merge different branches of a playbook into a single branch?
- Right click on the relation circle, then click on "delete"
What is the importance of hierarchy when defining data mapping rules in the
platform?
- Higher-level data mapping transfers the rules down the hierarchy without the need
to re-map.
What logical operators can be used when creating a condition flow within a
Chronicle SOAR playbook?
- OR & AND
How would you merge different branches of a playbook into a single branch? (select
all that apply)
- Drag & drop an action from an existing branch to the end of the new branch.
- Drag & drop an action from a new branch to the end of the existing branch.
How can you leverage playbook automation to confirm whether a previous action ran
successfully and/or returned an expected value?
- By utilizing the previous action conditions flow.
What is the difference between Jobs and Connectors within Chronicle SOAR?
- Connectors are used to ingest cases into the platform. Jobs support healthcheck
and synchronization tasks
What are the three levels of data mapping hierarchy within Chronicle SOAR, from
broadest to most narrow?
- Source -> Product ->Event
How does Chronicle SOAR allow you to remediate failed actions within a playbook?
- Rerun and skip buttons are available in case an action fails to execute. Rerun
button is available after the action fails. Skip button is available in the
configuration block of the specific action.
What functionality can be used in Chronicle SOAR to minimize the lift and
maintenance of a set of repeated actions across multiple playbooks?
- Chronicle SOAR blocks can be used for all repeatable actions.
When looking at a playbook, how can you distinguish a manual action from an
automatic action?
- The letter "A" next to the integration action means automatic and "M" means
manual.
Where can you see the comments left by all analysts working on a case?
- The Case Wall contains full detail of each case including all comments.
What transformation functions helps changing the date formatting during alert
mapping activities?
- FROM_UNIXTIME_STRING_OR_LONG"
What Chronicle SOAR component allows you to ingest raw source data into the
platform?
- Connector
How can you scope a playbook action to run on a limited selection of entities?
- By specifying the exact scope of entities that you are interested in targeting
By changing a playbook task from "Auto" to "Manual," you are instructing the
playbook to stop and wait for human intervention
- True
Where in Chronicle SOAR can you see a full timeline visualization of the entities
and objects within an event?
- Mapped events are graphically represented under the Explore module of Chronicle
SOAR.
When are source entities defined for each alert within Chronicle SOAR?
- During mapping.
You can avoid generating too many insights by specifying this when configuring an
action:
- The exact entity scope.
What functionalities exist within the playbook flow to allow for handling of errors
when executing an action?
- Configure the default branch that will be used in case of an error
What kind of playbook actions allows for a pause and delay in next steps until
another action has occurred?
- All async actions
The ___________ flag would be used to indicate that your script completed
successfully.
- EXECUTION_STATE_COMPLETED
Siemplify populates a new action with the following libraries: (select all that
apply)
- SiemplifyUtils
- SiemplifyAction
- ScriptResult
Which folder in the Integration export contains the metadata for actions?
- ActionDefinitions
Which method(s) would be used to add JSON information that can later be used in a
playbook?
- Siemplify.result.add_result_json()
Which method is used to let the Siemplify server know that script execution has
completed?
- siemplify.end()
Which flag is used for asynchronous actions to let the Chronicle SOAR API know that
the code is to continue running?
- EXECUTION_STATE_INPROGRESS
The start and end_time are NOT required parameters in an alert object.
- False
The following are parameters when using the method that's responsible for getting
action parameter values: Example: function(a, b, c) where a,b,c are parameters.
(select all that apply)
- param_name
- input_type
- default_value
Where would you store common methods, like the authentication to a third party
product, for use in an integration?
- Manager
A new rule has been developed and historical data over the last year needs to be
investigated. You must run ______ to perform the investigation.
- Retrohunt
In which section of a YARA-L rule can placeholder variables defined in the events
section not be used?
- options
Which sections are mandatory for all YARA-L Rules? You can select the multiple
values
- events
- condition
- meta
$var is equivalent to
- #var > 0
What does the following statement signify? not all $e.principal.ip = "127.0.0.1"
- checks whether any IP address does not match "127.0.0.1"
Which of the following is the valid syntax when using the any operator?
- <code>any $e.target.ip = "127.0.0.1"</code>
What is the Maximum time range value specified in match section to correlate events
- 48 hours
Identify the use case of given rule Rule: rule example { meta: author = "Chronicle
Security" severity = "Low" events: $fail.metadata.event_type = "USER_LOGIN"
$fail.metadata.vendor_name = "Microsoft" $fail.principal.hostname = $targetHost
$fail.target.user.userid = $targetUser $fail.security_result.category =
"AUTH_VIOLATION" $fail.security_result.action = "BLOCK"
$fail.metadata.event_timestamp.seconds <= $success.metadata.event_timestamp.seconds
$success.metadata.event_type = "USER_LOGIN" $success.target.user.userid =
$targetUser $success.principal.hostname = $targetHost
$success.security_result.action = "ALLOW" $success.metadata.product_event_type !=
"4648" match: $targetUser, $targetHost over 15m condition: #fail > 4 and $success }
- Detect repeated authentication failure, followed by authentication success.
Which of the following is correct syntax for a rule which is going to detect
whether the user has logged in your enterprise from two or more cities?
- <div> <code><br /> rule DifferentCityLogin {<br /> meta:<br />  author =
"Chronicle"<br />  severity = "Low"<br /> events:<br />  
$udm.metadata.event_type = "USER_LOGIN"<br />  $udm.principal.user.userid =
$user<br />  $udm.principal.location.city = $city<br /> <br/> match:<br />
 $user over 5m<br /> <br/> condition:<br />  $udm and #city > 1<br /> }
</code> </div>
If we want to write a rule that must only look for events within a 20 minute
window, what section of the rule do you place this condition in?
- match
Which of the following is the correct rule which is going to detect whether the
user has logged in your enterprise from two or more cities and he is not from the
INFORMATION TECHNOLOGY department?
- <div> <code><br /> rule example {<br /> <br/> meta:<br />  author =
"Chronicle"<br />  severity = "Medium"<br /> <br/> events:<br />  
$e1.metadata.event_type = "USER_LOGIN"<br />  $e1.target.user.userid =
$user<br />  $e1.principal.location.city = $city<br /> <br/>  
$e.graph.entity.user.userid = $user<br />  $e.graph.metadata.entity_type =
"USER"<br />  ($e.graph.entity.user.department != "INFORMATION TECHNOLOGY")<br
/> <br/> match:<br />  $user over 24h<br /> <br/> condition:<br />  $e1
and $e and #city > 1<br /> } </code> </div>
Identify the incorrect event section from the given options. (assuming $e1, $e2,
and $e3 are used in the rule)
- <div> <code><br /> events:<br />  $e1.src.ip = $ip<br />  $e2.target.ip
= $ip<br />  $e3.about.ip = "192.1.2.0" </code> </div>
Identify the correct option which is going to match the event which received the
email from altostrat.com(case sensitive) domain. Option 1:
re.regex($e.network.email.from, `\.*altostrat\.com`) Option 2:
$e.network.email.from = /\.*altostrat\.com/
- Option 1 & 2 (Both)
The multi-event rule can be simplified to a single event rule. Which option is
syntactically correct when converted to a single event rule?. rule example { meta:
author = "Chronicle" events: $u.udm.principal.hostname = $hostname match: $hostname
over 5m outcome: $risk_score = max(if($hostname = "my-hostname", 100, 50))
condition: $u }
- <div> <code><br /> rule example {<br /> meta:<br />  author = "Chronicle"<br
/> <br/> events:<br />  $u.udm.principal.hostname = $hostname<br /> <br/>
outcome:<br />  $risk_score = if($hostname = "my-hostname", 100, 50)<br />
<br/> condition:<br />  $u<br /> } </code> </div>
UDM field $e.principal.hostname returns the value "name". What will the value of
$variable become after this function has been processed? $variable =
re.replace($e.principal.hostname, "", "1")?
- 1n1a1m1e1
Which of the following is the correct criterion for a rule which is going to detect
whether the user has logged in to your enterprise outside working hours? (working
hours are from 10:00 to 19:00)
- <div> <code>$ts = $e1.metadata.event_timestamp.seconds</code><br />
<code>timestamp.get_hour($ts) < 10 or timestamp.get_hour($ts) > 18</code> </div>
Identify the correct syntax for to work with the list key_servers.
- $selection1.principal.hostname in %key_servers
Identify the correct syntax in the events section to use a reference list
- All the three options
Which of the following statements regarding the use of Gemini in the software
development life cycle is correct?
- To generate code, you can prompt Gemini with a comment in a source code file.
Which of the following is the main KPI Cloud Retail Search optimized results for
- Revenue
Which of these is the correct purpose of the serving control “boost/bury”?
- Affects result ranking and order in the returned result list
Which is the correct order of ingestion data from scratch into Cloud Retail Search
- Attribute Config -> Product Import -> Local Inventories
Which of the following is NOT a way to personalize search results with Google Cloud
Retail Search?
- Use user demographics
Which of the following is NOT a supported data type for Google Cloud Retail Search?
- Images
When designing A/B test which experiments should be sent to Cloud Retail Search
- Experiment ID with Google & Legacy both
Which of the following is NOT a way to troubleshoot problems with Google Cloud
Retail Search?
- Check the documentation
Which of the following is the best way to import data into Retail Search when a lot
of product changes are required along with analytical capability
- BigQuery
Which of the following is NOT a type of query that can be used with Google Cloud
Retail Search?
- Geospatial search
Which of the following is NOT a way to keep up with changes to Google Cloud Retail
Search?
- Follow the Google Cloud Twitter account
When using Cloud Code, which actions can Gemini perform on selected text in your
code file? Select two.
- Explain code.
- Generate code.
Which of the following is not a resource that Gemini can help you manage in a GKE
cluster?
- Network policies
How can you use Gemini to identify and remediate security misconfigurations?
- Select a finding from Security Command Center. Gemini provides an AI-generated
summary of the misconfiguration, and will provide you with steps to remediate the
vulnerability.
What is the quickest way to use Gemini assistance to explain a log entry in Logs
Explorer?
- Expand the log entry and click "Explain this log entry."
How can you use Gemini chat to help you with a network architecture task?
- Type a specific prompt into Gemini related to your network architecture concern.
A learner obtains the Google Cloud Data Analytics certificate and starts their job
search. They find a job they think would be perfect, but they lack experience in a
specific analytic tool listed in the job post. What is the best action they should
take?
- Detail in their cover letter how their experience with a similar tool will help
them quickly adapt to the requested tool.
A cloud data analyst is in the process of job searching. What are two workplace
skills that the cloud data analyst should demonstrate? Select two answers.
- Critical thinking
- Problem solving
A learner obtains the Google Cloud Data Analytics certificate and starts their job
search. Afterwards, they create their resume. What is another resource they can use
to showcase their abilities and experience?
- Data analyst portfolio
A learner that has just obtained the Google Cloud Data Analytics Certificate starts
their job search. When searching for jobs, what two key terms can they use to
identify appropriate opportunities for their ability and current skill level?
Select two answers.
- Junior
- Entry level
Which of the following actions can you take to help you tailor your resume to cloud
data professional roles? Select all that apply.
- Refer to previous course content to review some of the different types of roles
available in data analytics.
- Research roles on job-search platforms and take notes on some of the skills and
qualifications required for jobs that appeal to you.
- Use an AI tool to tailor your resume to the specific job.
Which of the following components should be included in a resume? Select all that
apply.
- Education
- Personal information
- Work experience
What should you include in the experience section on your resume? Select all that
apply.
- Your three previous positions
- Your transferable skills
- Your job responsibilities and accomplishments
What issues should you address when proofreading your resume? Select all that
apply.
- Revise your wording to be as concise as possible.
- Consolidate your resume to no more than 1–2 pages.
- Correct any spelling, grammatical, and punctuation errors.
A cloud data analyst is updating their resume. They want to include a link to their
portfolio. In what section of the resume should they include this link?
- Projects
In which section of their resume should a learner include the Google Cloud Data
Analytics Certificate that they earn?
- Education
A learner that has just obtained the Google Cloud Data Analytics Certificate is
updating their resume. They have worked in the service sector and have also
completed an internship as a data analyst assistant. What should they include in
the experience section of their resume?
- Both the the service sector jobs and the internship
A company is beginning the hiring process for an entry level cloud data analyst.
They need to decide how to have the analyst prove their technical abilities. What
are two ways that the company can verify the cloud data analyst’s technical
abilities? Select two answers.
- The cloud data analyst can complete a test either on-site or at home.
- The cloud data analyst can be interviewed by a senior data analyst.
An entry level cloud data analyst is preparing for an interview. They are
practicing for the interview and updating their resume and portfolio. What other
activity should the cloud data analyst do to prepare?
- Research the organization.
An entry level cloud data analyst is preparing for their first interview. They
practice answering questions using the STAR method. What type of questions is the
cloud data analyst preparing for?
- Behavioral
An entry level cloud data analyst is searching for their first cloud data analytics
job. They would like a job conducting statistical analysis and working with
algorithms. What is the name of this role?
- Quantitative analyst
An entry level cloud data analyst is searching for their first job. They want a job
in the real estate industry as a junior data analyst. What strategy can they use to
find this job?
- Narrow their search by using “entry level data analyst” and “real estate” as key
terms
An entry level cloud data analyst is working on their portfolio. They include a
section that describes how they question and consider all angles within project
data and use insight to draw conclusions. What skill is the cloud data analyst
demonstrating?
- Critical thinking
An entry level cloud data analyst is preparing for an interview. They are taking
notes about the company so they can craft questions to ask the hiring manager. What
is the purpose of these questions?
- To determine if they are a good fit for the company and if the company is a good
fit for them
An entry level cloud data analyst is in a job interview. The interviewer gives them
a technical problem and asks them to describe the steps they would take to solve
it. How can the cloud data analyst demonstrate that they value collaboration?
- By asking clarifying questions
An entry level cloud data analyst is in a job interview. The interviewer asks them
about a specific tool that the cloud data analyst has no experience with. How
should the cloud data analyst answer the question?
- Answer the question from the perspective of another tool and explain that it will
be easy to learn a new tool.
An entry level cloud data analyst is answering behavioral questions using the STAR
method. They describe the positive outcome of a situation. What phase of the STAR
method is this?
- Result
What should the objective section in an executive summary address? Select all that
apply.
- The target goal(s) of the project
- The impact of the project
How can a capstone project in a portfolio benefit you as a cloud data analytics job
seeker?
- By highlighting your thought process in addressing problems, allowing
interviewers to understand your approach
What stage of the capstone project offers you the opportunity to review an example
to get a clear idea of what you will be doing?
- At the beginning
What action can you take if you need guidance during the capstone project?
- Review the previous labs and activities
After completing your capstone project, you added it to your portfolio and
referenced it on your résumé. What other way can your capstone project benefit your
job search?
- Using the capstone project to explain your process during an interview
Why are transferable skills important to consider as a cloud data professional?
- Skills learned throughout a career can be transferable and applied to new
circumstances.
How can an elevator pitch help you during the job interview process?
- It allows you to give interviewers a quick, high-level overview of your work for
general understanding and discussion.
When creating your online project portfolio, what should you include in the
Projects Overview section?
- A few sentences stating the problem solved, data used, and the results of the
project
What is the primary benefit of adding your capstone project to your portfolio?
- It showcases your hands-on experience with cloud data analytics.
What challenges can generative AI tools like Gemini help you solve?
- Organize information into formatted tables within a spreadsheet.
Which tool is best to use with Gemini if you want to create an icon for your
presentation?
- Google Slides
You are writing an email to your CFO who you do not work with frequently. You
drafted an email, but you want to make sure it is not too casual. Which Gemini
option can you choose to improve the tone of your email?
- Formalize
You’d like to use Gemini to write an email to your colleagues inviting them to a
fun team-building event. Which of the following are details you might include in
the prompt to create the most relevant email? (Select two).
- The recipient
- The tone
You want to create a visual of a cow jumping over the moon for your slides, but you
want it to look like a colorful brush painting. Which style should you pick?
- Watercolor
You are leading an introductory course for dental students. You want to have a
slide in your course presentation that teaches about tooth decay. This is outside
your area of expertise so you want to generate an image that shows the different
key indicators of tooth decay to your students. Which of the following would be the
best prompt?
- This is not a good use case for Help me visualize.
You are creating a slide deck to virtually celebrate a coworker’s birthday. You
want to include an image of a custom cake on your slides. Your colleague loves
tigers and playing ultimate frisbee so you want the cake to have a picture of a
tiger playing ultimate frisbee. Which of the following would be the best prompt?
- A cake with a tiger playing ultimate frisbee.
Choose the FOUR correct DDoS Mitigation Layers from the list below.
- Load Balancing
- Internal Traffic
- Attack Surface
- CDN Offloading
Which TWO of the following statements is TRUE about Google Cloud Armor?
- Google Cloud Armor protection is delivered at the edge of Google’s network.
- Google Cloud Armor enforces access control based on IPv4 and IPv6 addresses or
CIDRs.
Choose from the list below which way Google Cloud helps mitigate the risk of DDoS
for its customers.
- Internal capacity many times that of any traffic load we can anticipate.
Which TWO of the following tools does Google Cloud make available to customers for
the mitigation of content-related security threats?
- Cloud Natural Language API
- Cloud Data Loss Prevention API
Which TWO of the following statements are TRUE when speaking about content-related
security threats?
- Screenshots or other images that are made public without redaction can trigger a
content-related cyber attack threat.
- Ransomware is a type of malicious software exploit that threatens to publish or
perpetually block access to data unless money is paid.
Which TWO of the following options are ways that Google Cloud automates for
customers the mitigation of many content threats?
- In Google Drive, all files will undergo a malware scan prior to any file download
or file sharing attempt.
- Google has global visibility into malicious sites and content, and is able to
warn incoming users of suspected malware.
Which TWO of the following statements about Cloud Monitoring and Cloud Logging are
TRUE?
- The Cloud Logging Agent can be installed on both Compute Engine and AWS EC2
instances.
- You can analyze log data in BigQuery.
Which one of the following is NOT a benefit for automating security in Google Cloud
environments?
- While beneficial in some situations, the time invested in automating certain
tasks is not worth it due to a lack of Google Cloud services that support this
framework.
Which TWO of the following statements about Cloud Audit Logs are TRUE?
- Enabling Data Access audit logs might result in your project being charged for
the additional logs usage.
- Cloud Audit Logs maintains three audit logs for each project, folder, and
organization.
Which one of the following statements about Security Command Center is NOT true?
- Security Command Center requires three IAM administrative permissions to set up
What does good credential management help prevent? Select two answers.
- Potential breaches
- Unauthorized access
What are the three components of the AAA framework? Select three answers.
- Authentication
- Auditing
- Authorization
A nonprofit organization migrates the majority of its data and applications to the
cloud. As part of the process, they implement the principle of least privilege.
What additional best practices can limit the chance of unauthorized access, and
make managing access controls a more fluid and well-structured process? Select two
answers.
- Regularly auditing, reviewing, and updating access controls
- Separating duties
What does Identity and Access Management (IAM) allow you to manage across your
cloud environment? Select two answers.
- Users and groups
- Roles and permissions
A company hires a security consultant. The consultant reports that phishing attacks
are increasing, which may impact the company. What solution should the consultant
recommend to combat phishing?
- Implement user training and email security measures.
A large real estate company has become aware of multiple attempts by cybercriminals
to exploit their software vulnerabilities. What steps will protect their client
data and prevent financial loss? Select two answers.
- Implement user training and email security measures.
- Deploy DDoS mitigation services and monitor network traffic.
In the context of cloud security, what does a Virtual Private Network (VPN) do?
- It creates a secure, encrypted tunnel for data to travel between the cloud
environment and the user.
In the context of zero trust, what is the purpose of the Network Access Control
(NAC) mechanism? Select two answers.
- It enforces policy-based access control to network resources.
- It ensures that only authorized devices and users can access the network.
In a zero trust environment, John, an employee who typically works from the office
network, decides to work from a coffee shop. Because of the principles of a zero
trust security model, John's request for access to the company's servers is not
automatically granted. What is the role of context-aware access controls in this
scenario?
- It makes decisions about granting or denying access to resources based on the
user's identity, and contextual information like location, device, and behavior
patterns.
What is meant by the principle "verify explicitly" in the context of zero trust?
- Every access request must be authenticated and authorized before access is
granted to any resource.
What method can a cloud security specialist use to solve the issue of multiple log-
ins across various company platforms?
- Implement a Single Sign-On (SSO) system.
How does centralized and consistent identity management enhance security? Select
two answers.
- By consolidating access controls
- By preventing potential breaches
For a security analyst, which audit type is best for evaluating a system's
effectiveness and efficiency?
- Operational audit
A user enters a username and password before they can gain access to a company’s
information system. What network security concept does this scenario describe?
- Authentication
In a company merger scenario, which type of security model would manage the
integration of two different security systems through detailed analysis and
coordination of existing security labels and policies?
- Mandatory Access Control (MAC)
Carla has been asked by her company to set up a virtual private network (VPN) for
their remote employees. What is the main benefit that Carla wants to achieve for
employees with the implementation of the VPN?
- Provide a secure, encrypted tunnel for seamless data transmission.
A cybersecurity officer for a startup needs to protect the startup’s digital assets
against password attacks. What method should the cybersecurity officer deploy to
best guard against these types of security breaches?
- Establish strong password policies and incorporate multi-factor authentication.
Your organization has recently experienced a cyber attack, and is in the response
phase. Which of the following actions should your organization take? Select two
answers.
- Establish communication protocols for handling the incident
- Implement an emergency response team
What are the primary benefits of the patching process? Select two answers.
- Timely fixing of security vulnerabilities
- Enhancing the system's performance and stability
A tech startup has developed a new update for its software, which runs on thousands
of interconnected IoT devices in a cloud-native environment. This update involves
multiple large-scale changes. What approach should the startup adopt for the smooth
implementation of this update?
- Rehydration
A company has discovered a minor security flaw in its legacy customer management
system. The company relies on this older system for everyday operations, so any
significant downtime could severely disrupt the company's operations. What method
should the company's IT team use to fix this situation?
- Patching
Why would a cloud security manager prefer rehydration for large-scale, cloud-native
environments?
- It enables faster rollout and minimizes disruptions to services.
What are the key features of cloud attack surface management (CASM) solutions?
- CASM solutions involve asset discovery, vulnerability assessment, threat
intelligence integration, and risk prioritization.
What are the key features of cloud security posture management (CSPM) tools?
- CSPM tools continuously monitor and assess cloud environments, identifying
misconfigurations, vulnerabilities, and compliance violations.
In a threat management strategy, what role does response play when a system
encounters a cyber attack?
- Identifying and limiting the impact of ongoing cyber attacks quickly
What are the first two steps to ensure effective asset management within a cloud
environment? Select two answers.
- Catalog all elements within the cloud environment.
- Rank resources based on their relative importance.
A small startup is anticipating company growth. They mainly rely on Python scripts
and need an IT automation tool that is easy to read and doesn't require extra
software installations. What tool would be the most suitable choice?
- Ansible
During the rehydration process, what should be done once new resources with updates
are created?
- Run them alongside the existing ones
In the DIE triad, how does the ephemeral nature of resources contribute to system
security?
- It prevents attackers from stealing information that has been deleted.
What strategy can a tech company use to manage tasks, network security, and
regulatory compliance?
- Use managed services
The CEO of a startup receives a report discussing the shared responsibility model
for cloud security. Which of the following statements from the report accurately
reflect the Shared Responsibility Model? Select two answers.
- The cloud service provider is in charge of monitoring and responding to cloud-
related security threats.
- The organization is responsible for protecting the data and assets stored in the
cloud environment.
In the context of Infrastructure as Code (IaC), which tool builds the necessary
resources when you input code and choose your cloud platform?
- Terraform
Cloud security engineers for a large retailer decide to implement a system with
policy enforcement automation. They carefully consider sharing and updating
policies, preventing security vulnerabilities, and maintaining compliance with
government and industry standards. What are the possible outcomes of this strategy?
Choose two answers.
- The policy system will lead to quicker operations and enhanced feedback linked to
compliance.
- The policy system, when coded with government and industry standards, will
maintain better compliance, lowering the chances of violations and subsequent
penalties.
What are the roles of a kernel in an operating system? Select two answers.
- A kernel manages processes within the operating system.
- A kernel handles memory allocation and management.
What is a hypervisor?
- Software used to create and operate virtual machines
Anik is a security analyst working on a task that involves executing a single
function. Anik can use either containers or virtual machines for this task. Why
might Anik use a container rather than a virtual machine?
- Containers are more lightweight and efficient than virtual machines.
What is the security issue with the service account associated with the container?
- It provides unrestricted access to all of the application developers.
What can be used to address the service account with unrestricted access? Select
two answers.
- Role-based access control (RBAC)
- The principle of least privilege
A company uses container images for its applications. To prevent container drift,
they want to implement a strategy that ensures no new executables can be added
after the container image has been created. Which option should the company use to
prevent container drift?
- Make the container immutable.
Lola shares the advantages of automation in a meeting with her cloud team. She
emphasizes that it is useful in handling problems and misconfigurations. What
benefit of automation is Lola referring to?
- It brings issue management together in one central location.
When comparing the DevOps and DevSecOps models, which aspect is unique to
DevSecOps?
- The use of policy as code for security measures
Rajeev is a cloud security specialist who is using Terraform for his project. What
step should Rajeev take before applying the final Terraform configuration?
- Rajeev should plan the configuration.
A company heavily relies on containerization for their applications. Why should the
company keep the host kernel up-to-date when using containers?
- To safeguard against potential exploits targeting the shared kernel
When a chunk of data at rest is updated, what happens to its encryption key?
- It gets a new encryption key.
Juan transfers money between two company accounts via an online banking portal.
Following the transfer, Juan reviews more detailed account information on the same
portal. In this scenario, what state is the data returned to?
- Data in use
What is the state of data that moves between a mobile device and a banking app's
host?
- Data in transit
Why are tags crucial for data protection? Select two answers.
- They help security assets find the data that needs to be protected.
- They enable better organization of sensitive data.
A cloud storage company wants to share a document related to its range of tiered
services. The document includes details related to storage limits, pricing, and
services for each tier. The document does not include any sensitive internal
metrics or targets. Considering data sensitivity, what classification should the
document receive?
- Public
The chief information officer (CIO) of a tech company develops a data retention
policy. What should the CIO consider to ensure the policy meets the company’s
needs?
- Different types of data may need distinct policies.
Anna is a data consultant for a growing start-up. What data retention policy should
Anna recommend for the company’s new cloud storage service?
- Recommend a bucket-based policy allowing object deletion or replacement only
after objects have exceeded the set retention period
An online store ensures the validity and uniqueness of their customer's data as
part of their data governance strategy. What impact does this have on their
operations?
- Enhances data quality by minimizing duplications
In the event of a ransomware attack on cloud data storage, how can an organization
restore their data?
- By contacting their cloud service provider
A sudden power outage causes a company's data center to go offline, stopping all
applications. To effectively manage downtime, the company’s business continuity
plan includes a crucial objective that determines the maximum acceptable time
period for an application to be offline. Which is the term for this objective?
- Recovery time objective (RTO)
Rosario and Farai are collaborating on a project. They need to establish control
over who can access their new tag templates. Which method should they use to
accomplish this objective?
- Apply Identity Access Management roles to grant or deny access
Elena and Ken operate two customer databases. They frequently cross-check and
update the databases to maintain data quality and integrity. In this context, when
do Elena and Ken consider the data to be consistent?
- When Elena and Ken ensure that the data matches corresponding information in the
other database.
Toshiro has to follow regulations that mandate all data generated within a
country's borders must remain within those borders. What is the term for this
regulatory requirement?
- Data localization
A company uses cloud storage to store and manage its data. They have a bucket with
a locked retention policy. Under what circumstances can the company delete this
bucket?
- They can delete this bucket once every object inside it has finished its
retention period.
Nia and Cameron have co-founded a tech start-up. Unexpectedly, their office
building’s water pipes burst, causing disruption in their operations. Given the
situation, what is the main goal of their disaster recovery plan (DRP)?
- Retrieve crucial data and assets lost due to the burst water pipes
You have written a document that is too long and wordy. You want to make it more
concise and easy to read. Which option should you use?
- Shorten
You are a financial analyst at a bank and you are writing a report on economic
trends. You want to ensure that the report is polished, so you decide to use
Gemini's Proofread feature. Which of the following is a suggestion that Proofread
might make to improve your report?
- Use active voice.
You are working on a new product launch for an organic green juice named Cymbal
Green. You have conducted market research and have a good understanding of consumer
needs and preferences. You want to use Gemini to develop compelling product
descriptions that convey the benefits of the new beverage. Which of the following
is the best prompt?
- Craft a product description for a new organic green juice called Cymbal Green
that highlights the juice’s ability to boost energy levels and enhance performance.
You used a prompt to create a template that handles vendor schedules. You are
mostly happy with the output, but want to have an additional column for the start
date of each vendor. Which of the following is your best next step?
- Insert the template.
The IT manager at your organization wants to know the advantages of using 2-step
verification for your organization. What should you say? (Choose 2)
- It'll greatly reduce the risk of unauthorized access if a user's password is
compromised
- It'll reinforce our domain’s password security by requiring our users to enter an
additional code or use a security key to sign in
What are some best practices for reinforcing and monitoring the security of your
domain?
- All the options
The IT manager at your organization hasn't had a chance to explore the admin
console yet but wants to know what individual security settings he can manage for a
user. What are some examples you could give him? (Choose 3)
- Determine if the user is enrolled in 2-step verification
- Temporarily disable the user's login challenge for 10 minutes
- Require a password change
What of the following are true of the Secure LDAP service? (Choose 3)
- It allows you to connect your LDAP-based applications and services to Google
Workspace
- Users authenticate against the Google Workspace directory to gain access to LDAP
compliant applications and services
- It reduces maintenance as directory information is consolidated into one
directory
Your IT manager has just informed you that your organization has an account now
with Asana and would like you to enable Single Sign On with the application. Where
in the admin console would you go to configure a third-party pre-integrated cloud
application, like Asana, as your service provider?
- Apps > Web and mobile apps > Add App > Search for apps. Then search for Asana
from the list of predefined applications
When using a third party IdP which of the following is disabled/hidden in Google
Workspace?
- Require password change
What is the expected behavior when a user tries to install a Marketplace app that
has not been allowed?
- Users can not attempt to install an application that is not on the allowlist
because they only see allowed apps in the Marketplace
You have been asked to create a allowlist of Marketplace apps to restrict which
apps a user can install onto their devices. What must you do first?
- Change the Marketplace settings to allow users to install only allowed
applications from Google Workspace Marketplace
Your organization wants to prevent any external application from accessing Gmail
and Drive data. How would you ensure such access is prevented?
- From Security > Access and Data Control > API Controls, ensure Trust domain owned
apps is enabled. From Security > Access and Data Control > API Controls > MANAGE
GOOGLE SERVICES, restrict access to the Gmail and Drive services.
What happens to already installed applications if you block API access from the
Security > API Permissions section?
- Already installed applications will stop working and OAuth tokens will be revoked
When examining messages in the security investigation tool what actions can you
apply to a message? (Choose 3)
- Delete message
- Mark message as spam
- View header
Which of the following statements is NOT TRUE about the alert center?
- The alert center consolidates all admin created email alerts into one place
You have been asked by your CEO to provide a list of users who have not yet
enrolled into 2-step Verification. Where can you find that information?
- Users Account Activity Report
Which ONE of the following statements is TRUE concerning Google's built-in security
measures?
- To guard against phishing attacks, all Google employee accounts require the use
of U2F compatible security keys.
Which TWO of the following statements are TRUE regarding regulatory compliance on
Google Cloud?
- Proper configuration of encryption and firewalls is not the only requirement for
achieving regulatory compliance.
- Google's Cloud products regularly undergo independent verification of security,
privacy, and compliance controls.
The main purpose of Google Cloud Directory Sync is to: (choose ONE option below)
- Help simplify provisioning and de-provisioning user accounts.
Which of the following statements is TRUE for the use of Cloud Identity?
- Cloud Identity can work with any domain name that is able to receive email.
Which TWO of the following statements about Cloud IAM Policies is TRUE?
- A policy is a collection of access statements attached to a resource.
- A Policy binding binds a list of members to a role.
Which FOUR of the following are Cloud IAM Objects that can be used to organize
resources in Google Cloud?
- Folder
- Member
- Organization
- Role
Which ONE of the following statements is TRUE when discussing the SSL capabilities
of Google Cloud Load Balancer?
- The Google-managed profile, COMPATIBLE, allows clients which support out-of-date
SSL features.
Which of the following does not allow you to interact with Google Cloud?
- Cloud Explorer
What is the difference between the Google Cloud Console and Cloud Shell?
- Cloud Shell is a command-line tool, while the Cloud Console is a graphical user
interface
What is one benefit of applying firewall rules by tag rather than by address?
- When a VM is created with a matching tag, the firewall rules apply irrespective
of the IP address it is assigned.
Which of the following defines the objective of the People dimension in the three
dimensions of deployment?
- Getting members within an organization to adopt the new workspace changes through
training, sponsorship, and communication.
Your organization is creating a new internal training program for their sales team.
Which of the following steps takes place after the training content has been
delivered and members of the sales team have provided feedback on their learning
experience?
- The training enablement team works to refine the program and develop advanced
training sessions focused on in-depth product knowledge.
Your organization has successfully deployed Google Workspace and is looking to grow
user adoption rates. Which of the following activities can help support ongoing
training?
- Showcasing user achievements and offering self-service solutions.
Which of the following describes the Embed phase when creating a sponsorship
assessment?
- The Embed phase focuses on establishing new workflows that support sponsor
objectives.
Which of the following accurately outlines the Sponsorship and Engagement work
stream?
- Engage sponsors, engage change agents, promote adoption, champion innovation.
Which of the following activities can help promote the adoption of Google features
and capabilities? Select two responses.
- Provide training on using the new workspace to all employees.
- Showcase users who are successfully using the new workspace tools.
Which of the following roles actively promotes the benefits of adopting change
within their teams and departments?
- Google Guides
After agents of change within an organization have been identified, which of the
following steps must be taken to support the promotion of the changes within the
Enable phase of the change journey? Select two responses.
- Recruit early adopters to promote the benefits of the change within their
department.
- Form a committee to communicate with the larger organization on the changes and
address their concerns.
What information about a user group is important to identify to prepare for the
deployment of Google Workspace? Select two responses.
- The location that members of the group are based in.
- Language proficiencies within the group.
Your organization has rolled out the new workspace deployment to a select group of
users. How can you promote the success of the deployment to encourage other members
of your organization to adopt the changes?
- Encourage Google Guides to promote personal success stories of users who have
adopted the change.
You are part of a team of sponsors who are creating an organizational analysis for
the new Google Workspace deployment. After determining criteria for a successful
deployment, which of the following would be the most effective step to take to
identify organizational processes that need to change?
- Assess transformation readiness.
Which of the following activities is executed during the Enable phase when creating
an organizational analysis? Select two responses.
- Gathering user issues, questions, and ideas from Google Guides.
- Collecting benchmark statistics to assess ROI.
Your organization has just deployed Google Workspace for the first time. Which of
the following ideas would be best to celebrate the success of the new workspace
deployment during the Expand phase of the change management process?
- Hold a competition across the organization to see who can collect the best
success story.
How is the communications plan used during the Embed phase of the change journey?
Select two responses.
- To define success metrics and collect results.
- To establish a product update communication plan.
Which of the following key messages are defined in the communications plan?
- Date of deployment.
Which of the following statements about the communications plan is true? Select two
responses.
- It is mainly focused on visibility and marketing.
- It describes a multi-channel approach to communicate the vision.
You are a change champion at your organization. You are working on the development
of a Communications Plan. Which of the following activities that are conducted
during the Excite phase of the change journey would you want to include in the
plan? Select two responses.
- Deploying a coordinated marketing campaign across multiple channels for maximum
visibility.
- Requiring an elevator pitch to summarize the vision behind the change.
Which of the following describes the workstream for creating a training needs
assessment?
- Plan training, conduct training, continue training, train on new releases.
In what order are the following tasks executed during the Excite phase of the
Training workstream? 1. Plan and conduct an initial training needs assessment. 2.
Identify useful training resources. 3. Create a training outline and plan. 4.
etermine learning needs for each user group.
- 1, 4, 3, 2
Which of the following training activities are used during the Expand phase when
creating a Training Needs Assessment? Select two responses.
- Product update training
- Productivity trainings
Which of the following describes the best way to resolve conflicts that arise from
adopting the change?
- Identify needs that aren’t met, provide a channel of feedback to those involved,
analyze the information to determine next steps, get consensus from those involved.
Which of the following can help address resistance to cultural change? Select two
responses.
- Promote the intended benefits of adopting the change.
- Reinforce the urgency of making the change.
Which of the following three practices are recommended when creating deliverables
during the Excite phase of the change journey? 1. Identify the appropriate training
for different user groups. 2. Identify the root cause of emerging conflicts. 3.
Document metrics for a successful deployment. 4. Highlight and reward champions of
the change. 5. Create user groups based on job responsibilities or workplace
functions.
- 1,3,5
You are acting as a change manager within your organization. How can you help speed
up change efforts in reluctant user groups?
- Recruit people within the user groups’ client organization to be Google Guides.
When you design a visualization, what is the main purpose of your design?
- Communicate a specific data story.
Your organization’s marketing team is setting next year’s marketing campaign budget
per region. As a cloud data analyst, you are tasked with creating a report that
helps with the budgeting process. Which cloud resources could help you provide
greater context and valuable insights in your report? Select two answers.
- Publicly available data sources
- Social media applications data
When you are planning a visualization, it is important to keep your data safe and
control access to the data. Which basic principle should you consider to help you
meet this objective?
- Data governance
A cloud data analyst is designing a dashboard and makes one of the graphs bigger
than the others. What is the purpose of this action?
- To communicate that the bigger graph is more important than the others.
Why is it important to consider the user interface and the user experience in a
data visualization? Select two answers.
- To ensure that users understand what options are available to them and what
insights can be gained from the data
- To design effective, powerful visualizations that bring data to life
A cloud data analyst is designing a data visualization. They want to make sure that
they keep the user in mind during the design process. Which of the following
aspects should they consider when designing the visualization?
- What the users need and want
A data analyst wants to ensure that the structure of their content and
visualizations are meaningful to people who use screen readers. Which principles do
they need to implement to make their dashboards available to everyone?
- Usability and accessibility
After you consider your users' needs, what other factors may influence your design
decisions? Select two answers.
- Producing web vs. mobile products and applications
- Allowing users to provide feedback or development requests and report issues
The following chart represents the current score comparison from 4 different high
school soccer teams, per period. Which of the following design features should be
implemented to improve the chart design? Select two answers. [Alt text: Bar graph.
The light blue bar represents the score on period 1, the dark blue bar the scores
on period 2. X-axis has teams 1, 2, 3, and 4. Y-axis has numbers 1, 2, 3, and 4.]
- Label the x-axis with the name of the teams.
- Add a meaningful title label to the chart.
How do cloud-based tools help data analyst teams view data and trends in the
context of the broader organization?
- Cloud-based tools combine information from multiple data sources.
A cloud data analyst is planning a visualization. As part of the process, they work
on understanding the medium through which the cloud data team will interact with
the data. What part of the visualization planning workflow are they considering?
- Digital consumption
Taylor is a cloud data analyst working on making visualizations accessible and easy
to use. As part of this process, Taylor considers the users who will interact with
the visualization. Which principles is Taylor applying? Select two answers.
- User experience
- User interface
A cloud data analyst, what factors influence the method you use to learn your
users' needs?
- Type of industry, budget, and tools available
A cloud data analyst is designing a dashboard solution for the human resources
department. Which of the following factors should the cloud data analyst consider?
Select two answers.
- Visualization access
- Inclusion of user feedback
A data analyst is creating a bar chart for a stakeholder dashboard. Which of the
following characteristics should the dashboard have to be clear and consistent?
- Meaningful title and labels
A cloud data analyst creates a visualization and encounters the following problems:
There are discrepancies in the data that the analyst is using. The analyst cannot
access any additional data to enrich the visualization and cannot connect all the
datasets needed. What is the most likely cause of the analyst’s problems?
- The analyst is using data silos.
As you design your dashboard, you establish controls that allow only the user with
the right privilege to access high-level information. Which policy are you
applying?
- Data governance
What data type is best suited for displaying categories like names, brands, or
browsers?
- String
Which suggestion would be the most impactful to ensure both users with a strong
data analysis background and those who have less experience can use the
visualization effectively?
- Keep the visualization simple and focus on the key insight.
Which of the following visualization types would be most effective to display the
top 10 browsers used by website visitors?
- A bar chart
Which of the following best describes one reason it is important for cloud data
analysts to define a purpose statement for the visualization before choosing a
visualization type?
- A purpose statement aligns the visualization with the stakeholder’s expectations
and ensures the key insight is addressed.
You are creating a data visualization to demonstrate how the profits from a
company’s five different product lines contribute to total company revenue. Which
presentation type would you use for this visual?
- Composition
What types of visualizations can only display numerical data? Select two answers.
- Distribution charts
- Relationship charts
You are tasked with creating some visualizations for a dashboard. How does
understanding what type of data you will use in each visualization help you in the
design process?
- It helps you choose the chart type.
You have been asked to create a dashboard that gives company executives a clear
understanding of the company's first quarter revenue. You must compare the actual
revenue to the target revenue and the revenue from last year's first quarter. Which
type of dashboard should you use?
- Strategic dashboard
Taylor is a data analyst who has been asked to create a dashboard. What information
will help Taylor to decide which type of dashboard to use?
- The user, their job role, and the business goal
Taylor is a cloud data analyst tasked with creating a visualization for a call
center that displays the actual average call time vs. a goal that management has
set for the average call time. What type of visualization should Taylor create?
- A scorecard
A cloud data analyst needs to ask a series of questions before starting a data
analysis project. They decide to follow the SMART methodology for asking questions.
What does the "S” in SMART stand for?
- Specific
What characteristics of the SMART methodology will provide you with responses that
you can act upon?
- Action-oriented questions
As a cloud data analyst, you should ask measurable questions. Which of the
following is an example of a measurable question?
- By how much do you want to decrease your response time?
Which option most clearly identifies the primary purpose of the report?
- To analyze historical website traffic data and identify opportunities to improve
campaign effectiveness and efficiency
Which proposed color palette approach is most likely to improve the readability and
accessibility of the design?
- Use high-contrast purple and yellow to make the bar chart easy to understand.
Which of the following recommendations would most improve the proposed layout?
- Create a clear visual pathway to guide users' eyes through the information in an
intuitive way.
Which recommendation would be most effective in making the report more accessible
and user-friendly?
- Ensure the visualizations are clearly labeled.
Your stakeholder wants you to create a dashboard. The dashboard, which should be
based on a screenshot of a report, needs two additional visualizations to complete
the story. What should you do before you build the dashboard?
- You should ask the stakeholder SMART questions to better understand their needs.
You are in the planning stage of your dashboard. As a next step, you want to
communicate the overall visual structure of your dashboard for stakeholders’
feedback. What is the best way to communicate this information to the stakeholders?
- Create a wireframe.
A cloud data analyst needs to create a highly detailed dashboard to analyze the
impact of an organization's social media ads. Which type of dashboard design should
the analyst use?
- Tactical dashboard
You are tasked with designing a visualization that identifies actual results,
compares them against goals, and helps users decide if actions need to be taken.
What type of visualization should you design?
- Scorecard
What methodology should you use to ask effective questions of your stakeholders?
- SMART methodology
A cloud data analyst is designing a dashboard and wants to present their ideas to
project stakeholders. What should the cloud data analyst use to present a visual
representation of the design?
- A wireframe
How do cloud based tools help cloud data analysts create visualizations that allow
stakeholders to make informed decisions?
- Cloud based tools allow public cloud base data sources to combine with local data
sources.
What is a benefit of using a cloud visualization tool?
- It allows cloud data analysts to analyze and activate data from a variety of
sources.
As a cloud data analyst, you will use the cloud to access open data to enrich your
visualizations. Which are the four main types of data sources in the cloud?
- Public, product-specific, platforms, and company-specific
A cloud data analyst is designing a dashboard. As a next step, they consider the
options to keep the data current. What is the data analyst considering?
- Data freshness
As a cloud data analyst, what type of questions can you answer using measures?
- Questions that require a mathematical operation of the dimensions, such as,
average, count, and sum
A data analyst is tasked with creating a visualization. What process can they use
to understand the dataset’s structure?
- Data exploration
How does data exploration help a data analyst avoid mistakes in a visualization?
- By identifying outliers and abnormalities
A data analyst is experimenting with how their data can be visualized. What is one
of the benefits of this practice?
- Helps to refine the hypotheses
You are tasked with the creation of a data visualization. You want to present a
report that gives a broader and deeper insight, so you decide to use public data
available in the cloud. Which process should you use to model your data?
- Data blending
When creating a report with data blending, which factor would determine how current
the data is?
- The freshness of the sources
You are creating a report, and you are in the process of manipulating the data so
it is easy to work with and understand. What is this process called?
- Modeling data
A data analyst is working with a company dataset. As a next step, they need to
model the data so it is easy to work with and understand. Which are the three basic
ways the analyst can model the data?
- Filtering, blending, and aggregating
A data analyst is tasked with the creation of a visualization for a company’s board
of directors meeting. The visualization must demonstrate the progress of new
product development over the last month. What type of visualization should the data
analyst create?
- A report
A cloud data analyst is creating a visualization that will allow their stakeholders
to make basic table calculations and create some forecasts. What type of permission
should the cloud data analyst set for the stakeholders?
- User
What type of attributes help data professionals comprehend the essential nature of
their data?
- Size, quantity, distribution, and accuracy
A cloud data analyst is tasked with creating a visualization for a museum. The
visualization needs to include the genres in the museum and list the painting names
for each genre. The dataset for the visualization has the following data model:
paint_name, genre, painter, creation_year, location, cost, and ownership. Which
dimensions should the cloud data analyst use to answer the question?
- Genre and paint_name
You are modeling data to limit the focus of the results to only a specific subset
of the data. Which process of modeling data are you using?
- Filtering
Which modeling data process allows you to summarize and average the data?
- Aggregation
A cloud data analyst is pulling data from different locations and combining them to
create a report. What are they doing?
- Data blending
A cloud data analyst is preparing a report for the stakeholders. They decide to use
datablending as part of the process. Which of the following is an example of the
data blending process that the cloud data analyst can use?
- Use the organization dataset combined with a public dataset to enrich the data
and use the product category to join the datasets.
Noah is a human resource manager that wants to analyze the time and cost to hire a
new employee for the organization. The organization uses enterprise-grade data
visualization tools. How does this help Noah to conduct an analysis?
- By allowing Noah to directly interact with the data and create reports
A company is using a guided analytic approach for their data-driven decisions. What
can be a downside of using this approach?
- Users could face delays to access the insights.
A user needs to explore and analyze a large dataset to prepare a report. The user
is non-technical and does not have a lot of experience working with data. What
should they use to create the report?
- Use an enterprise-grade data visualization tool
What technique allows cloud data analysts to explore data at a granular level?
- Data drilling
As a cloud data analyst, you are tasked with creating a visualization that allows
the users to navigate from one visualization to other related visualizations. What
technique should you implement?
- Drill through
A cloud data analyst is creating a visualization that will allow users to apply
“drill up” and “drill down” techniques to explore the data. What must the cloud
data analyst define to stipulate how the users will navigate when they “drill” into
the data?
- The dimensional hierarchy
A cloud data analyst is working on a visualization and wants to present the results
based on specific attributes of the data. They also want to perform the
corresponding calculation after they narrow down the data. What process should the
cloud data analyst perform to obtain the desired results?
- Filter the data using dimensions.
As a cloud data analyst, you are creating a live dashboard. Next, you need to
decide which is the best method to keep the dashboard data up to date. Which
feature of a live dashboard are you implementing?
- Automatic refreshing
As a cloud data analyst, you are tasked with the creation of a live dashboard for
an organization. Which three qualities must your dashboard have?
- The dashboard must have time-sensitive data, automatic refreshing, and alerting.
The role of a data team at an organization begins to shift. Previously, the data
team was responsible for controlling the organization's datasets and deciding how
to analyze the data. Now, the data team needs to facilitate the safe, uniform, and
efficient use of data. Why has the role of the data team changed?
- More organizations are taking a self-service analytics approach.
What data exploration technique allows cloud data analysts to work with large
datasets and use a manageable amount of data to get familiar with the dataset
structure and characteristics?
- Data sampling
A cloud data analyst is working on a visualization for a clothing store. They want
to know which clothing_items have total annual sales over $10,000. The dataset that
they are using has the following attributes: product_id, size, color, quantity,
unit_price, total_annual_sale. How can the cloud data analyst best answer the
question?
- By filtering the dataset using: <span style="background-
color:#cccccc;">total_annual_sales</span> <span style="background-
color:#cccccc;">>=</span> $10,000.
As a cloud data analyst, you want to provide your users with the ability to explore
the data from a general view to a granular view. What technique should you use to
allow users to explore the data?
- Drill down
A cloud data analyst configures a live dashboard to send an email to the company
CEO if one of the key performance indicators reaches a specific value. Which live
dashboard feature is the cloud data analyst using?
- Alerting
As a cloud data analyst, why might you serve as a resource for teams to help them
understand the data?
- Because non-technical employees are often asked to work directly with data
A cloud data analyst is building a report and needs to filter the data to find all
the customers that have spent more than $150 total on purchases. The data table has
the following dimensions: customer_id, country, age, purchase_date, and total.
Which of the following filters will the cloud data analyst apply?
- Group the rows by customer, then add the total by customer, and finally filter on
total > $150.
A cloud data analyst is preparing a visualization for the marketing department. In
the visualization, users will start with a display summarizing all the marketing
campaigns. From there, the users can navigate to visualizations with details for
each campaign. What technique is the cloud data analyst using?
- Drill through
Morgan and Whitney are cloud data analysts working collaboratively on a dashboard.
They create a repository to control the versions of the dashboard code and manage
changes. A few days later, Morgan noticed that Whitney’s code was impacting the
main dashboard code. What is most likely the cause of this problem?
- Whitney did not create a branch and is working on the main code.
Which feature of an IDE application helps the cloud data analyst to detect possible
errors in the code?
- Built-in debugger
How does an IDE application help a cloud data analyst obtain information about the
structure of the data model to write the code more efficiently?
- An IDE allows a cloud data analyst to easily find a model’s metadata.
What are two advantages of using data modeling languages? Select two answers.
- You can define fields in a user-friendly way.
- You can build visualizations that meet specific business needs.
A cloud data analyst is using a data modeling language. They create a measure once,
and then reuse it in a few different projects. What are two benefits of reusing a
measure? Select two answers.
- Business users have a single source of truth.
- The measure works the same way each time it's used.
A cloud data analyst is using a data modeling language. They create a few
components that other team members can reuse. How can they communicate this
information to other cloud data analysts?
- The cloud data analyst can generate documentation for the model.
A cloud data analyst is defining dimensions and measures using a data modeling
language. What is the cloud data analyst doing?
- Describing the structure of data
A cloud data analyst is asked to explain to the board of directors why the
organization should adopt a dashboards as code approach. The board of directors is
concerned about how time-consuming it can be to build entire dashboards using code.
To address these concerns, which of the following points should the cloud data
analyst highlight?
- Dashboards following the dashboards as code approach are reusable.
A data team is evaluating the adoption of a dashboards as code approach. They
compare using a dashboards as code approach with using a visualization tool’s user
interface. Which of the following is a disadvantage of using a visualization tool’s
user interface?
- Changes are made directly over the dashboard live version.
A cloud data analyst is asked to revise a live dashboard that was built using the
dashboards as code approach. How should they make the changes?
- Update the underlying code in a developer environment.
A cloud data analyst is using a derived table. As a part of this process, the data
analyst writes a query to gather the information for the derived table and an outer
query to find the information. What is the first thing that happens when the cloud
data analyst runs the outer query?
- The derived table is created.
A cloud data analyst evaluates caching a visualization’s data. What is the data
analyst trying to achieve?
- Improve the performance of visualizations.
A cloud data analyst uses a derived table to answer a complex data problem. The
derived table that they use can also help them solve a different problem. Which
limitation of derived tables prevents the cloud data analyst from using the same
derived table?
- Derived tables cannot be reused by other queries.
What is the first step to issue a new query when using a caching policy?
- Search the memory for the results.
A cloud data analyst uses caching in their visualization. Why does caching need to
be monitored?
- To verify that the cache is working properly, and the data is up-to-date.
A cloud data analyst makes changes to a live dashboard to improve some of its
features. What should they do to prevent the introduction of bugs in the dashboard?
- Use the version control process
Which feature of a data modeling language reduces the complexity of a data model?
- Abstraction
A cloud data analyst uses a tool that allows them to create a single source of
truth for users to access the same data at the same time. What tool is the cloud
data analyst using?
- Data modeling language
A cloud data analyst adds a feature to a dashboard. They test the feature before it
goes online. What approach is the cloud data analyst using to add the feature?
- Dashboards as code
What is the term for a virtual table that is created and used for an outer query as
a regular, stored table in a database?
- Derived table
Where does the caching process keep the temporary store data?
- In the memory
A cloud data analyst creates a new copy of a repository. What did they create?
- A branch
Which feature of a data modeling language creates components that are reusable?
- Modularity
Fill in the blank: A rule with only this condition: "Condition: $selection1" is an
example for a ___ event rule.
- Single
Fill in the blank: ___ are a repository of pre-made rules crafted by our experts.
- Curated Detections
Which of the following is NOT a method for ingesting logs using Cloud Storage?
- IBM Cloud Object Storage
Fill in the blank: We can use the ___ action to return if our configuration is
successful.
- Ping
What section of SOAR settings would you go to if you wanted to customize your
company logo displayed?
- Rebranding
Fill in the blank: Besides custom actions, we can also build custom ___ to display
information and widgets for cases and alerts.
- Views
What section of SOAR settings would you go to if you wanted to see when your
License will expire?
- License Management
How do you separate multiple syslog collectors on the same foward when ingesting
data?
- By port
When using Chronicle SIEM, what classification of information are things like
"Employee ID" or "Department?
- Contextual
Fill in the blank: The ___ provides a container where you can configure instances
that can be used in all environments, or you can add different instances for each
environment.
- Shared Instances
Fill in the Blank: The rules engine in Chronicle uses a language called ___ to
build detections.
- YARA-L
What of the following applied threat intelligence platforms is not used with Google
Chronicle?
- Google Endpoint Detection and Response
Fill in the Blank: "Is Suspicious" is an example of a boolean flag for ___.
- Entity Enrichments
What feature would you use if you wanted to amend a default parser?
- Parser Extension
What feature allows you to connect to your on premise system to provide information
for actions, connectors, etc?
- Remote Agent
Which of the following is NOT one of the three mandatory sections required for
writing rules?
- output
Fill in the blanks: UDM has a ___-like structure and loosely follows a ___ model.
- Tree, Sentence
What can we use to constrain the amount of data that is being looked at to
determine if a rule should fire or not?
- Time Window
What section of SIEM settings would you go to to find your Customer ID?
- Profile
Fill in the blank: ___ are tools used to further build upon custom integrations.
- API and SDK
Which one is not a default source of Applied Threat Intelligence for Chronicle
Secops
- reCAPTCHA Enterprise
What term in the case view lets us know that we have an action to take to continue
the playbook?
- Pending Action
What feature allows you to build playbook actions from the marketplace?
- Integrations
A user is in an empty SOAR instance, what feature will provide the fastest way for
them to test the case management capability
- Simulate Alerts
What term would you add to a query to look for things that may have different
capitalizations?
- "nocase"
In a specific alert within Case Management, what are the tabs that an analyst will
typically see under an alert if they have full permissions?
- Overview, Events, Playbooks, Graph
What feature, which must be toggled on, allows you to view previous searches?
- Search History
Which feature lets you set limits on the amount of resources that can be used by a
project or user?
- Quota policies
Which offers a reactive method to help you track and understand what you’ve already
spent on Google Cloud resources and provide ways to help optimize your costs?
- Cloud billing reports
Why is it a benefit that the Google Cloud resource hierarchy follows inheritance
and propagation rules?
- Permissions set at higher levels of the resource hierarchy are automatically
inherited by lower-level resources.
Which Google Cloud tool lets you estimate how changes to cloud usage will affect
costs?
- Google Cloud Pricing Calculator
Which feature lets you set alerts for when cloud costs exceed a certain limit?
- Budget threshold rules
Which represents the lowest level in the Google Cloud resource hierarchy?
- Resources
How does replication help the design of resilient and fault-tolerant infrastructure
and processes in a cloud environment?
- It creates multiple copies of data or services and distributes them across
different servers or locations.
Which Google Cloud Customer Care support level is designed for enterprises with
critical workloads and features the fastest response time?
- Premium Support
One of the four golden signals is latency. What does latency measure?
- How long it takes for a particular part of a system to return a result.
Google's data centers were the first to achieve ISO 14001 certification. What is
this standard’s purpose?
- It’s a framework for an organization to enhance its environmental performance
through improving resource efficiency and reducing waste.
Kaluza is an electric vehicle smart-charging solution. How does it use BigQuery and
Looker Studio?
- It uses BigQuery and Looker Studio to create dashboards that provide granular
operational insights.
What sustainability goal does Google aim to achieve by the year 2030?
- To be the first major company to operate completely carbon free.
What type of cloud computing service lets you bind your application code to
libraries that give access to the infrastructure your application needs?
- Platform as a service
Why might a Google Cloud customer use resources in several regions around the
world?
- To bring their applications closer to users around the world, and for improved
fault tolerance
Choose the correct completion: Services and APIs are enabled on a per-__________
basis.
- Project
Which of these values is globally unique, permanent, and unchangeable, but can be
modified by the customer during creation?
- The project ID
How does Cloud Load Balancing allow you to balance HTTP-based traffic?
- Across multiple Compute Engine regions.
How can you avoid hallucinations when using a large language model?
- Train the model on a clean, curated dataset.
Which security principle advocates granting users only the access they need to
perform their job responsibilities?
- Least privilege
Which cybersecurity threat occurs when errors arise during the setup of resources,
inadvertently exposing sensitive data and systems to unauthorized access?
- Configuration mishaps
Which cybersecurity threat demands a ransom payment from a victim to regain access
to their files and systems.
- Ransomware
Which cloud security principle ensures that security practices and measures align
with established standards and guidelines?
- Compliance
Which three essential aspects of cloud security form the foundation of the CIA
triad?
- Confidentiality, integrity, and availability
What common cybersecurity threat involves tricking users into revealing sensitive
information or performing actions that compromise security?
- Phishing
Which cloud security principle relates to keeping data accurate and trustworthy?
- Integrity
What Google Cloud product provides robust protection from harmful distributed
denial-of-service (DDoS) attacks?
- Google Cloud Armor
Select the correct statement about Identity and Access Management (IAM).
- IAM provides granular control over who has access to Google Cloud resources and
what they can do with those resources.
What metric does Google Cloud use to measure the efficiency of its data centers to
achieve cost savings and a reduced carbon footprint?
- Power Usage Effectiveness (PUE)
Google Cloud encrypts data at various states. Which state refers to when data is
being actively processed by a computer?
- Data in use
Which report provides a way for Google Cloud to share data about how the policies
and actions of governments and corporations affect privacy, security, and access to
information?
- Transparency reports
Which Google Cloud feature allows users to control their data's physical location?
- Regions
Where can you find details about certifications and compliance standards met by
Google Cloud?
- Compliance resource center
Which term describes the concept that data is subject to the laws and regulations
of the country where it resides?
- Data sovereignty
Which of the following is a hybrid cloud setup?
- Your on-premises environments interconnected with your cloud provider.
A service mesh provides centralized observability for your services running where?
- Your Anthos GKE clusters, running on-premises or in Google Cloud Platform.
You need to enforce consistency across all of your environments, using Anthos
Config Management. Where is your source of truth config state stored?
- In a single Git repository, that may be hosted either on-premises or elsewhere.
How does the GKE Connect Agent communicate with Google Cloud Platform APIs?
- The GKE Connect Agent uses an outbound TLS connection to a GKE Connect Proxy
running in Google Cloud Platform.
Which of the following are benefits of Google Kubernetes Engine (GKE)? Mark all
that are true (3 correct answers).
- Auto-scaling, auto-upgrade, and auto-node-repair.
- Seamless operation with high-availability and SLA.
- Runs Certified Kubernetes ensuring portability across clouds and on-premises.
Your GKE On-Prem environment includes which clusters with what purpose?
- Admin cluster(s) with control-plane(s), and User cluster(s) with containerized
workloads.
What is different about viewing GKE On-Prem clusters using the GCP Console from
viewing GKE clusters running on GCP.
- All clusters allow you to review the same cluster, node, and workload details,
whether you're running clusters and workloads in GKE On-Prem or GKE on GCP.
Which of the following are installed by default with the demo configuration profile
of Istio?
- Pilot, Citadel, Promethus, and Grafana.
Which Istio component is responsible for checking to see that quotas and ACL's
allow a request?
- Mixer: enforces access control and usage policies across the service mesh.
There are a number of common challenges encountered by data engineers. Which of the
following approaches best address the challenge of data accuracy and quality?
- Build ETL pipelines to clean and transform data that is then stored in a data
warehouse.
True or False: ARRAYS can be a standalone field type or part of a STRUCTS field in
BigQuery?
- True
Stella is a new member of a team in your company who has been put in charge of
monitoring VM instances in the organization. Stella will need the required
permissions to perform this role. How should you grant her those permissions?
- Add Stella to a Google Group in your organization. Bind that group to
roles/compute.viewer.
You want to use the Cloud Shell to copy files to your Cloud Storage bucket. Which
Cloud SDK command should you use?
- gcloud storage
Fiona is the billing administrator for the project associated with Cymbal
Superstore’s eCommerce application. Jeffrey, the marketing department lead, wants
to receive emails related to budget alerts. Jeffrey should have access to no
additional billing information. What should you do?
- Use Cloud Monitoring notification channels to send Jeffrey an email alert.
Pick two choices, from the options below, that provide a command line interface to
Google Cloud.
- Cloud Shell
- Cloud SDK
Jane will manage objects in Cloud Storage for the Cymbal Superstore. She needs to
have access to the proper permissions for every project across the organization.
What should you do?
- Add Jane to a group that has the roles/storage.objectAdmin role assigned at the
organizational level.
How are billing accounts applied to projects in Google Cloud? (Pick two).
- A project and its resources can only be tied to one billing account.
- A billing account can be linked to one or more projects.
What is the lowest level basic role that gives you permissions to change resource
state?
- Editor.
Which Google Cloud interface allows for scripting actions in a set of command line
executables?
- Cloud Shell.
The projected amount of cloud storage required for Cymbal Superstore to enable
users to post pictures for project reviews is 10 TB of immediate access storage in
the US and 30 TB of storage for historical posts in a bucket located near Cymbal
Superstore’s headquarters. The contents of this bucket will need to be accessed
once every 30 days. You want to estimate the cost of these storage resources to
ensure this is economically feasible. What should you do?
- Use the pricing calculator to estimate the price for 10 TB of multi-region
Standard storage, 30 TB for regional Nearline, and egress charges for reads from
the bucket.
Cymbal Superstore has a need to populate visual dashboards with historical time-
based data. This is an analytical use-case. Which two storage solutions could they
use?
- Bigtable
- BigQuery
Cymbal Superstore decides to pilot a cloud application for their point of sale
system in their flagship store. You want to focus on code and develop your solution
quickly, and you want your code to be portable. How do you proceed?
- Package your code to a container image and post it to Cloud Run.
Cymbal Superstore is piloting an update to its ecommerce app for the flagship store
in Minneapolis, Minnesota. The app is implemented as a three-tier web service with
traffic originating from the local area and resources dedicated for it in us-
central1. You need to configure a secure, low-cost network load-balancing
architecture for it. How do you proceed?
- Configure a standard tier proxied external https load balancer connected to the
web tier as a frontend and a regional internal load balancer between the web tier
and the backend.
Which Google Cloud load balancing option runs at Layer 7 of the TCP stack?
- Global http(s)
You want to deploy a microservices application. You need full control of how you
manage containers, reliability, and autoscaling, but don’t want or need to manage
the control plane. Which compute option should you use?
- Google Kubernetes Engine
Cymbal Superstore needs to analyze whether they met quarterly sales projections.
Analysts assigned to run this query are familiar with SQL. What data solution
should they implement?
- BigQuery
Which storage class is designed for long term storage has a 365 day minimum storage
agreement, and a lower storage price as compared to other storage types?
- Archive storage
The development team for the supply chain project is ready to start building their
new cloud app using a small Kubernetes cluster for the pilot. The cluster should
only be available to team members and does not need to be highly available. The
developers also need the ability to change the cluster architecture as they deploy
new capabilities. How would you implement this?
- Implement a private standard zonal cluster in us-central1-a with a default pool
and an Ubuntu image.
You require a Cloud Storage bucket serving users in New York City and San
Francisco. Users in London will not use this bucket. You do not plan on using ACLs.
What CLI command do you use?
- Run a gcloud storage buckets create command, but do not specify –-location.
You need to quickly deploy a containerized web application on Google Cloud. You
know the services you want to be exposed. You do not want to manage infrastructure.
You only want to pay when requests are being handled and need support for custom
packages. What technology meets these needs?
- Cloud Run
You need to analyze and act on files being added to a Cloud Storage bucket. Your
programming team is proficient in Python. The analysis you need to do takes at most
5 minutes. You implement a Cloud Function to accomplish your processing and specify
a trigger resource pointing to your bucket. How should you configure the --trigger-
event parameter using gcloud?
- --trigger-event google.storage.object.finalize
Which Virtual Private Cloud (VPC) network type allows you to fully control IP
ranges and the definition of regional subnets?
- Custom mode network
Cymbal Superstore asks you to implement Cloud SQL as a database backend to their
supply chain application. You want to configure automatic failover in case of a
zone outage. You decide to use the gcloud sql instances create command set to
accomplish this. Which gcloud command line argument is required to configure the
stated failover capability as you create the required instances?
- --availability-type
Cymbal Superstore’s marketing department needs to load some slowly changing data
into BigQuery. The data arrives hourly in a Cloud Storage bucket. You want to
minimize cost and implement this in the fewest steps. What should you do?
- Use the BigQuery data transfer service to schedule a transfer between your bucket
and BigQuery.
Which of the following tasks are part of the process when configuring a managed
instance group? (Pick two).
- Defining Health checks
- Providing Number of instances
Cymbal Superstore’s GKE cluster requires an internal http(s) load balancer. You are
creating the configuration files required for this resource. What is the proper
setting for this scenario?
- Annotate your service object with a “neg" reference.
You want to implement a lifecycle rule that changes your storage type from standard
to nearline after a specific date. What conditions should you use? (Pick two).
- MatchesStorageClass
- CreatedBefore
You have a scheduled snapshot you are trying to delete, but the operation returns
an error. What should you do to resolve this problem?
- Detach the snapshot schedule before deleting it.
You have a Cloud Run service with a database backend. You want to limit the number
of connections to your database. What should you do?
- Set Max instances.
What Kubernetes object provides access to logic running in your cluster via
endpoints that you define?
- Services
You want to view a description of your available snapshots using the command line
interface (CLI). What gcloud command should you use?
- gcloud compute snapshots list
Cymbal Superstore’s supply chain management system has been deployed and is working
well. You are tasked with monitoring the system’s resources so you can react
quickly to any problems. You want to ensure the CPU usage of each of your Compute
Engine instances in us-central1 remains below 60%. You want an incident created if
it exceeds this value for 5 minutes. You need to configure the proper alerting
policy for this scenario. What should you do?
- Choose resource type of VM instance and metric of CPU utilization, condition
trigger if any time series violates, condition is above, threshold is .60 for 5
minutes.
Which Cloud Run autoscaling setting should you set if you want to limit cost?
- Max instances
You are trying to assign roles to the dev and prod projects of Cymbal Superstore’s
e-commerce app but are receiving an error when you try to run set-iam policy. The
projects are organized into an ecommerce folder in the Cymbal Superstore
organizational hierarchy. You want to follow best practices for the permissions you
need while respecting the practice of least privilege. What should you do?
- Ask your administrator for the roles/resourcemanager.folderIamAdmin for the
ecommerce folder
You have a custom role implemented for administration of the dev/test environment
for Cymbal Superstore’s transportation management application. You are developing a
pilot to use Cloud Run instead of Cloud Functions. You want to ensure your
administrators have the correct access to the new resources. What should you do?
- Make the change to the custom role locally and run an update on the custom role
Cymbal Superstore is implementing a mobile app for end users to track deliveries
that are en route to them. The app needs to access data about truck location from
Pub/Sub using Google recommended practices. What kind of credentials should you
use?
- Service account key
Which of the scenarios below is an example of a situation where you should use a
service account?
- For individual GKE pods
You need to configure access to Spanner from the GKE cluster that is supporting
Cymbal Superstore’s ecommerce microservices application. You want to specify an
account type to set the proper permissions. What should you do?
- Assign permissions through service account referenced by the application
Which Cloud Audit log is disabled by default with a few exceptions?
- Data Access audit logs
Outline where Cloud Audit logs can be accessed: in the logging tab of the
operations interface Link: https://cloud.google.com/storage/docs/audit-logging You
are configuring audit logging for Cloud Storage. You want to know when objects are
added to a bucket. Which type of audit log entry should you monitor?
- DATA_WRITE log entries
You are authenticating an application to service APIs. Both resources are internal
to the Google Cloud environment. What type of credentials should you use?
- Temporary credentials
What are two ways to generate text from a trained encoder-decoder model at serving
time?
- Greedy search and beam search
What is the name of the machine learning architecture that takes a sequence of
words as input and outputs a sequence of words?
- Encoder-decoder
Which option would you choose if you required cross-regional load balancing for a
web application?
- HTTP(S) Load Balancing
What is used to forward traffic from one instance to another within the same
network, across subnetworks, or even between Google Cloud zones, and doesn’t
require an external IP address?
- Routing table
What term describes where the Google network is connected to the rest of the
internet?
- Point of presence (PoP)
Which one of the following provides access to logs created by developers who deploy
code to Google Cloud?
- Service Logs
In Cloud Logging, what is the default log retention period for data access logs?
- 30 days
Which tool ingests metrics, events, and metadata to generate insights through
dashboards, Metrics Explorer charts, and automated alerts?
- Cloud Monitoring
Which service provides raw compute, storage, and network capabilities, organized
virtually into resources that are similar to physical data centers?
- IaaS
In the Google Cloud resource hierarchy, into which entity are resources organized?
- Projects
Which of these is a managed compute platform that lets you run stateless containers
through web requests or Pub/Sub events?
- Cloud Run
What is the Compute Engine feature that allows VMs to be added to or subtracted
from an application based on load metrics?
- Autoscaling
What is the name of the model that is used to generate text captions for images?
- Encoder-decoder model
What is the name of the dataset the video uses to train the encoder-decoder model?
- COCO dataset
What are the three different embeddings that are generated from an input sentence
in a Transformer model?
- Token, segment, and position embeddings
What is the name of the language modeling technique that is used in Bidirectional
Encoder Representations from Transformers (BERT)?
- Transformer
BERT is a transformer model that was developed by Google in 2018. What is BERT used
for?
- It is used to solve many natural language processing tasks, such as question
answering, text classification, and natural language inference.
What is the name of the machine learning architecture that can be used to translate
text from one language to another?
- Encoder-decoder
What is the advantage of using the attention mechanism over a traditional sequence-
to-sequence model?
- The attention mechanism lets the model focus on specific parts of the input
sequence.
What is the name of the machine learning technique that allows a neural network to
focus on specific parts of an input sequence?
- Attention mechanism
What is the advantage of using the attention mechanism over a traditional recurrent
neural network (RNN) encoder-decoder?
- The attention mechanism lets the decoder focus on specific parts of the input
sequence, which can improve the accuracy of the translation.
Cymbal Direct drones continuously send data during deliveries. You need to process
and analyze the incoming telemetry data. After processing, the data should be
retained, but it will only be accessed once every month or two. Your CIO has issued
a directive to incorporate managed services wherever possible. You want a cost-
effective solution to process the incoming streams of data. What should you do?
- Ingest data with ClearBlade IoT Core, and then publish to Pub/Sub. Use Dataflow
to process the data, and store it in a Nearline Cloud Storage bucket.
Customers need to have a good experience when accessing your web application so
they will continue to use your service. You want to define key performance
indicators (KPIs) to establish a service level objective (SLO). Which KPI could you
use?
- Eighty-five percent of requests succeed when aggregated over 1 minute
You are creating a new project. You plan to set up a Dedicated interconnect between
two of your data centers in the near future and want to ensure that your resources
are only deployed to the same regions where your data centers are located. You need
to make sure that you don’t have any overlapping IP addresses that could cause
conflicts when you set up the interconnect. You want to use RFC 1918 class B
address space. What should you do?
- Create a new project, delete the default VPC network, set up a custom mode VPC
network, and then use IP addresses in the 172.16.x.x address range to create
subnets in your desired regions.
Cymbal Direct developers have written a new application. Based on initial usage
estimates, you decide to run the application on Compute Engine instances with 15 Gb
of RAM and 4 CPUs. These instances store persistent data locally. After the
application runs for several months, historical data indicates that the application
requires 30 Gb of RAM. Cymbal Direct management wants you to make adjustments that
will minimize costs. What should you do?
- Stop the instance, and then use the command gcloud compute instances set-machine-
type VM_NAME --machine-type 2-custom-4-30720. Start the instance again.
Cymbal Direct has created a proof of concept for a social integration service that
highlights images of its products from social media. The proof of concept is a
monolithic application running on a single SuSE Linux virtual machine (VM). The
current version requires increasing the VM’s CPU and RAM in order to scale. You
would like to refactor the VM so that you can scale out instead of scaling up. What
should you do?
- Use containers instead of VMs, and use a GKE autoscaling deployment.
You are working in a mixed environment of VMs and Kubernetes. Some of your
resources are on-premises, and some are in Google Cloud. Using containers as a part
of your CI/CD pipeline has sped up releases significantly. You want to start
migrating some of those VMs to containers so you can get similar benefits. You want
to automate the migration process where possible. What should you do?
- Manually create a GKE cluster, and then use Migrate for Anthos to set up the
cluster, import VMs, and convert them to containers.
Cymbal Direct is evaluating database options to store the analytics data from its
experimental drone deliveries. You're currently using a small cluster of MongoDB
NoSQL database servers. You want to move to a managed NoSQL database service with
consistent low latency that can scale throughput seamlessly and can handle the
petabytes of data you expect after expanding to additional markets. What should you
do?
- Create a Bigtable instance, extract the data from MongoDB, and insert the data
into Bigtable.
Cymbal Direct's employees will use Google Workspace. Your current on-premises
network cannot meet the requirements to connect to Google's public infrastructure.
What should you do?
- Connect the on-premises network to Google’s public infrastructure via a partner
that supports Carrier Peering.
You are working with a client who is using Google Kubernetes Engine (GKE) to
migrate applications from a virtual machine–based environment to a microservices-
based architecture. Your client has a complex legacy application that stores a
significant amount of data on the file system of its VM. You do not want to re-
write the application to use an external service to store the file system data.
What should you do?
- In Cloud Shell, create a YAML file defining your StatefulSet called
statefulset.yaml. Create a StatefulSet in GKE by running the command <span
style="background-color:#cccccc;">kubectl</span> <span style="background-
color:#cccccc;">apply</span> <span style="background-color:#cccccc;">-f</span>
statefulset.yaml
If you have a business requirement to minimize costs, what are two things you could
do?
- Follow Google’s rightsizing recommendations
- Do not run instances when they are not being used
What could Cymbal Direct use to estimate costs for their Google Cloud environment?
- Cloud Pricing Calculator
You have deployed your frontend web application in Kubernetes. Based on historical
use, you need three pods to handle normal demand. Occasionally your load will
roughly double. A load balancer is already in place. How could you configure your
environment to efficiently meet that demand?
- Use the "kubectl autoscale" command to change the deployment’s maximum number of
instances to six.
Cymbal Direct wants a layered approach to security when setting up Compute Engine
instances. What are some options you could use to make your Compute Engine
instances more secure?
- Use network tags to allow traffic only from certain sources and ports. Turn on
Secure boot and vTPM.
You need to deploy a load balancer for a web-based application with multiple
backends in different regions. You want to direct traffic to the backend closest to
the end user, but also to different backends based on the URL the user is
accessing. Which of the following could be used to implement this?
- The request is received by the global external HTTP(S) load balancer. A global
forwarding rule sends the request to a target proxy, which checks the URL map and
selects the backend service. The backend service sends the request to Compute
Engine instance groups in multiple regions.
Cymbal Direct needs to use a tool to deploy its infrastructure. You want something
that allows for repeatable deployment processes, uses a declarative language, and
allows parallel deployment. You also want to deploy infrastructure as code on
Google Cloud and other cloud providers. What should you do?
- Automate the deployment with Terraform scripts.
You are working with a client who has built a secure messaging application. The
application is open source and consists of two components. The first component is a
web app, written in Go, which is used to register an account and authorize the
user’s IP address. The second is an encrypted chat protocol that uses TCP to talk
to the backend chat servers running Debian. If the client's IP address doesn't
match the registered IP address, the application is designed to terminate their
session. The number of clients using the service varies greatly based on time of
day, and the client wants to be able to easily scale as needed. What should you do?
- Deploy the web application using the App Engine standard environment with a
global external HTTP(S) load balancer and a network endpoint group. Use a managed
instance group for the backend chat servers. Use an external network load balancer
to load-balance traffic across the backend chat servers.
Cymbal Direct's user account management app allows users to delete their accounts
whenever they like. Cymbal Direct also has a very generous 60-day return policy for
users. The customer service team wants to make sure that they can still refund or
replace items for a customer even if the customer’s account has been deleted. What
can you do to ensure that the customer service team has access to relevant account
information?
- Temporarily disable the account for 30 days. Export account information to Cloud
Storage, and enable lifecycle management to delete the data in 60 days.
Cymbal Direct must meet compliance requirements. You need to ensure that employees
with valid accounts cannot access their VPC network from locations outside of its
secure corporate network, including from home. You also want a high degree of
visibility into network traffic for auditing and forensics purposes. What should
you do?
- Enable VPC Service Controls, define a network perimeter to restrict access to
authorized networks, and enable VPC Flow Logs for the networks you need to monitor.
Which Storage Class should you use for data that is going to be accessed at least
once every two weeks?
- Standard
Which network configuration would ensure low latency for US drone pilots?
- Only deploy resources to Regions in the US
Your client created an Identity and Access Management (IAM) resource hierarchy with
Google Cloud when the company was a startup. Your client has grown and now has
multiple departments and teams. You want to recommend a resource hierarchy that
follows Google-recommended practices. What should you do?
- Use multiple projects with established trust boundaries, and change the resource
hierarchy to reflect company organization.
You've recently created an internal App Engine application for developers in your
organization. The application lets developers clone production Cloud SQL databases
into a project specifically created to test code and deployments. Your previous
process was to export a database to a Cloud Storage bucket, and then import the SQL
dump into a legacy on-premises testing environment database with connectivity to
Google Cloud via Cloud VPN. Management wants to incentivize using the new process
with Cloud SQL for rapid testing and track how frequently rapid testing occurs. How
can you ensure that the developers use the new process?
- Create a custom role to restrict access to what developers are allowed to do.
Create a group for the developers, and associate the group with your custom role.
Ensure that the custom role does not have "cloudsql.instances.export."
Cymbal Direct is experiencing success using Google Cloud and you want to leverage
tools to make your solutions more efficient. Erik, one of the original web
developers, currently adds new products to your application manually. Erik has many
responsibilities and requires a long lead time to add new products. You need to
create an App Engine application to let Cymbal Direct employees add new products
instead of waiting for Erik. However, you want to make sure that only authorized
employees can use the application. What should you do?
- Create a Google group and add authorized employees to it. Configure Identity-
Aware Proxy (IAP) to the App Engine application as a HTTP-resource. Add the group
as a principle with the role "IAP-secured Web App User."
Cymbal Direct’s social media app must run in a separate project from its APIs and
web store. You want to use Identity and Access Management (IAM) to ensure a secure
environment. How should you set up IAM?
- Use separate service accounts for each component (social media app, APIs, and web
store) with predefined or custom roles to grant access.
Cymbal Direct needs to make sure its new social media integration service can’t be
accessed directly from the public internet. You want to allow access only through
the web frontend store. How can you prevent access to the social media integration
service from the outside world, but still allow access to the APIs of social media
services?
- Remove external IP addresses from the VM instances running the social media
service and place them in a private VPC behind Cloud NAT. Any SSH connection for
management should be done with Identity-Aware Proxy (IAP) or a bastion host (jump
box) after allowing SSH access from IAP or a corporate network.
Your client is legally required to comply with the Payment Card Industry Data
Security Standard (PCI-DSS). The client has formal audits already, but the audits
are only done periodically. The client needs to monitor for common violations to
meet those requirements more easily. The client does not want to replace audits but
wants to engage in continuous compliance and catch violations early. What would you
recommend that this client do? Responses:
- Enable the Security Command Center (SCC) dashboard, asset discovery, and Security
Health Analytics in the Premium tier. Export or view the PCI-DSS Report from the
SCC dashboard's Compliance tab.
Cymbal Direct wants to use Identity and Access Management (IAM) to allow employees
to have access to Google Cloud resources and services based on their job roles.
Several employees are project managers and want to have some level of access to see
what has been deployed. The security team wants to ensure that securing the
environment and managing resources is simple so that it will scale. What approach
should you use?
- Grant access by assigning predefined roles to groups. Use multiple groups for
better control. Give access as low in the hierarchy as possible to prevent the
inheritance of too many abilities from a higher level.
Cymbal Direct has an application running on a Compute Engine instance. You need to
give the application access to several Google Cloud services. You do not want to
keep any credentials on the VM instance itself. What should you do?
- Create a service account with one or more predefined or custom roles, which give
access to the required services.
You have several Compute Engine instances running NGINX and Tomcat for a web
application. In your web server logs, many login failures come from a single IP
address, which looks like a brute force attack. How can you block this traffic?
- Ensure that an HTTP(S) load balancer is configured to send traffic to the backend
Compute Engine instances running your web server. Create a Google Cloud Armor
policy with a default rule action of "Allow." Add a new rule that specifies the IP
address causing the login failures as the Condition, with an action of "Deny" and a
deny status of "403," and accept the default priority (1000). Add the load balancer
backend service's HTTP-backend as the target.
Cymbal Direct has chosen to use multiple projects for their environment. How do you
describe this choice?
- Using multiple projects adds both security and other benefits.
Cymbal Direct wants to improve its drone pilot interface. You want to collect
feedback on proposed changes from the community of pilots before rolling out
updates systemwide. What type of deployment pattern should you implement?
- You should implement A/B testing.
You have implemented a manual CI/CD process for the container services required for
the next implementation of the Cymbal Direct’s Drone Delivery project. You want to
automate the process. What should you do?
- Implement a build trigger that applies your build configuration when a new
software update is committed to Cloud Source Repositories.
You are asked to implement a lift and shift operation for Cymbal Direct’s Social
Media Highlighting service. You compose a Terraform configuration file to build all
the necessary Google Cloud resources. What is the next step in the Terraform
workflow for this effort?
- Run terraform init to download the necessary provider modules.
The pilot subsystem in your Delivery by Drone service is critical to your service.
You want to ensure that connections to the pilots can survive a VM outage without
affecting connectivity. What should you do?
- Implement a managed instance group and load balancer.
You are implementing a disaster recovery plan for the cloud version of your drone
solution. Sending videos to the pilots is crucial from an operational perspective.
What design pattern should you choose for this part of your architecture?
- Hot with a low recovery time objective (RTO)
You want to establish procedures for testing the resilience of the delivery-by-
drone solution. How would you simulate a scalability issue?
- Load test your application to see how it responds.
Developers on your team frequently write new versions of the code for one of your
applications. You want to automate the build process when updates are pushed to
Cloud Source Repositories. What should you do?
- Implement a build trigger that references your repository and branch.
You have an application implemented on Compute Engine. You want to increase the
durability of your application. What should you do?
- Implement a scheduled snapshot on your Compute Engine instances.
Your development team used Cloud Source Repositories, Cloud Build, and Artifact
Registry to successfully implement the build portion of an application's CI/CD
process.. However, the deployment process is erroring out. Initial troubleshooting
shows that the runtime environment does not have access to the build images. You
need to advise the team on how to resolve the issue. What could cause this problem?
- The Artifact Registry might be in a different project.
Cymbal Direct needs a database for their next project. They want to meet their
business and technical objectives. What should they do?
- Use a Managed Database Service
Cymbal Direct has decided to use Cloud Build. Which technical requirement justifies
this decision?
- Ensure that developers can deploy container based workloads
Cymbal Direct releases new versions of its drone delivery software every 1.5 to 2
months. Although most releases are successful, you have experienced three
problematic releases that made drone delivery unavailable while software developers
rolled back the release. You want to increase the reliability of software releases
and prevent similar problems in the future. What should you do?
- Adopt an “agile” development process. Reduce the time between releases as much as
possible. Automate the build process from a source repository, which includes
versioning and self-testing. Use Cloud Monitoring, Cloud Logging, and Cloud
Alerting to ensure visibility. Use a canary deployment to detect issues that could
cause rollback.
Your client has adopted a multi-cloud strategy that uses a virtual machine-based
infrastructure. The client's website serves users across the globe. The client
needs a single dashboard view to monitor performance in their AWS and Google Cloud
environments. Your client previously experienced an extended outage and wants to
establish a monthly service level objective (SLO) of no outage longer than an hour.
What should you do?
- In Cloud Monitoring, create an uptime check for the URL your clients will access.
Configure it to check from multiple regions. Use the Cloud Monitoring dashboard to
view the uptime metrics over time and ensure that the SLO is met. Recommend an SLO
of 97% uptime per day.
Cymbal Direct’s warehouse and inventory system was written in Java. The system uses
a microservices architecture in GKE and is instrumented with Zipkin. Seemingly at
random, a request will be 5-10 times slower than others. The development team tried
to reproduce the problem in testing, but failed to determine the cause of the
issue. What should you do?
- Create metrics in Cloud Monitoring for your microservices to test whether they
are intermittently unavailable or slow to respond to HTTPS requests. Use Cloud
Profiler to determine which functions/methods in your application’s code use the
most system resources. Use Cloud Trace to identify slow requests and determine
which microservices/calls take the most time to respond.
Cymbal Direct uses a proprietary service to manage on-call rotation and alerting.
The on-call rotation service has an API for integration. Cymbal Direct wants to
monitor its environment for service availability and ensure that the correct person
is notified. What should you do?
- Ensure that VPC firewall rules allow access from the IP addresses used by Google
Cloud's uptime-check servers. Create a Pub/Sub topic for alerting as a monitoring
notification channel in Google Cloud Observability. Create an uptime check for the
appropriate resource's external IP address, with an alerting policy set to use the
Pub/Sub topic. Create a Cloud Function that subscribes to the Pub/Sub topic to send
the alert to the on-call API.
Cymbal Direct has a new social media integration service that pulls images of its
products from social media sites and displays them in a gallery of customer images
on your online store. You receive an alert from Cloud Monitoring at 3:34 AM on
Saturday. The store is still online, but the gallery does not appear. The CPU
utilization is 30% higher than expected on the VMs running the service, which
causes the managed instance group (MIG) to scale to the maximum number of
instances. You verify that the issue is real by checking the site, and verify that
it is not CPU-related by checking the incidents timeline. What should you do to
resolve the issue?
- Increase the maximum number of instances in the MIG and verify that this resolves
the issue.
You need to adopt Site Reliability Engineering principles and increase visibility
into your environment. You want to minimize management overhead and reduce noise
generated by the information being collected. You also want to streamline the
process of reacting to analyzing and improving your environment, and to ensure that
only trusted container images are deployed to production. What should you do?
- Adopt Google Cloud Observability to gain visibility into the environment. Use
Cloud Trace for distributed tracing, Cloud Logging for logging, and Cloud
Monitoring for monitoring, alerting, and dashboards. Only page the on-call contact
about novel issues that violate an SLO or events that haven’t been seen before. Use
Binary Authorization to ensure that only signed container images are deployed.
Your environment has multiple projects used for development and testing. Each
project has a budget, and each developer has a budget. A personal budget overrun
can cause a project budget overrun. Several developers are creating resources for
testing as part of their CI/CD pipeline but are not deleting these resources after
their tests are complete. If the compute resource fails during testing, the test
can be run again. You want to reduce costs and notify the developer when a personal
budget overrun causes a project budget overrun. What should you do?
- Configure billing export to BigQuery. Create a Google Cloud budget for each
project. Create a Pub/Sub topic for developer-budget-notifications. Create a Cloud
Function to notify the developer based on the labels. Modify the build
scripts/pipeline to label all resources with the label “creator” set to the
developer’s email address. Use spot (preemptible) instances wherever possible.
How could Cymbal Direct design their code to maximize their savings by running spot
(preemptable) instances?
- Externalize state.
When performing batch and streaming data processing, which Google product performs
data aggregation and transformation?
- Dataflow
Which of the following about Pub/Sub topics and subscriptions are true? (Select all
2 correct responses)
- 1 or more subscriber(s) can request from the same subscription
- 1 or more publisher(s) can write to the same topic
Which of the following delivery methods is ideal for subscribers needing close to
real time performance?
- Push Delivery
True or False? Pub/Sub guarantees that messages delivered are in the order they
were received
- False
Which of the following can help improve performance of Bigtable? (Select all 3
correct responses)
- Add more nodes
- Clients and Bigtable are in same zone
- Change schema to minimize data skew
Which of the following are true about Bigtable? (Mark all 3 correct responses)
- Great for time-series data
- Ideal for >1TB data
- Offers very low-latency in the order of milliseconds
True or False? Bigtable learns access patterns and attempts to distribute reads and
storage across nodes evenly
- True
Which of the following is the best way to generate more creative or unexpected
content by adjusting the model parameters in Vertex AI Studio?
- Setting the temperature to a high value.
What is a prompt?
- A prompt is the natural language request or instruction to guide a model to
generate a desired output.
- A prompt is a short piece of text that is given to the large language model as
input, and it can be used to control the output of the model in many ways.
Using SMART criteria, which below would be the least effective KPI?
- User experience design
You’re writing a service, and you need to handle a client sending you invalid data
in the request. What should you return from the service?
- A 400 error code
You’re building a RESTful microservice. Which would be a valid data format for
returning data to the client?
- All options are correct.
Which Google Cloud tools can be used to build a continuous integration pipeline?
- All of these
What Google Cloud feature would be easiest to use to automate a build in response
to code being checked into your source code repository?
- Build triggers
Currently, you are using Firestore to store information about products, reviews,
and user sessions. You'd like to speed up data access in a simple, cost-effective
way. What would you recommend?
- Cache the data using Memorystore.
You are a global financial services company with users all over the world. You need
a database service that can provide low latency worldwide with strong consistency.
Which service might you choose?
- Spanner
You want to analyze sales trends. To help achieve this, you want to combine data
from your on-premises Oracle database with Google Analytics data and your web
server logs. Where might you store the data so it is both easy to query and cost-
effective?
- BigQuery
You need to store user preferences, product information, and reviews for a website
you are building. There won't be a huge amount of data. What would be a simple,
cost-effective, managed solution?
- Firestore
You want a secure, private connection between your network and a Google Cloud
network. There is not a lot of volume, but the connection needs to be extremely
reliable. Which configuration below would you choose?
- VPN with high availability and Cloud Router.
You are deploying a large-scale web application with users all over the world and a
lot of static content. Which load balancer configuration would likely be the most
suitable?
- HTTP load balancer with SSL configured and the CDN enabled.
You are a large bank deploying an online banking service to Google Cloud. The
service needs high volume access to mainframe data on-premises. Which connectivity
option would likely be most suitable?
- Cloud Interconnect
You have a contract with a service provider to manage your Google VPC networks. You
want to connect a network they own to your VPC. Both networks are in Google Cloud.
Which Connection option should you choose?
- VPN with high availability and Cloud Router.
You need to deploy an existing application that was written in .NET version 4. The
application requires Windows servers, and you don't want to change it. Which should
you use?
- Compute Engine
You've been asked to write a program that uses Vision API to check for
inappropriate content in photos that are uploaded to a Cloud Storage bucket. Any
photos that are inappropriate should be deleted. What might be the simplest,
cheapest way to deploy in this program?
- Cloud Functions
You have containerized multiple applications using Docker and have deployed them
using Compute Engine VMs. You want to save on costs and simplify container
management. What might you do?
- Migrate the containers to GKE.
You need a relational database for a system that requires extremely high
availability (99.999%). The system must run uninterrupted even in the event of a
regional outage. Which database would you choose?
- Spanner
You're creating a service and you want to protect it from being overloaded by too
many client retries in the event of a partial outage. Which design pattern would
you implement?
- Circuit breaker
What do you have to do to enable encryption when using Cloud Storage?
- Nothing as encryption is enabled by default.
What Google Cloud service can you use to enforce the principle of least privilege
when using Google Cloud?
- IAM members and roles
Which Google Cloud features could help reduce the risk of DDoS attacks?
- All of these
You don't want programmers to have access to production resources. What's the
easiest way to do this in Google Cloud?
- Create development and production projects, and don't give developers access to
production.
You've made a minor fix to one of your services. You want to deploy the new version
with no downtime. Which would you choose?
- Rolling update
You're deploying test environments using Compute Engine VMs. Some downtime is
acceptable, and it is very important to deploy them as inexpensively as possible.
What single thing below could save you the most money?
- Preemptible machines
You made a minor update to a service and would like to test it in production by
sending a small portion of requests to the new version. Which would you choose?
- Canary deployment
Your service has an availability SLO of 99%. What could you use to monitor whether
you are meeting it?
- Uptime check
Asset and device management within Google Workspace helps you during which phase of
the Security and Resilience framework?
- Identify
The Work Safer approach uses which of the following security products?
- Google Workspace, reCAPTCHA, BeyondCorp, Titan Security Keys, Chrome Enterprise.
When a user logs into Workspace, Google assumes breach and focuses on detection and
response. This is an example of which Google core security tenet?
- Trust Nothing.
Most of your company is working from home, which has increased the risk of
cybersecurity attacks. How does Google Cloud ensure that your domains are secured?
- Google Workspace is combined with Chronicle and Crowdstrike to provide optimum
protection.
Which Work Safer solution gives you the best protection for your website?
- ReCAPTHCA Enterprise
Your extended workforce needs to access corporate resources. You need to make sure
protection is provided and that there is clear separation between work and personal
activity. What is the benefit of using BeyondCorp to achieve this goal?
- Your extended workforce can access the apps and resources they need without the
need for a VPN.
Your organization has apps that are accessed by third parties. You need to make
sure that the third parties are evaluated using the zero trust architecture. What
Workspace security feature ensures secure access to apps and resources?
- BeyondCorp Enterprise
What is one benefit of using Chrome Enterprise to prevent suspicious web activity?
- Continuous and automatic updates, with no security patching required.
Which applications can you grant employees, contractors, and partners access to
with BeyondCorp?
- All of the above.
You need a security solution that will scale with your data. How does Chronicle
provide a solution to this challenge?
- Chronicle is Cloud-native and operates at scale and speed.
An organization is looking to build their own Zero Trust Architecture. They use
Google Workspace, and want to reduce the risks associated with log ingestion,
missed threats, and lack of security expertise. What solution should the
organization choose?
- Zero Trust Security + Monitoring.
Your organization needs to make sure Google staff with administrative rights are
background checked at all times. Which Assured Controls product achieves this?
- Access Management
Where can you enable Assured Controls for your Google Workspace?
- In the Admin console.
Your organization has an application that only needs to be accessed from certain
geographical locations. How does Google Cloud Armor help mitigate DDos attacks in
this instance?
- It allows, blocks, or rates limit traffic based on Geo parameters.
Google Cloud Armor gives you the capability to create security policies between:
- Cloud Load Balancer and the backend
Which Google Cloud product integrates with external load balancers, to build
protection as close as possible to the user?
- Google Cloud Armor
What Google Cloud Armor feature uses machine learning to analyze and give
suggestions for blocking potential attacks?
- Adaptive Protection
What is the bot management feature in Google Cloud Armor used for?
- Differentiating between humans and bots.
You need to make sure that only your provider sends traffic to the Cloud Load
Balancer. What should you use?
- A named IP list.
Adaptive Protection analyzes logs and delivers real-time data on possible attacks.
What Google Cloud product generates the logs?
- Google Cloud Armor
Redemption flow gives users another chance to prove they’re not a bot by:
- Having traffic complete a reCAPTCHA challenge if their reCAPTCHA score isn’t safe
enough.
You’ve set up a threshold to throttle traffic in Google Cloud Armor for additional
security, and you need to determine whether incoming traffic is human or bot. If
your traffic exceeds the threshold you’ve set, you can redirect the traffic to:
- reCAPTCHA
Which Google Cloud tool enables you to find real-time information about requests?
- Cloud Monitoring
The two primary findings being sent to the Security Command Center are:
- Allowed traffic spike and increasing deny ratio.
Cloud Logging provides you with traffic visibility so that you can:
- Fine-tune rules
In a fast-growing fintech start-up, Jake holds a critical role as part of the blue
team tasked with managing vulnerabilities. What is Jake's primary focus within this
role?
- Jake focuses on consistent monitoring, prompt detection, immediate incident
response, and strategic recovery to safeguard the company's digital assets and
networks.
What is the primary role of Google Cloud Security Command Center (SCC)?
- Monitoring for data security risks, potential threats, security findings, and
asset inventory
How does the integration of security tools, like Elastic Stack or AlienVault OSSIM,
assist in incident management?
- By facilitating efficient real-time threat detection and response
Emma explains the latest log management procedure to their team. What skill does
this demonstrate?
- Solid communication
A junior engineer tries to modify a database in Google Cloud (GC), but the
engineer’s current Identity and Access Management (IAM) role does not grant the
required permissions. To follow up, the IT manager investigates the junior
engineer’s access attempt. Which type of log in Google Cloud should the IT manager
check?
- Policy denied audit logs
A chief information security officer and IT manager consider moving some logs to
cold storage or even storing them offline. Why might they choose to take this step?
- To protect vital log data during undetected, prolonged security breaches
A junior engineer identifies a series of logs that seem odd. The engineer analyzes
them and finds a solution. Which workplace skill does this action demonstrate?
Select two answers.
- High attention to detail
- Critical thinking
A security analyst has evidence that an employee is attempting actions against the
organization's security guidelines. The security analyst plans to use the company's
alert system to monitor this situation. Which kind of alert should they use?
- Policy violations
A cybersecurity analyst starts using the Chronicle SIEM tool. What impact will this
tool have on the alert search techniques they use in their cloud security work?
- The tool generates machine learning-driven insights to simplify data management
in handling cloud security events.
- The tool reduces the necessity of filter reassessment or changes in the analyst’s
cybersecurity practice.
What happens during the Preparation phase of the NIST incident response lifecycle?
Select two answers.
- Roles and responsibilities are assigned
- An incident response plan is developed
What does the Post-Incident Activity phase in an incident management plan involve?
Select two answers.
- Identifying gaps in the incident response plan
- Determining the root cause of the incident
How can an organization improve the effectiveness of their alert system to better
recognize patterns and reduce false positives?
- Use machine learning
In what step of Lockheed Martin’s Cyber Kill Chain® is the information about the
target gathered?
- Reconnaissance
What is the goal of the exploitation step in Lockheed Martin’s Cyber Kill Chain®?
- To gain access to the target
In which Google Cloud tool does VirusTotal integrate, providing threat context and
reputation data relating to suspicious artifacts?
- Chronicle
Emma works as a cybersecurity analyst for a corporation that uses Google Cloud.
Emma often relies on the Security Command Center to identify and address
commonplace security issues. What problem is Emma likely to resolve using this
tool?
- Misconfigurations
Which service in Google Cloud is used to analyze suspicious files, domains, URLs,
and IP addresses for potential malicious content?
- VirusTotal
Emeka uses regular expression (RegEx) to sort through vast amounts of log data.
When Emeka identifies a piece of text that matches a specific pattern, what will
the RegEx tool do?
- Find and retrieve the matched text for further analysis.
Why is the Cyber Kill Chain® useful in defense against advanced persistent threats
(APTs)?
- It can identify APT activity and help mitigate it.
A nonprofit organization needs a Google Cloud tool that can provide a centralized
location for all the cloud assets in their environment and help them identify
potential security risks. Which tool should they use?
- Security Command Center
What is one of the most common cloud security challenges?
- Issues from misconfigurations
Emma is programming a new feature and needs to use regular expressions (RegEx) to
analyze text. In her use of RegEx, Emma uses the following symbol: . What
functionality does this period symbol have?
- It matches any single character in Emma’s text.
A data breach occurs at an online retail company. Kylie, the company's lead
cybersecurity analyst, is asked to investigate the breach. Kylie has different
types of data available to review. What type of information should Kylie prioritize
as digital evidence for the investigation?
- Unusual IP addresses that were caught interacting abnormally with the company's
servers during the breach
Chen is an IT security analyst who receives multiple alerts daily, many of which
might be false positives. What strategies should Chen adopt to correctly
distinguish between true incidents and false alarms? Select two answers.
- Inspect affected systems for signs of breach.
- Investigate the evidence and context of each alert.
A big bank is under a major cybersecurity attack. The bank's security team quickly
moves into the incident control phase of their response plan. They decide to use
their advanced security orchestration, automation, and response (SOAR) tool. What
unique function do SOAR tools perform during this phase? Select two answers.
- They help assign tasks and track progress.
- They facilitate coordination between team members.
A security analyst receives several security alerts. They are responsible for
classifying these alerts based on their importance and possible effect on the
company's infrastructure. What factors should the security analyst consider when
prioritizing these security alerts?
- Severity, potential impact, and urgency
Which of the following are examples of documentation elements? Select all that
apply.
- Timelines
- Technical findings
- Incident summaries
As a cloud security professional, what feature of Google Cloud can help you keep
evidence in incident investigations?
- Secure storage solutions
A security team engages the incident response process. What starts this process?
- An actionable alert
A cloud security analyst is working with a Chronicle SOAR playbook when an alert
pops up from a security solution. What role does this alert play in orchestrating
the SOAR playbook?
- The alert initiates or triggers the playbook's actions.
Chen, a crisis incident manager, conducts a review meeting after handling a major
incident at their organization. What is Chen's main focus during the incident
control phase?
- Minimize the impact of the incident.
Alvand leads an incident response team during a cybersecurity incident. How can
Alvand define efficient resource management during this crucial time?
- Make certain that all essential cloud systems and team members are communicating
effectively.
What is the final step you should take in responding to an unauthorized access to a
Google Cloud Storage bucket?
- Plan and execute a mitigation action to minimize the incident's impact.
Santiago is tasked with iterating his organization's SOAR playbooks. What should be
Santiago’s main objective to complete this task?
- Insist on a strategy of continuous refinement and adaptation of playbooks
grounded in experiences from past incidents.
A company experiences a system crash and needs to recover quickly. They rely on
Google Cloud services during the recovery process. Which aspect of Google Cloud
Storage and Persistent Disk is essential when successfully restoring the company’s
systems?
- The safe and secure data storage, ensuring data integrity during system crashes
In the case of an active cyberattack, what is the role of the recovery plan?
- It serves as a defense playbook.
An organization has recently put together a disaster recovery plan. The supervisor
has emphasized the importance of performing regular tests on the plan, but some
team members are uncertain about the value of testing. What is the primary purpose
of testing a disaster recovery plan?
- To evaluate whether the failover operates as designed
A company is selecting tools for their Security Operations team. They need tools
that will allow their business to continue operating and keep their data protected
during a crisis. Which two functionalities should they prioritize in their
selection of business continuity and disaster recovery (BCDR) tools? Select two
answers.
- Ability to safeguard data
- Ability to maintain business operations
A company implements a new disaster recovery plan, and they want to measure the
success of the plan. How would they determine if the plan is successful? Select two
answers.
- By measuring how quickly the business operations can return to normal
- By calculating how frequently the data is backed up
In a disaster recovery plan (DRP), what question can recovery point objectives
(RPOs) answer?
- How much data can be lost before it impacts the company?
Which of the following scenarios has the highest recovery time objective (RTO)
tolerance?
- An online forum for casual discussions
In a disaster recovery plan (DRP), what question can recovery time objectives
(RTOs) help answer?
- How long can business operations that depend on a specific system be down?
The operations lead at a nonprofit organization is drafting a business continuity
plan following a natural disaster that disrupted their operations. What is the
primary goal of the business continuity plan?
- Maintain daily productivity even during a disaster.
Leela is the IT manager at a software company. During a recent power outage, the
company lost its servers and a significant amount of data. To prevent this from
happening again, Leela wants to create a disaster recovery plan. What should be
Leela’s main objective while developing this plan?
- Ensure the recovery of essential infrastructure and systems during a disaster.
What is the main goal of executing a recovery plan in the event of a disaster?
- Restore smooth operations and minimize damage
An IT specialist faces an issue where System A fails. What mechanism would allow
the backup system to take over and ensure continuous operations?
- Redundancy
A system security analyst at an online retailer regularly sets and follows recovery
point objectives (RPOs) and recovery time objectives (RTOs). What can the company
expect when they successfully meet the established RPOs and RTOs?
- The company can manage service disruptions within acceptable limits.
What Identity and Access Management (IAM) hierarchy structure is best for building
an application in Google Cloud?
- Create a new folder inside your organization node, then create projects inside
that folder for the resources.
You are considering deploying a solution by using containers on Google Cloud. What
Google Cloud solution provides a managed compute platform with native support for
containers?
- Google Kubernetes Engine clusters
You are developing a new product for a customer and need to be mindful of cost and
resources. What Google Cloud tools can be used to ensure costs stay manageable
before consumption gets too high?
- Set up budgets and alerts at the project level.
One of the main characteristics of cloud computing is that resources are elastic.
What does that mean?
- When customers need more resources, they can get more. When they need less, they
can scale back.
What is the name for the computers in a Google Kubernetes Engine cluster that run
workloads?
- Nodes
When using Kubernetes, you must describe the desired state you want, and
Kubernetes's job is to make the deployed system conform to that desired state and
keep it there despite failures. What is the name of this management approach?
- Declarative configuration
What is significant about the topmost layer in a container? Choose two options.
- The topmost layer's contents are ephemeral. When the container is deleted, the
contents are lost.
- An application running in a container can only modify the topmost layer.
Google Kubernetes Engine offers two modes of operation: Autopilot and Standard
mode. Which one of the options below is a use case for using Standard mode.
- You require SSH access to nodes.
You want to use kubectl to configure your cluster, but first you must configure it.
Where does the kubectl command store its configuration file?
- The configuration information is stored in the $HOME/.kube/config file.
You attempt to update a container image to a new version by using the “kubectl
describe pod command,” but are not successful. The output of the command shows that
the Pod status has changed to “Pending,”the state is shown as “Waiting,” and the
reason shown is “ImagePullBackOff.” What is the most probable cause of this error?
- The container image failed to download.
Which command can be used to display error messages from containers in a Pod that
are failing to run successfully?
- kubectl logs
What command can be used to identify which containers in a Pod are successfully
running, and which are failing or having issues?
- kubectl describe pod
You are looking for an unstructured storage solution for archiving files that might
never be accessed again. Which Cloud Storage class is the best option?
- Archive storage
Google Cloud offers two managed relational database services. What are they?
- Cloud Spanner
- Cloud SQL
Which API management system supports applications running in App Engine, Google
Kubernetes Engine, and Compute Engine?
- Cloud Endpoints
Which platform for developing and managing API proxies has a specific focus on
business problems, like rate limiting, quotas, and analytics?
- Apigee API Management
At which level of Google Cloud’s infrastructure security will you find intrusion
detection?
- The operational security level
When a customer moves an application to Google Cloud, which one of the following
does the customer remain responsible for?
- Data security
With which encryption option does a customer encrypt data before sending it to
Google Cloud?
- Client-side encryption
Why do we need to have different considerations around latency from voice channels
to chat channels?
- In voice channels is not possible use UI elements to illustrate a delay in the
answer, making it like the call might have a problem.
What are two of the main considerations to have when retrying a webhook?
- Latency and loops.
What service do you need to enable to allow fully private serverless webhooks?
- L7 internal load balancer
You want to understand how users interact with the conversational agent. Which of
the following tools or techniques would be most helpful?
- Event Tracking
A/An _______ is any interaction between a user and an agent at a point in time.
- Conversation
What structure does the BQ Data format table look like most?
- JSON
When looking to make NLU improvements, which analysis would be best to start with?
- Top N pages with highest no-match rates
Which dashboard within a conversational agent would more likely focus on viewing
groups of user and agent responses?
- Agent Transition
Which dashboard allows for head intent comparisons for overall metrics?
- Intent Launch
You are tasked with understanding specific API failures for payments. Which
dashboard would you start at?
- Webhook Performance
What concept allows analytics teams and developer teams to explain why something
did not work in the agent?
- Event Tracking
What is the main benefit of using the Python Dialogflow CX Scripting API (DFCX
SCRAPI)?
- It makes using DFCX easier, more friendly, and more pythonic for virtual agent
builders, developers, and maintainers.
Which dashboard product most easily integrates to query the Dialogflow CX Log Data?
- Looker Studio
Teams that focus on specific use cases or areas of the bot development in CCAI
programs are referred to as:
- Pods
Which of these are considered ‘Northstar’ principles for effective CCAI delivery?
- Focus on the user, launch and iterate, psychological safety
Which phase of the virtual agent development journey supports the identification of
business goals and objectives, gathering existing requirements and prioritizing
requirements?
- Discovery
What are the key outcomes of the Optimization phase include (choose all that apply)
- An optimization plan
- A monitoring plan
- A Feedback loop strategy document
Which phase of the virtual agent development journey includes building intents in
Dialogflow?
- Development
Which of the following are characteristics of the Scrum methodology? (Choose all
that apply)
- Scrum organizes work into sprints which typically occur over 1-2 weeks duration
- Scrum is an iterative-based approach to program delivery
- Scrum is a collaborative effort involving developers and customers working
together to deliver program requirements
Which of the following steps should be taken during a program set up to create a
culture based on trust?
- All of these steps should be taken.
What combination of Scalable tools can be employed for tracking tickets and
effective program management in CCAI delivery?
- Buganizer & Smartsheet
- Buganizer & Taskflow
If you need to raise a request for the Google engineering team, which tool would
you use?
- Buganizer
What severity level would you assign to a defect which leads to negative sentiments
from customers and obstructs a significant number of test cases?
- Critical
What is the benefit of tracking the number of Tickets and Story Points delivered in
a Sprint at a Pod level?
- To show a snapshot of a Pod’s throughput and value
Which of the following are examples of reports you would preferably have on a Pod
Delivery Dashboard (Choose all that apply)
- Defect trends
- Open defects by severity and priority
- Average resolution time
Please complete this sentence: “A Pod workflow that is considered healthy is one
that has..”
- A declining number of reopened bugs, a higher number of defects closed versus
opened and defects with lower and lower “age” overtime
Which support tier is a paid support service designed for enterprises that run
priority workloads and require fast response times?
- Premium Support
To aid fast resolution of a case, the ticket submission must cover three points
(select the three that apply):
- Gives enough context (i.e. project ID, timestamp, timezone, adds examples and
known debug information)
- Explains the need (e.g. Outage, degraded service, break-fix, root cause, and
general advice) and where it occurred (i.e. Dev, Test, Production)
- Clearly describes the impact (i.e. what was already tried, timelines involved,
impact to the business)
When a customer directly enters into contact with Google to point to a possible
problem or ask for some specific help they open a:
- Support Case
Which of the following is a good use case for a Data Store Agent?
- Questions that can be answered by your organization's documents or website
When evaluating the quality of a data store response, what should you look at
(choose 2)
- Answer bot gave
- URL linked
What should you do if you are concerned about quality or potential end user
backlash?
- Consider a dark launch or an internal launch and collect some data first before a
full launch
What is an observability feature you should consider adding? Select all that apply
- BigQuery export
- Interaction logging
- Cloud logging
If you ask the bot a question and don’t get an answer, you should (choose 2)
- Ensure that data stores are configured correctly in your DFCX agent
- Confirm that indexing has completed
If you ask a query and it gets an answer from a data store even when it shouldn’t,
one option is to
- Remove content from data store
How many conversations are recommended as training data for custom summarization?
- 2k
What measures can you take to enable continuous improvement in the labeling
process?
- Organize weekly feedback session with customer
To be able to use the summarization model, you need to configure which of the
below?
- Conversation Profile
As part of agent feedback through API, which of the below can be captured?
- Rewritten summaries
Which of the below metrics can be used to identify summaries with most edits?
- ROUGE-L
Which of the below is true regarding summarization model improvement?
- Models can be improved by improving the labeled summaries
Which of the following is not a predefined section which can be used out of the box
for LLM Summarization?
- Reason for replacement
What is DTMF?
- It lets end-users provide parameter values using a keypad.
What are some key settings related to user speech processing? (choose 3)
- Barge-in
- Speech models
- End of speech sensitivity
What are some cases you need to handle while building unhappy paths? (choose 2)
- The user no-inputs and no-matches.
- A webhook error.
What is the difference between a steering flow and a use case flow?
- Steering flows identify a user’s goal while use case flows provide the user what
they need.
For which of the following use cases should you use generative AI?
- Desire for rapid iteration
Which of the following are built-in generator prompt placeholders? (Select two)
- $conversation
- $last-user-utterance
For which of the following use cases should you avoid using generators?
- Ranking Options
To generate a personalized conversation summary for a human agent, you should use:
- both user data and conversation history
What is something you can control in agent settings regarding generative fallbacks?
- Which phrases are banned
What are the two ways to implement a data store within a stateful flow (pick two)
- Via a webhook
- As a fallback if we don’t match any intents or parameters
When routing between stateful flows and playbooks, you can pass
- Parameters
Logging and categorizing test case results is part of which phase of tracking test
results?
- Granular record keeping
What is the first step when following a “CUJ first” approach to testing?
- Create a catalog
What testing method ensures that a single module of the agent is working correctly?
- Unit testing
You will be able to automatically run tests when changes are made to the agent
after completing which stage of the unit test driven development lifecycle?
- Continuous integration
Which form of end to end testing includes all components of the agent and its
system integrations
- Full stack
Which of the following is an example of a message you may see from the Validation
tool?
- The same synonym is used for different values in an entity type
What is the name of the environment where the development of the virtual agent
occurs by the delivery team?
- Dev project
The main function of the versions tool is to allow the QA team to?
- test updates to existing flows without editing them in production
A plan for how to respond when a major issue is uncovered with your agent is known
as ?
- Incident management strategy
What is the main purpose of automating your builds, tests and deployments?
- Standardizes repeated processes by eliminating human error.
Which of the following pre-closing sequences signals the end of the conversation
more strongly?
- A- Thank you so much for calling us today and have a great day. C- Thanks! You
too.
What’s a human-like closing technique not commonly found in traditional virtual
agents?
- Allow the user to react to each pre-closing to ensure they’re ready to end the
conversation.
What’s the first action humans take if the other speaker unexpectedly remains
silent?
- Check whether the other speaker is available to continue speaking.
Which of the following repair techniques highlights the issue needing repair more
strongly?
- “Oh, you mean like for trade in?”
Which of the following are pronounced with rising intonation? Select all that
apply:
- Yes/no questions
- Clarifying question
Which of the following could sound smoother and more connected in a virtual agent.
- Hi Thanks for calling customer service How can I help you?
You're working on a machine learning project and need to evaluate your model's
performance. Which of the following scenarios would benefit from using Vertex AI's
model evaluation service? Select all that apply.
- You need to monitor your deployed model's performance over time and detect
potential issues like concept drift.
- You have a large dataset and need to compare multiple model versions to find the
best one.
- You are concerned that your model may be overfitting to your training data and
want to assess its performance on unseen data.
A data science team is struggling to manage the lifecycle of their machine learning
models from development to deployment. They face challenges with inconsistent model
performance, difficulty tracking model versions, and a lack of collaboration
between team members. Which of the following best describes how adopting an MLOps
approach with Vertex AI could address these issues?
- MLOps with Vertex AI would provide a structured framework for managing the entire
ML lifecycle, promoting collaboration, enabling version control, and improving
model performance consistency.
You're tasked with evaluating multiple versions of a language model for summarizing
news articles. You want to know which model produces the most informative and
coherent summaries. Which evaluation type would be most appropriate?
- Ranking evaluation: have human evaluators rank the summaries from different
models based on their overall quality.
You're evaluating a language model designed to generate creative stories. Which of
the following evaluation approaches would be most relevant? Select all that apply.
- Assessing the diversity and originality of the generated stories.
- Calculating the perplexity of the model's output.
During the evaluation of an LLM, you find that the model often produces responses
that sound fluent and grammatical but are factually incorrect. Which of the
following evaluation challenges does this example illustrate?
- Model complexity and decision-making
Which component of an LLM block is responsible for storing and retrieving past
interactions with the model to provide context for future requests?
- Memory
When using evaluation methods like BLEU or ROUGE for LLM assessment, which of the
following challenges is most likely to arise if the reference dataset is limited or
biased?
- The evaluation may underestimate the model's true capabilities because the
reference data doesn't cover the full range of acceptable responses.
Which type of webhook offers greater control over the request and response
payloads?
- Flexible webhooks
What does the "Enabled" label indicate in the context of the webhook request from
Dialogflow?
- The webhook is currently active and will be used by Dialogflow.
What is the maximum value you can set for the "Webhook timeout" field?
- 30s
What is the primary benefit of establishing shared expectations with the customer
or API provider regarding API quality standards?
- All of the options.
Chatbot Hangover is [ ]
- When business initially built chatbots and had underwhelming results, following
overhyped promises on performance.
Google Cloud can help to transform customer service across engagement models to
deliver four key benefits:
- Boosting agent & employee productivity; Improve self-service & deflection rates;
Modernize their chat & voice infrastructure; Enhance insights & customer
predictions
You would use [ ] to create an out of the box conversational experience based on
information provided by a knowledge domain (e.g. website, document).
- Generative AI Agents
What question should NOT be asked when building a basic Virtual Agent persona?
- Why are customers failing at the current task?
Which option below is likely to have high-impact opportunities in which you can
refine and enhance your conversational agent?
- High traffic flows and pages.
Select the phase that focuses on initial metric driven exploration of data.
- Analyze
What is the main advantage of conversation history tools over manual reading of
conversations?
- Conversation history tools offer an efficient way to analyze large amounts of
conversation, enabling rapid trend detection.
Which metric measures the percentage of customers who leave their self-service
attempt?
- Abandonment rate.
What two dimensions can be used to rank optimizations for the virtual agent?
- Difficulty and Impact
Optimizations that have large impacts typically have which of the following
attributes?
- High traffic flows and pages
Which of the following is not an explicit step in a root causing problem solving
framework?
- Conduct brainstorming with no data.
Which of the following is not a common method for detecting performance issues?
- Predictive Modeling
When deploying new features in the agent, which step is most important?
- Establish what will be measured post implementation.
What is a use case feature that suggests that you should use stateful flows as
opposed to generative playbooks?
- Requires mathematical computations
Select two statements that describe the key benefits and value proposition of
Generative Playbooks.
- Generative Playbooks allow to create more natural and conversational interaction.
- Easy handling for previously challenging situations like multi-intent.
Select a statement that DOES NOT describe the out-of-the-box capability we get with
Generative Playbooks.
- Direct integration with BQ ML
Select the correct formats which can be used to define the OpenAPI Schema used in
Tools. (Choose 2)
- YAML
- JSON
Select two statements that identify the best practices when building Generative
Playbooks.
- Clarity: Providing clear and specific instructions and examples to ensure the LLM
understands the desired behavior.
- Granularity: Breaking down complex tasks into smaller, more manageable playbooks
to enhance clarity and reusability.
Who are the target users who will get the most value from the product?
- Contact Center Analysts, Compliance
Which field contains the actual messages of conversations in JSON chat transcript?
- text
Which of the following is true about the use of customer taxonomy while training a
topic model.
- You do not necessarily need to have customer taxonomy to train your topic model.
What is the recommendation for minimum number of conversations for training a topic
model?
- Minimum of 1k conversations (recommended 10k conversations) with five back-and-
forth turns between an agent and a customer.
Which option should be set to True while analyzing a conversation through API to
infer topics?
- run_issue_model_annotator
Which field will contain information about the confidence score of predicted Topics
of the conversation?
- issues.score.
Which metric can be found at conversation, entities and sentences level using the
BigQuery Insights export table?
- Agent Performance Dashboard
- Call Center Overview Dashboard
How can you make a Cloud Run service publicly accessible and invokable without
authentication?
- Use the –-allow-unauthenticated option when you deploy the service to Cloud Run.
Which of these statements about autoscaling in Cloud Run are correct? Select three.
- Cloud Run automatically increases the number of container instances of a service
revision when necessary.
- When the number of requests to a service decreases, Cloud Run reduces the number
of container instances.
- If there are no incoming requests to your service, by default even the last
remaining container instance will be shut down.
Which of these statements about Cloud Run are correct? Select three.
- On Cloud Run, your code can either run continuously as a service, or as a job.
- Cloud Run is serverless.
- Cloud Run integrates with other Google Cloud services.
What are some characteristics of Cloud Run services? Select three.
- Cloud Run automatically scales a service revision.
- Cloud Run services are regional Google Cloud resources.
- Each deployment of your application container image to Cloud Run creates a
service revision.
Every Cloud Run service is linked to a service account by default. What role is
given to this service account?
- Editor
What are two methods of making a secret available to a Cloud Run service?
- Provide the secret as an environment variable when deploying the service.
- Mount the secret as a volume so that the service can access the secret from a
file.
How can you implement the principle of least privilege for a Cloud Run service?
- Create a new service account and configure it as the Cloud Run service’s
identity. Grant minimal permissions to the account on the resources that the
service needs to access.
Which statements about using environment variables with Cloud Run are correct?
Select two.
- Environment variables are key-value pairs that can be set when deploying a Cloud
Run service or job.
- Environment variables are injected into your application container and accessed
by your code at runtime.
What are some characteristics of applications that are a good fit for Cloud Run?
Select three.
- When run as a service, the application listens for HTTP requests on a specified
port.
- The application is containerized.
- When run as a service, the application responds to a request within a specified
time.
To integrate a Cloud Run service with other Google Cloud APIs and resources, what
are some steps you should take? Select three.
- Connect to Google Cloud services from your Cloud Run service using client
libraries.
- To connect to internal cloud resources from your Cloud Run service, use
Serverless VPC Access.
- Use Secret Manager to store credentials required by downstream database services.
What are some products or services that you can use to build containers? Select
three.
- Cloud Build
- Cloud Run
- Docker
Which of these statements regarding service revisions in Cloud Run are correct?
Select two.
- A revision is created when you update the configuration of a service in Cloud
Run.
- A revision is created when you deploy a container image to a service in Cloud
Run.
What are the two main technical challenges that need to be addressed in order to
implement vector search effectively?
- Encoding and indexing
Which of the following is correct to compare between vector search and traditional
keyword search?
- Vector search addresses semantic similarity and is good at solving ambiguous
queries, whereas traditional keyword search is good at solving precise queries.
What is the general process to build a search application by using Vertex AI Vector
Search?
- Encode data to embeddings, build an index, and search results.
What are the two main techniques used by ScaNN (Scalable Approximate Nearest
Neighbor) to improve search performance in vector search?
- Space pruning and data quantization
What is the main purpose of using distance metrics like dot product distance in
vector search?
- Measure the distance between vectors in terms of semantic similarity.
How many times will the process/process Element method of a DoFn be called?
- As many times as there are elements in the PCollection.
What are the types of windows that you can use with Beam?
- Fixed, sliding, and session windows.
What can you do if two messages arrive at your pipeline out of order?
- You can recover the order of the messages with a window using event time.
What kinds of data are a bounded and an unbounded source respectively associated
with?
- Batch data and streaming data.
Which of the following element types can be encoded as a schema from a PCollection?
(select ALL that apply.)
- Byte string objects
- A single list of JSON objects
- Avro objects
- Protobuf objects
What is the use case for timers in Beam’s State & Timers API?
- Timers are used in combination with state variables to ensure that the state is
cleared at regular time intervals.
Choose all the applicable options:If your pipelines interact with external systems,
- It is important to provision those external systems appropriately (i.e., to
handle peak volumes).
- Not provisioning external systems appropriately may impact the performance of
your pipeline due to back pressure..
Which functions of the DoFn lifecycle are recommended to be used for micro-
batching?
- startBundle and finishBundle
What operations can you do in standard Pandas DataFrames that are not possible in
Beam DataFrames?
- Shift the DataFrame
Which two of the following statements are true about using the interactive runner?
- You can limit the amount of data the interactive runner records from an unbounded
source by setting recording_size_limit.
- You can limit the amount of time the interactive runner records data from an
unbounded source by using the recording_duration option.
Which of the following are benefits of Beam portability? (Select ALL that apply.)
- Running pipelines authored in any SDK on any runner
- Cross-language transforms
- Implement new Beam transforms using a language of choice and utilize these
transforms from other languages
The Dataflow Shuffle service is available only for batch jobs.
- True
What are the benefits of Dataflow Streaming Engine? (Select ALL that apply.)
- More responsive autoscaling for incoming data variations
- Lower resource and quota consumption
- Reduced consumption of worker CPU, memory, and storage
Which of the following are TRUE about Flexible Resource Scheduling? (Select ALL
that apply.)
- FlexRS leverages a mix of preemptible and normal VMs.
- FlexRS helps to reduce batch processing costs by using advanced scheduling
techniques.
- When you submit a FlexRS job, the Dataflow service places the job into a queue
and submits it for execution within 6 hours from job creation.
You want to run the following command: gcloud dataflow jobs cancel 2021-01-
31_14_30_00-9098096469011826084--region=$REGION Which of these roles can be
assigned to you for the command to work?
- Dataflow Admin
- Dataflow Developer
Your project’s current SSD usage is 100 TB. You want to launch a streaming pipeline
with shuffle done on the VM. You set the initial number of workers to 5 and the
maximum number of workers to 100. What will be your project’s SSD usage when the
job launches?
- 140 TB
You are a Beam developer for a university in Googleville. Googleville law mandates
that all student data is kept within Googleville. Compute Engine resources can be
launched in Googleville; the region name is google-world1. Dataflow, however, does
not currently have a regional endpoint set up in google-world1. Which flags are
needed in the following command to allow you to launch a Dataflow job and to
conform with Googleville’s law? python3 -m apache_beam.examples.wordcount \ --input
gs://dataflow-samples/shakespeare/kinglear.txt \ --output
gs://$BUCKET/results/outputs --runner DataflowRunner \ --project $PROJECT --
temp_location gs://$BUCKET/tmp/ \
- --region northamerica-northeast1 --worker_region google-world1
Your project’s current In-use IP address usage is 500/575. You run the following
command: python3 -m apache_beam.examples.wordcount \ --input gs://dataflow-
samples/shakespeare/kinglear.txt \ --output gs://$BUCKET/results/outputs --runner
DataflowRunner \ --project $PROJECT --temp_location gs://$BUCKET/tmp/ --region
$REGION \ --subnetwork regions/$REGION/subnetworks/$SUBNETWORK \ --num_workers 20
--machine_type n1-standard-4 --no_use_public_ips What will be the in-use IP address
usage after the job starts?
- 500/575
As a data scientist, you are tasked with identifying bias in training data in an
effective way. Which of the tools below can be used to identify bias in data?
- TensorFlow Data Validation, What-if Tool.
You have a Pub/Sub subscription with data that hasn’t been processed for 3 days.
You set up a streaming pipeline that reads data from the subscription, does a few
Beam transformations, and then sinks to Cloud Storage. When the pipeline is
launched, it is able to read from Pub/Sub, but cannot sink data to Cloud Storage
due to the service account missing permissions to write to the bucket. When viewing
the Job Metrics tab, what do you expect to see in the data freshness graph?
- Initial start point at 3 days, with an upward sloping line.
You would like to set up an alerting policy to catch whether the processed data is
still fresh in a streaming pipeline. Which metrics can be used to monitor whether
the processed data is still fresh?
- job/per_stage_data_watermark_age
- job/data_watermark_age
Your batch job has failed, and when viewing the Diagnostic tab, you see the
following insights: Out of memory: Kill process Shutting down JVM after consecutive
periods of measured GC thrashing Which of the options below is the best one to
undertake to resolve the issue?
- Use a larger machine size
Select all that apply - the BigQuery Jobs tab shows jobs from:
- Query jobs
- Load jobs
Which two of the following statements are true for failures while building the
pipeline?
- The failure can be caused by incorrect input/output specifications.
- The failure is reproducible with the Direct Runner.
Your Dataflow batch job fails after running for close to 5 hours. Which two of the
following troubleshooting steps would you take to understand the root cause of the
failure?
- Log the failing elements and check the output using Cloud Logging.
- Check the Dataflow worker logs for warnings or errors related to work item
failures.
You want to launch a streaming Dataflow job in europe-west4 and want to protect
your pipeline from zonal stockouts. Which launch command will achieve these
requirements?
- $ python3 -m apache_beam.examples.wordcount \ --input
gs://dataflow-samples/shakespeare/kinglear.txt \ --output
gs://$BUCKET/results/outputs --runner DataflowRunner \ --project $PROJECT --
temp_location gs://$BUCKET/tmp/ \ --region europe-west4
Which of Google Cloud’s big data managed services is optimized for large-scale
batch processing or long-running stream processing of structured and unstructured
data?
- Dataflow
Which of these is a managed Spark and Hadoop service that lets you benefit from
open source data tools for batch processing, querying, streaming, and machine
learning?
- Dataproc
You can use three basic patterns to load data into BigQuery. Which one involves
using SQL statements to insert rows into an existing table or to write the results
of a query to a table?
- Generated data
What Google machine learning API can be used to convert audio to text for data
processing?
- Speech-to-Text API
Which of these is a no-code solution that lets you build your own machine learning
models on Vertex AI through a point-and-click interface?
- AutoML
What is the name of Google’s unified AI platform that brings all the components of
the machine learning ecosystem and workflow together?
- Vertex AI
What are 3 core areas to consider when deploying Google Cloud foundation for
Virtual Agents?
- Network, Security and Billing
Which route is best suited for live data Ingestion within Insights?
- Runtime Integration
In addition to CCAI Insights, customers have the option of extracting data from
Dialogflow CX directly into…
- BigQuery
Which Disaster Recovery (DR) measure focuses on obtaining alerts when the system or
its parts are failing?
- Detective
You're a tech support agent assisting a customer with a software issue. Your
company has many knowledge base articles stored as Google Docs files. You’d also
like to reference online documentation. Which of the following best demonstrates
how you would synthesize relevant information across Google Workspace and Google
web searches using Gemini?
- Use Gemini to gather information from the customer's support ticket in Gmail,
relevant troubleshooting guides from Google Drive, and additional context from web
searches.
You’re a construction project manager and your company recently began using Gemini
for Google Workspace. Which of the following features can you use Gemini in Google
Drive for?
- Asking questions about specific files to quickly find information.
You're a financial analyst working on a collaborative project with your team. The
project files are stored in Google Drive and you need to find a specific file
titled "Q2 Financial Report" and quickly get information about who last modified it
and when. Which of the following is the most efficient way to achieve this using
Gemini in Drive?
- Ask Gemini in Drive about when the "Q2 Financial Report" was last modified and by
whom?
You're a marketing assistant preparing a presentation on recent marketing
campaigns. You have several Google Sheets, Slides, and Docs files related to sales
data, customer feedback, and marketing campaign results in your Drive. You want
Gemini to help you identify key takeaways and trends. Which of the following
prompts would be most effective in eliciting a broader, topic-based response from
Gemini, drawing upon the relevant files in your Drive?
- Summarize the key takeaways from the Q2 sales data, customer feedback, and
marketing campaign results in my Drive.
You want to embed the concept of safety into a pre-trained LLM by fine-tuning it.
You have a dataset of prompts and pairs of possible answers, along with labels
created by human safety evaluators indicating their preference for one answer over
the other. Which technique is the most suitable for fine-tuning the LLM in this
scenario?
- Reinforcement Learning from Human Feedback (RLHF)
Your manager asked you to lead a project to research the key considerations in AI
safety and develop a failure mode catalog to assist evaluate safety in Generative
AI products. Which of the following should not be included as a failure mode?
- Citation
Which Google Cloud service provides defense against infrastructure and application
Distributed Denial of Service (DDoS) attacks?
- Google Cloud Armor
Which two of the following statements are true about Google Cloud Armor?
- Google Cloud Armor protection is delivered at the edge of Google’s network.
- Google Cloud Armor enforces access control based on IPv4 and IPv6 addresses or
CIDRs.
Which IAM role contains permissions to create, modify, and delete networking
resources, except for firewall rules and SSL certificates?
- Network administrator
Which type of IAM member belongs to an application or virtual machine instead of an
individual end user?
- Service account
Which of the following is a key benefit of using Packet Mirroring for network
security analysis?
- It enables the capture and inspection of traffic without impacting network
performance.
You want to improve network performance. You are not comfortable using the public
internet to route traffic. Which service tier is the best fit?
- Premium tier
You want to lower cloud networking cost and have no problem leveraging the public
internet for cross-region traffic. Which network service tier is best for you?
- Standard tier
You are designing a virtual machine in the cloud to act as a network gateway
between an external public network and a private internal network. To ensure strong
security and traffic separation, what technology can you implement?
- Multiple Network Interface Cards (NICs)
How does VPC Peering exchange routing information between two peered VPCs?
- It automatically discovers and propagates routes through the Google Cloud Router.
Sort the following steps for provisioning Shared VPC in Google Cloud:
- Uptime checks
- Alerting policies
To set up hybrid deployments for DNS resolution, which type of DNS policy should
you use?
- Server policy
You must create a VM that has an IPv6 address. How do you do it?
- Create a dual-stack subnet, and create the VM with an IPv6 address.
You want to provide access to services that you created in a VPC network. The
services should be available to other specified VPC networks through endpoints that
have internal IP addresses. Some of these VPC networks have subnets with
overlapping internal IP addresses. Which product can you use?
- Private Service Connect
When you use the internal IP address of the forwarding rule to specify an internal
Network Load Balancer next hop, the load balancer can only be:
- In the same VPC network as the next hop route or in a peered VPC network.
Which of the following best practices help optimize load balancing cost?
- Implementing a caching layer with a content delivery network (CDN).
Your company is located in a city where Google Cloud does not have a Dedicated
Interconnect location, but you need a private connection to your Google Cloud
Virtual Private Cloud (VPC). Which Cloud Interconnect option is most suitable for
this scenario?
- Partner Interconnect
Which Google Cloud Interconnect option requires the customer to provide their own
routing equipment and establish a Border Gateway Protocol (BGP) session with
Google's edge network?
- Dedicated Interconnect
In Network Connectivity Center, what are the two main types of spokes that can be
connected to a hub?
- VPC spokes and Hybrid spokes
Hallucinations are words or phrases that are generated by the model that are often
nonsensical or grammatically incorrect. What are some factors that can cause
hallucinations? Select three options.
- The model is not trained on enough data
- The model is trained on noisy or dirty data.
- The model is not given enough context.
Yousef is reviewing his store inventory. He wants his Google Sheet to visually
identify cells where the store’s flour inventory fell below 100 bags. What does he
need to do in order for Google Sheets to do this automatically? Select the correct
response.
- He can highlight the range with the flour inventory, open the Format menu, then
select Conditional formatting
Seroja wants to ensure consistency when preparing sales and inventory reports. How
can she automatically apply the same formatting every time she creates a new
monthly reporting spreadsheet? Select the correct response.
- She can open the Format menu, select Theme, then choose an option from the panel.
Each month, she can use the same Theme
Seroja determines that she does not want the formula in cell H30 to change from
=H1+H8 when she copies it to cell I30. What does she need to do to keep the formula
constant when copy pasting? Select the correct response.
- She can turn it into an absolute reference by changing the formula to =$H1+$H8
Seroja selects the cell H30. It contains the following formula: =H1+H8. She copies
the contents from H30 to cell I30. What happens to the formula? Select the correct
response.
- The formula automatically updates to =I1+I8
Thomas sends “South America forecast report” to On the Rise partner owner Seroja
Malone. Seroja wants to create a data validation rule to ensure that Column C only
includes sales from the month of June. What does she need to do? Select TWO.
- She can open the Data menu, select Data validation, choose Column C, and add the
criteria Text | equals | June. Then, select Save
- She can right click on Column C, select Data validation, and add the criteria
Text | equals | June. Then, select Save
On the Rise store owner Yousef Amadi is analyzing monthly sales data from his Fort
Lauderdale store. He’d like to see the data visually by converting it into a bar
chart. What does he need to do? Select the correct response.
- He needs to select the range of cells to include, open the Insert menu, select
Chart, then choose Bar Chart
Yousef and Kaina are working together to update a Google Sheet that is used by the
On the Rise marketing team. They want to automate repetitive tasks like bolding
header texts. Which of the following should they do? Select the correct response.
- Open the Extensions menu, hover over Macros, and click Record macro
Yousef creates a bar chart. Next, he wants to move the chart to the top left of the
screen. What does he need to do? Select the correct response.
- He should click and drag the chart
Yousef realizes there is an error in the data and wishes to edit the chart. How
does he do this? Select the correct response.
- He should correct the data and the chart will update automatically
Kaina Gao is reviewing a Google Sheet with thousands of cells of data from the On
the Rise marketing team. It's suggested she use a pivot table to summarize the
data. Why would this be beneficial? Select the correct response.
- The pivot table will make it easy to display different data summaries
Yousef wants to share the chart on a website that is accessible to the On the Rise
team. What are some of his options? Select two.
- He can publish the chart to web
- He can embed the chart on a website via embed code
Sherrie wants to distribute the form so applicants can easily respond. What are
some of her options? Select two correct responses.
- She can share the form by email
- She can embed the form on Ontherise.store
Sherrie is working on a Google Sheet named “On the Rise Hiring Questionnaire”. She
wants to turn the Sheet into a Google Form. How does she do this? Select the
correct response.
- She can open the Google Sheet “On the Rise Hiring Questionnaire”, then open the
Tools menu, then click Create a Form
Many applicants have completed and submitted the Form. Sherrie wants to review
their responses and choose top candidates to interview. How can she view the
responses of each applicant, one at a time? Select the correct response.
- She can select the Responses tab, then the Individual tab
Sherrie has converted her content into a Google Form. She would like to add a new
question. What does she need to do? Select the correct response.
- Choose Add question from the floating toolbar to the right of the question card
A cloud security analyst is creating a portfolio. One of their projects was created
for an employer and is confidential, so they cannot include project resources in
their portfolio. How can the cloud security analyst include the relevant skills in
their portfolio?
- Include a basic description of the project and their role.
A cloud security analyst has just completed their final interview for a new
position. What step should they take next?
- Send a thank you message to the interviewer.
A cloud security analyst has a collection of projects and other materials they can
share with interviewers to demonstrate their skills. What is the term for this
collection?
- A portfolio
Which of the following actions can you take to help you tailor your resume to cloud
security professional roles? Select all that apply.
- Use an AI tool to tailor your resume to the specific job.
- Research roles on job-search platforms and take notes on some of the skills and
qualifications required for jobs that appeal to you.
- Refer to previous course content to review some of the different types of roles
available in cloud security.
You are creating your résumé before applying for your first cloud security analyst
job. You have worked in the restaurant industry for several years, and had a data
entry job before that. What transferable skills from your past work experience can
you list on your résumé? Select two answers.
- Attention to detail
- Teamwork
You are creating your résumé to apply to your first cloud security analyst job.
Which step should you take after researching the job description?
- Customize your skills to the job description
In an interview for a cloud security analyst position, the hiring manager asks you
a technical question about how you would solve an issue in a cloud environment. You
are unsure on a few specifics of the scenario. Which is the first step you should
take in answering this question?
- Ask clarifying questions.
A cloud security analyst is preparing for a job interview at a new company. They
are familiar with the company’s culture, but want to do more research to learn if
the position is a good fit. What other aspects of the company should they research?
Select two answers.
- Mission
- Core values
A cloud security analyst is interviewing for a new position, and the hiring manager
asks a behavioral question. What is the first step the analyst should take in
answering the question?
- Describe any context the interviewer needs to know.
A job posting requests three years of experience. You have only one year of on-the-
job experience, but otherwise your skills and interests match the job description.
What step should you take next?
- Apply for the job.
You schedule a screening call with a recruiter for a cloud security analyst
position. Which step should you be sure to take during the screening call?
- Ask questions about the role
You are applying for a cloud security analyst position. You have completed your
screening call with a recruiter, and have an interview scheduled with a hiring
manager from the company. What should you do while you wait for your interview?
Select two answers.
- Research the company and role
- Map your skills to the job description
A cloud security analyst is collecting project documentation and other work samples
to share with employers. What is the term for this collection?
- A portfolio
A cloud security analyst wants to include a project in their portfolio, but it was
created for an employer and contains sensitive information. How can they
incorporate the project into their portfolio without breaking privacy agreements or
regulations?
- Include a project description instead
A cloud security analyst wants to make their portfolio visually appealing and easy
to navigate. What source can they use for ideas?
- People in their network
A cloud security analyst is refining their resume to apply for a job. How can they
demonstrate to the hiring manager that they are a good fit for the position?
- Update their skills to match the job description
A cloud security analyst is updating their resume. Where should they list a
professional certificate they completed?
- The education section
You are in a one-on-one interview with a hiring manager for a cloud security
analyst position. An interviewer asks you a behavioral question about how you
handled a challenge at work in the past. How should you start your response to this
question?
- Describe any context the interviewer needs to know to understand your story.
Where did the malicious actor access the sensitive customer data?
- BigQuery
How did the malicious actor gain initial access to Cymbal Retail's cloud
environment?
- Open SSH and RDP ports
Which section of the report contains a list of suggested actions for future
mitigation?
- Recommendations
A cloud security team has been assigned to monitor their cloud environment for
unusual activity. What tool can they use to achieve this goal?
- Security Command Center
A cloud security analyst runs a scan and finds that secure boot is disabled for
several VMs in their environment. Why does this introduce a security risk?
- It allows the virtual machine to boot with unauthorized code.
A cloud security analyst is looking for a mentor. What career benefits can a mentor
provide them?
- Opportunities to learn more about cloud security
A cloud security team realizes that one of their organization’s virtual machines
has been infected with malware. How should they deal with this issue?
- Stop the affected VM.
A cloud security team has identified, contained, and eradicated a threat. How can
the team make sure there are no other misconfigurations before closing the
incident?
- Conduct a scan with Security Command Center.
A cloud security team has just recovered from a data breach. They choose to
implement more frequent security audits for their organization’s cloud environment.
How will this improve their security posture?
- By alerting the team to vulnerabilities before attackers can exploit them
What components should you identify in a job posting to help determine if the job
is a good fit?
- Skills
- Education
- Experience
Which of the following terms are helpful for beginning cloud security analysts to
use when searching for jobs? Select all that apply.
- Junior
- Associate
- Entry level
How can your portfolio help prepare you for the job search process? Select all that
apply.
- Portfolios are a way to consider how you can relate specific projects to
descriptions in a job posting.
- Portfolios demonstrate your technical skills to potential employers.
- Portfolios include projects you have completed or contributed to.
How can your resume help prepare you for the job search process? Select all that
apply.
- A resume lists skills, previous work experience, and education.
- A resume includes achievements from prior jobs.
You have an upcoming client meeting with multiple stakeholders. You expect there
will be many decisions made during the meeting and action items assigned, so you’d
like detailed notes to easily reference later. Which of the following features can
you use to track discussion points and highlight action items?
- Take notes for me
You're presenting an important proposal to your team remotely by using Google Meet,
but your webcam and lighting aren’t the best. How can you improve your video
quality in a meeting using Gemini in Google Meet?
- Turn on Studio Look.
You've joined a Meet video call with a team based in Frankfurt, Germany. The main
speaker, Ida, is presenting in German. You’re conversational in German, but not
fluent enough to follow everything in a business meeting. You worry that you might
be missing important context during the call. How can you best improve your
understanding in real-time without interrupting the flow of the conversation?
- Turn on translated captions.
You're the head of sales at an amusement park with global locations. You're
preparing for the annual sales meeting, a virtual event crucial to setting the tone
and targets for the year. You want to create a background that showcases your
company's industry and global presence. Which prompt will best meet your needs
using Gemini in Google Meet?
- Rollercoaster with a globe in the background
You are using Dataproc to process a large number of CSV files. The storage option
you choose needs to be flexible to serve many worker nodes in multiple clusters.
These worker nodes will read the data and also write to it for intermediate storage
between processing jobs. What is the recommended storage option on Google Cloud?
- Cloud Storage
You are migrating on-premises data to a data warehouse on Google Cloud. This data
will be made available to business analysts. Local regulations require that
customer information including credit card numbers, phone numbers, and email IDs be
captured, but not used in analysis. You need to use a reliable, recommended
solution to redact the sensitive data. What should you do?
- Use the Cloud Data Loss Prevention API (DLP API) to identify and redact data that
matches infoTypes like credit card numbers, phone numbers, and email IDs.
Your data and applications reside in multiple geographies on Google Cloud. Some
regional laws require you to hold your own keys outside of the cloud provider
environment, whereas other laws are less restrictive and allow storing keys with
the same provider who stores the data. The management of these keys has increased
in complexity, and you need a solution that can centrally manage all your keys.
What should you do?
- Store your keys on a supported external key management partner, and use Cloud
External Key Manager (Cloud EKM) to get keys when required.
Business analysts in your team need to run analysis on data that was loaded into
BigQuery. You need to follow recommended practices and grant permissions. What role
should you grant the business analysts?
- bigquery.user and bigquery.dataViewer
Laws in the region where you operate require that files related to all orders made
each day are stored immutably for 365 days. The solution that you recommend has to
be cost-effective. What should you do?
- Store the data in a Cloud Storage bucket, and specify a retention period.
You are running a user-supplied DoFn method signature pipeline in Dataflow. The
function has been defined by you. The code is running slow and you want to further
examine the pipeline code to get better visibility of why. What should you do?
- Use Cloud Profiler
Cymbal Retail is migrating its private data centers to Google Cloud. Over many
years, hundreds of terabytes of data were accumulated. You currently have a 100
Mbps line and you need to transfer this data reliably before commencing operations
on Google Cloud in 45 days. What should you do?
- Order a transfer appliance, export the data to it, and ship it to Google.
You are managing the data for Cymbal Retail, which consists of multiple teams
including retail, sales, marketing, and legal. These teams are consuming data from
multiple producers including point of sales systems, industry data, orders, and
more. Currently, teams that consume data have to repeatedly ask the teams that
produce it to verify the most up-to-date data and to clarify other questions about
the data, such as source and ownership. This process is unreliable and time-
consuming and often leads to repeated escalations. You need to implement a
centralized solution that gains a unified view of the organization's data and
improves searchability. What should you do?
- Implement a data mesh with Dataplex and have producers tag data when created.
Cymbal Retail has acquired another company in Europe. Data access permissions and
policies in this new region differ from those in Cymbal Retail’s headquarters,
which is in North America. You need to define a consistent set of policies for
projects in each region that follow recommended practices. What should you do?
- Create top level folders for each region, and assign policies at the folder
level.
Cymbal Retail has a team of business analysts who need to fix and enhance a set of
large input data files. For example, duplicates need to be removed, erroneous rows
should be deleted, and missing data should be added. These steps need to be
performed on all the present set of files and any files received in the future in a
repeatable, automated process. The business analysts are not adept at programming.
What should they do?
- Load the data into Dataprep, explore the data, and edit the transformations as
needed.
A company collects lots of consumer data from online marketing campaigns. Company
plans to use Google Cloud to store this collected data. The top management is
worried about exposing personally identifiable information (PII) that may be
present in this data. What should you do to reduce the risk of exposing PII data?
- Use the Cloud Data Loss Prevention API (DLP API) to inspect and redact PII data.
Your company is very serious about data protection and hence decides to implement
the Principle of Least Privilege. What should you do to comply with this policy?
- Give just enough permissions to get the task done.
You are creating a data pipeline for streaming data on Dataflow for Cymbal Retail's
point of sales data. You want to calculate the total sales per hour on a continuous
basis. Which of these windowing options should you use?
- Tumbling windows (fixed windows in Apache Beam)
Your data engineering team receives data in JSON format from external sources at
the end of each day. You need to design the data pipeline. What should you do?
- Store the data in Cloud Storage and create an extract, transform, and load (ETL)
pipeline.
You want to build a streaming data analytics pipeline in Google Cloud. You need to
choose the right products that support streaming data. Which of these would you
choose?
- Pub/Sub, Dataflow, BigQuery
You have a data pipeline that requires you to monitor a Cloud Storage bucket for a
file, start a Dataflow job to process data in the file, run a shell script to
validate the processed data in BigQuery, and then delete the original file. You
need to orchestrate this pipeline by using recommended tools. Which product should
you choose?
- Cloud Composer
You are processing large amounts of input data in BigQuery. You need to combine
this data with a small amount of frequently changing data that is available in
Cloud SQL. What should you do?
- Use a federated query to get data from Cloud SQL.
The first stage of your data pipeline processes tens of terabytes of financial data
and creates a sparse, time-series dataset as a key-value pair. Which of these is a
suitable sink for the pipeline's first stage?
- Bigtable
You are running Dataflow jobs for data processing. When developers update the code
in Cloud Source Repositories, you need to test and deploy the updated code with
minimal effort. Which of these would you use to build your continuous integration
and delivery (CI/CD) pipeline for data processing?
- Cloud Build
Your company has multiple data analysts but a limited data engineering team. You
need to choose a tool where the analysts can build data pipelines themselves with a
graphical user interface. Which of these products is the most appropriate?
- Cloud Data Fusion
You need to run batch jobs, which could take many days to complete. You do not want
to manage the infrastructure provisioning. What should you do?
- Run the jobs on Batch.
You manage a PySpark batch data pipeline by using Dataproc: You want to take a
hands-off approach to running the workload, and you do not want to provision and
manage your own cluster. What should you do?
- Configure the job to run on Dataproc Serverless.
A company collects large amounts of data that is useful for improving business
operations. The collected data is already clean and is in a format that is suitable
for further analysis. The company uses BigQuery as a data warehouse. What approach
will you recommend to move this data to BigQuery?
- Directly load the data using Extract and Load approach ( EL).
Your analysts repeatedly run the same complex queries that combine and filter
through a lot of data on BigQuery. The data changes frequently. You need to reduce
the effort for the analysts. What should you do?
- Create a view of the frequently queried data.
You have large amounts of data stored on Cloud Storage and BigQuery. Some of it is
processed, but some is yet unprocessed. You have a data mesh created in Dataplex.
You need to make it convenient for internal users of the data to discover and use
the data. What should you do?
- Create a raw zone for the unprocessed data and a curated zone for the processed
data.
Cymbal Retail has accumulated a large amount of data. Analysts and leadership are
finding it difficult to understand the meaning of the data, such as BigQuery
columns. Users of the data don't know who owns what. You need to improve the
searchability of the data. What should you do?
- Create tags for data entries in Cloud Catalog.
You have data stored in a Cloud Storage bucket. You are using both Identity and
Access Management (IAM) and Access Control Lists (ACLs) to configure access
control. Which statement describes a user's access to objects in the bucket?
- The user has access if either IAM or ACLs grant a permission.
You have data that is ingested daily and frequently analyzed in the first month.
Thereafter, the data is retained only for audits, which happen occasionally every
few years. You need to configure cost-effective storage. What should you do?
- Configure a lifecycle policy on Cloud Storage.
You need to store data long term and use it to create quarterly reports. What
storage class should you choose?
- Coldline
You need to choose a data storage solution to support a transactional system. Your
customers are primarily based in one region. You want to reduce your administration
tasks and focus engineering effort on building your business application. What
should you do?
- Use Cloud SQL.
You are ingesting data that is spread out over a wide range of dates into BigQuery
at a fast rate. You need to partition the table to make queries performant. What
should you do?
- Create an ingestion-time partitioned table with daily partitioning type.
You have several large tables in your transaction databases. You need to move all
the data to BigQuery for the business analysts to explore and analyze the data. How
should you design the schema in BigQuery?
- Redesign the schema to denormalize the data with nested and repeated data.
Cymbal Retail collects large amounts of data that is useful for improving business
operations. The company wants to store and analyze this data in a serverless and
cost-effective manner using Google Cloud. The analysts need to use SQL to write the
queries. What tool can you use to meet these requirements?
- BigQuery
Your data in BigQuery has some columns that are extremely sensitive. You need to
enable only some users to see certain columns. What should you do?
- Use policy tags.
You used Dataplex to create lakes and zones for your business data. However, some
files are not being discovered. What could be the issue?
- You have an exclude pattern that matches the files.
Your company uses Google Workspace and your leadership team is familiar with its
business apps and collaboration tools. They want a cost-effective solution that
uses their existing knowledge to evaluate, analyze, filter, and visualize data that
is stored in BigQuery. What should you do to create a solution for the leadership
team?
- Configure Connected Sheets.
You need to optimize the performance of queries in BigQuery. Your tables are not
partitioned or clustered. What optimization technique can you use?
- Batch your updates and inserts.
You have analytics data stored in BigQuery. You need an efficient way to compute
values across a group of rows and return a single result for each row. What should
you do?
- Use a window function with an OVER clause.
You have data in PostgreSQL that was designed to reduce redundancy. You are
transferring this data to BigQuery for analytics. The source data is hierarchical
and frequently queried together. You need to design a BigQuery schema that is
performant. What should you do?
- Use nested and repeated fields.
You have a complex set of data that comes from multiple sources. The analysts in
your team need to analyze the data, visualize it, and publish reports to internal
and external stakeholders. You need to make it easier for the analysts to work with
the data by abstracting the multiple data sources. What tool do you recommend?
- Looker
Your business has collected industry-relevant data over many years. The processed
data is useful for your partners and they are willing to pay for its usage. You
need to ensure proper access control over the data. What should you do?
- Host the data on Analytics Hub.
You repeatedly run the same queries by joining multiple tables. The original tables
change about ten times per day. You want an optimized querying approach. Which
feature should you use?
- Materialized views
You built machine learning (ML) models based on your own data. In production, the
ML models are not giving satisfactory results. When you examine the data, it
appears that the existing data is not sufficiently representing the business goals.
You need to create a more accurate machine learning model. What should you do?
- Perform feature engineering, and use domain knowledge to enhance the column data.
You need to share inventory data from Cymbal Retail with a partner company that
uses BigQuery to store and analyze its data. What tool can you use to securely and
efficiently share the data?
- Analytics Hub
Cymbal Retail has a team of ML engineers that builds and maintains machine learning
models. As a Professional Data Engineer, how will you support this team?
- Process and prepare existing data to enable feature engineering.
Cymbal Retail processes streaming data on Dataflow with Pub/Sub as a source. You
need to plan for disaster recovery and protect against zonal failures. What should
you do?
- Take Dataflow snapshots periodically.
You have a team of data analysts that run queries interactively on BigQuery during
work hours. You also have thousands of report generation queries that run
simultaneously. You often see an error: Exceeded rate limits: too many concurrent
queries for this project_and_region. How would you resolve this issue?
- Run the report generation queries in batch mode.
You run a Cloud SQL instance for a business that requires that the database is
accessible for transactions. You need to ensure minimal downtime for database
transactions. What should you do?
- Configure high availability.
When running Dataflow jobs, you see this error in the logs: "A hot key HOT_KEY_NAME
was detected in…". You need to resolve this issue and make the workload performant.
What should you do?
- Ensure that your data is evenly distributed.
You need to create repeatable data processing tasks by using Cloud Composer. You
need to follow best practices and recommended approaches. What should you do?
- Write each task to be responsible for one operation.
Multiple analysts need to prepare reports on Monday mornings due to which there is
heavy utilization of BigQuery. You want to take a cost-effective approach to
managing this demand. What should you do?
- Use Flex Slots.
You have a Dataflow pipeline in production. For certain data, the system seems to
be stuck longer than usual. This is causing delays in the pipeline execution. You
want to reliably and proactively track and resolve such issues. What should you do?
- Set up alerts on Cloud Monitoring based on system lag.
You are running a Dataflow pipeline in production. The input data for this pipeline
is occasionally inconsistent. Separately from processing the valid data, you want
to efficiently capture the erroneous input data for analysis. What should you do?
- Create a side output for the erroneous data.
You need to design a Dataproc cluster to run multiple small jobs. Many jobs (but
not all) are of high priority. What should you do?
- Use ephemeral clusters.
Your company recently migrated to Google Cloud and started using BigQuery. The team
members don’t know how much querying they are going to do, and they need to be
efficient with their spend. As a Professional Data Engineer, what pricing model
would you recommend?
- Use BigQuery’s on-demand pricing model.
Cymbal Retail uses Google Cloud and has automated repeatable data processing
workloads to achieve reliability and cost efficiency. You want out-of-the-box
metric collection dashboards and the ability to generate alerts when specific
conditions are met. What tool can you use?
- Cloud Monitoring
Who can create their own Looks and dashboards in Looker? Please choose the best
answer.
- Data explorer end users only.
The Looker platform empowers you with options to share with others your data
analyses or visualizations.
- True
Which of the following services is provided by the Looker platform? Please choose
the best answer.
- Data analysis and data visualization.
Boards are the primary content type available in the Looker platform.
- False
You can access all Looker content contained within the “All folders” folder.
- False
What folder type does NOT exist in the Looker platform end user interface? Please
choose the best answer.
- The “Recently Viewed” folder.
From our previous fruit basket example, the component “Is Round?” is classified as
a measure, not a dimension.
- False
A measure corresponds to what part of a data source? Please choose the best answer.
- SQL aggregation functions.
In what order are filters applied to your data in Looker during data analysis?
Please choose the best answer.
- Dimensions filter first, then measures filter.
End users can only apply one dimension filter at a time during data analysis.
- False
After the measure filter is applied, Looker discards all of the irrelevant data and
only presents data that meets all current filter criteria.
- True
A dimension corresponds to what part of a data source? Please choose the best
answer.
- A data column.
When using Looker for data analysis, only one dimension and measure combination can
be selected at a time.
- False
Any content added to a board moves to the location of that content in the board
directory structure.
- False
What is one change a data explorer end user CANNOT make to a dashboard? Please
choose the best answer.
- Export individual tiles.
What field types can data explorer end users select as filter criteria in a Looker
dashboard? Please choose the best answer.
- Both dimensions and measures.
What content CANNOT be added to a board? Please choose the best answer.
- Explores.
What field types can data explorer end users select as filter criteria in a Look?
Please choose the best answer.
- Both dimensions and measures.
A data explorer end user must enter a dashboard-specific edit mode to add, remove
or modify filters for a dashboard.
- True
A data explorer end user must enter a Look-specific edit mode to add or edit a
filter in a Look.
- True
In the Edit table calculations dialog box, in which field will you actually write
the coding for your new table calculation? Please choose the best answer.
- Expression.
You can pivot your data using either dimensions or measures in Looker.
- False
The four primary types of table calculations are: string, mathematical, logical,
and date and time.
- True
Which is a key characteristic of table calculations? Please choose the best answer.
- They run only on your query results.
What are the recommended Looker best practices on when to click the “Run” button,
with respect to adding an offset calculation? Please choose the best answer.
- Click the “Run” button before.
To write an offset calculation in Looker, you select the “Offset calculation” menu
option from the “Add” menu popup in the Custom Fields section of the field picker
in your Explore.
- False
What are the general use cases for choosing to write a table calculation? Please
choose the best answer.
- To prototype a new dimension or measure, and/or to support a results set.
What type of table calculation would contain the substring() function in its
coding? Please choose the best answer.
- String.
To write a table calculation, you find the “Custom Fields” section of the field
picker in an Explore, click on the “Add” menu popup, and then choose the “Table
calculation” menu option.
- True
If you pivoted your data by a dimension in Looker, what data in turn would be
displayed? Please choose the best answer.
- Data by active measure.
A data explorer end user can create a dashboard in two ways from an Explore: the
Save fanout menu option from the top right-hand gear menu in Explores and Looks,
and the “Add to dashboard” link at the extreme right of a Look in the Details
panel.
- True
Who can create new dashboards in Looker? Please choose the best answer.
- Data explorers.
A Look is essentially a visual data report designed to answer one specific question
of your data.
- True
Data explorer end users create Looks from what part of the Looker platform? Please
choose the best answer.
- Explores.
End users can download a dashboard to their local computer as .csv, .zip, .pdf
or .png file formats.
- True
Which of these options is NOT a sharing and scheduling method for dashboards?
Please choose the best answer.
- Send.
End users can download a Look to their local computer as .csv, .zip, .pdf or .png
file formats.
- True
All end users can see and follow all tile-level dashboard alerts if they so choose.
- False
Which of these options is NOT a sharing and scheduling method for Looks? Please
choose the best answer.
- Pin to a board.
What’s an important factor to consider when identifying key use cases for
development?
- Number of users that will benefit from it.
Which order should we follow during the writing process when crafting conversation
scripts?
- Conversation structure, structure’s enhancement, action’s enhancement, persona
alignment.
Which of the following is a true statement as one of the guiding principles for
virtual agent persona design?
- The persona doesn’t take center stage and instead focuses on the customer.
What are the things that a chatbot developer should take into consideration when
designing a virtual agent persona? (Choose two)
- Brand characteristics
- Key character traits
In the featurestore, the timestamps are an attribute of the feature values, not a
separate resource type.
- True
Which type of training do you use if your data set doesn’t change over time?
- Static training
Match the three types of data ingest with an appropriate source of training data.
- Streaming (Pub/Sub), structured batch (BigQuery), unstructured batch (Cloud
Storage)
Which type of logging should be enabled in the online prediction that logs the
stderr and stdout streams from your prediction nodes to Cloud Logging and can be
useful for debugging?
- Container logging
When you use the data to train a model, Vertex AI examines the source data type and
feature values and infers how it will use that feature in model training. This is
called the ________________for that feature.
- Transformation
Vertex AI has a unified data preparation tool that supports image, tabular, text,
and video content. Where are uploaded datasets stored in Vertex AI?
- A Google Cloud Storage bucket that acts as an input for both AutoML and custom
training jobs.
Which component identifies anomalies in training and serving data and can
automatically create a schema by examining the data?
- Data validation
Which of the following models are susceptible to a feedback loop? Check all that
apply.
- A university-ranking model that rates schools in part by their selectivity (the
percentage of students who applied that were admitted).
- A book-recommendation model that suggests novels its users may like based on
their popularity (i.e., the number of times the books have been purchased).
- A traffic-forecasting model that predicts congestion at highway exits near the
beach, using beach crowd size as one of its features.
What is the shift in the actual relationship between the model inputs and the
output called?
- Concept drift
Which of the following tools help software users manage dependency issues?
- Maven, Gradle, and Pip
Suppose you are building an ML-based system to predict the likelihood that a
customer will leave a positive review. The user interface that customers leave
reviews on changed a few months ago, but you don't know about this. Which of these
is a potential consequence of mismanaging this data dependency?
- Losses in prediction quality
For the fastest I/O performance in TensorFlow… (check all that apply)
- Prefetch the data
- Read in parallel threads.
- Optimize TensorFlow performance using the Profiler.
- Read TF records into your model.
If each of your examples is large in terms of size and requires parsing, and your
model is relatively simple and shallow, your model is likely to be:
- I/O bound, so you should look for ways to store data more efficiently and ways to
parallelize the reads.
To copy the input data into TensorFlow, which of the following syntaxes is correct?
- inferenceInterface.feed(inputName, floatValues, 1, inputSize, inputSize, 3);
Which of the following determines the correct property of Tensorflow Lite? Select
TWO correct answers.
- Lower precision arithmetic
- Quantization
Which of these are reasons that you may not be able to perform machine learning
solely on Google Cloud? Check all that apply.
- You are tied to on-premises or multi-cloud infrastructure due to business
reasons.
- You need to run inference on the edge.
Which of the following components is essential for the virtual agent to determine
the meaning behind a user's message?
- Natural Language Understanding (NLU) model
What is an entity?
- A piece of information that we want to extract from user utterances.
To handle diverse user requests effectively, what should you consider when
designing intents?
- Grammatical differences.
Which activities are part of the process to identify head intents? Choose TWO.
- Consult subject matter experts.
- Review of transcripts (manually or through machine learning).
What is an advantage of building your head intent collection in a page that is not
your start page?
- You can control exactly what head intent routes are in scope at each page in your
flow.
What are the two methods for handling intents with overlapping training phrases?
- Merge intents, split intents
Seroja Malone wants to set up a Google Meet event with Anthony Dylan for next
Friday. Which of the following buttons should she select in her Google Calendar?
- Create
Thomas Omar has two lists of calendars – his primary calendar and a secondary
calendar known as his “other calendar”. Which of the following would appear in his
primary calendar? Select all that apply.
- Calendar events he has created personally
- Calendar events that he has been invited to attend
Anthony Dylan uses a Public visibility Google Calendar. His sharing permission is
set to “See Only Free/Busy”. Thomas Omar wants to schedule a meeting with Anthony.
What will he see when he checks Anthony’s Google calendar?
- Anthony’s events will show as “busy”
Seroja Malone wants to set up an event with Anthony Dylan and Sherrie West. The
group will meet every 6 weeks for an undetermined period of time. Which of the
following should Seroja do? Select all that apply.
- Select Custom recurrence
- Invite Anthony and Sherrie as participants
- Select Create
- Choose the meeting start and end time
On the Rise store owner Yousef Amadi recently planned a team meeting on Google
Meet, but then decided to delete the event. He has now changed his mind and wants
to hold the meeting. How can he restore the event?
- Select the Settings menu, then Trash, then select the event, and choose Restore
all selected
Seroja Malone sends Sherrie West a Google Calendar event invitation for next
Thursday at 2pm. Sherrie accepts, but later realizes she has a conflict and that
next Friday at 9am would be more convenient. What is the easiest way she can
reschedule?
- Sherrie can change her response to “No”, select Propose a new time and select
next Friday at 9am
Kaina Gao will be out of office next week but has new marketing assets that she
needs to distribute during the head office meeting the following Monday. What is
the most effective way to ensure that she completes this task?
- She can create a Task for Monday
In order to share his work with everyone at On the Rise, Thomas realizes he needs
to modify his Google Calendar sharing permissions. What are some ways he can do
this? Select all that apply.
- He can go to the Settings menu, select Settings, ensure his work calendar is
selected and scroll to Access Permissions
- He can select his work calendar, select Options next to the calendar list, then
select Settings and sharing from the menu
Thomas Omar frequently holds meetings with the On the Rise team. To simplify the
scheduling process, he’d like to share his work calendar with everyone at the
company. Which permission option should he select?
- Access permissions
Seroja Malone wants to share her work calendar exclusively with Anthony Dylan. What
does she need to do?
- Select + Add people and type [email protected]
Kaina Gao sends Sherrie West a Gmail message inviting her to an On the Rise Google
Meet next Thursday. What does Sherrie need to do in order to add this event to her
Google Calendar?
- Nothing. The event will automatically populate in her Google Calendar
Seroja Malone wants to schedule a Google Meet with a cinnamon supplier in Italy.
How can she set up her Google Calendar in order to easily work across time zones?
- She can go to her Google Calendar Settings, select Display Secondary Time Zone,
and select Italy. She can then compare it with her primary time zone
What is used to collect metrics inside the VM instead of at the hypervisor level?
- Ops Agent
What lets you perform a live debugging of connections that are inadvertently
dropped?
- Firewall Insights
Which profile signifies the amount of memory allocated in the heap of the program?
- Heap
You have an SLO that states that 90% of your http requests need to respond in less
than 100 ms. You want a report that compares latency for your last two versions.
What tool would you use to most easily create this report?
- Trace
You deployed a new version of a service and all of a sudden significantly more
instances are being created in your Kubernetes cluster. Your service scales when
average CPU utilization is greater than 70%. What tool can help you investigate the
problem?
- Logging
What are some of the challenges of using LLMs? Select three options.
- They can be expensive to train.
- They can be biased.
- They can be used to generate harmful content.
Data sources are connectors that let you do what with your data?
- Query the data.
BigQuery is optimized for reading terabytes and petabytes of data. How can BigQuery
read and handle large amounts of data?
- BigQuery is a “columnar store,” so it only reads the relevant columns to execute
a query.
You are exploring data in Looker, and you need to narrow the results of the query.
Which should you use?
- A filter
You ran a query and have results showing year-over-year sales growth. What type of
Looker Studio visualization would be best to display the data?
- Line chart
You want to save your query results as a report. What is a report referred to in
Looker?
- A Look
You want to send a report that shows task completion to your manager every Friday
morning to give them visibility into your team’s productivity. What is the best
approach for sending data on a regular cadence?
- From Looker, create a schedule for the data.
Which of the following Google foundation models is used to convert between speech
and text?
- Chirp
What is the primary advantage of using a foundation model over building a custom AI
model?
- Foundation models can be easily adapted to various tasks without extensive
retraining.
Which of the following is a technique for improving the quality of responses from a
generative AI model?
- Instructing the model to explain its reasoning.
What is the purpose of using semantic search in the RAG serving subsystem?
- To retrieve documents based on the meaning and intent of the query.
Which of the following types of data should be stored in a location other than the
Vertex AI Search data store?
- Training data
Which component of the RAG architecture is responsible for adding external data to
the RAG process?
- Data ingestion subsystem
You need to create a chatbot that is designed to answer customer questions about
your company's products in a friendly and informative way. Which Gemini 1.0 Pro
model is the best choice for this task?
- Gemini 1.0 Pro
Which of the following describes the Gemini 1.0 Pro and Gemini 1.0 Pro Vision
models?
- One model handles text-based prompts, the other handles multimodal prompts with
text, images, and/or video.
True or False? Most business data is unstructured data, and mainly text.
- True
Which technology was developed as a solution to run Kubernetes clusters and pods
behind the scenes to support deploying pipelines?
- Vertex Pipelines
True or False? You can train and evaluate machine learning models directly in
BigQuery.
- True
Which of the following are valid techniques for improving AutoML Vision and AutoML
Natural Language models?
- Increase the diversity and complexity of data
- Increase the amount of training data
- Ensure consistent labeling
AutoML makes use of which of the following:
- Google's models and your data
What are the benefits of selling your software through Google Cloud Marketplace?
- All of the above
What option is used by Google Cloud Deploy and Cloud Build to run CI/CD pipelines
in customer VPCs?
- Private pools
Why would you send traffic to multiple versions of your Cloud Run application?
- Canary deployments
You are a data scientist working with a vast dataset of customer reviews in
BigQuery. You want to use the power of generative AI models to analyze the
sentiment of these reviews and generate summaries. Which BigQuery ML function
allows you to directly utilize remote Gen AI models for language tasks such as
sentiment analysis and summarization?
- ML.CREATE_TEXT
You're a data scientist working on a project that requires you to leverage AI/ML
capabilities within BigQuery. You're evaluating different deployment options for
your models. In terms of deployment, what are the major AI/ML model types in
BigQuery?
- Local models, remote models, imported models
In BigQuery, the workflow to develop an AI/ML project can be divided into two main
phases. Which option accurately represents these two phases?
- Create and use
Which SQL command would you use to create an ML model in BigQuery ML?
- CREATE MODEL
You want to use machine learning to discover the underlying pattern and group a
collection of unlabeled photos into different sets. Which should you use?
- Unsupervised learning, cluster analysis
Which of the following is one of Google’s seven principles for responsible AI?
- AI should avoid creating or reinforcing unfair bias.
Vertex AI, AutoML, and Generative AI Studio align to which stage of the data-to-AI
workflow?
- Machine learning
On Cloud Storage, which data storage class is best for storing data that needs to
be accessed less than once a year?
- Archive storage
If you have unstructured data, like images, text, and/or audio, which storage
option on Google Cloud would you choose?
- Cloud Storage
Which Google hardware innovation tailors architecture to meet the computation needs
on a domain, such as the matrix multiplication in machine learning?
- TPUs (tensor processing units)
- TPUs (Tensor Processing Units)
What are the three layers of the AI/ML framework on Google Cloud?
- AI foundations, AI development, and AI solutions
Which code-based solution offered with Vertex AI gives data scientists full control
over the development environment and process?
- Custom training
tf.keras is a high-level TensorFlow library that has been commonly used to build ML
models. Which of the following lets you create a neural network with multiple
layers?
- tf.keras.Sequential
Which of the following can you do with the Natural Language API?
- Analyze sentiment and identify subjects of text.
You work for a global hotel chain that has recently loaded some guest data into
BigQuery. You have experience writing SQL and want to leverage machine learning to
help predict guest trends for the next few months. Which option is best?
- BigQuery ML
Your company has a massive amount of data, and you want to train your own machine
learning model to see what insights ML can provide. Due to resource constraints,
you require a codeless solution. Which option is best?
- AutoML
Which stage of the machine learning workflow includes model training and
evaluation?
- Model development
A hospital uses the machine learning technology of Google to help pre-diagnose
cancer by feeding historical patient medical data to the model. The goal is to
identify as many potential cases as possible. Which metric should the model focus
on?
- Recall
A farm uses the machine learning technology of Google to detect defective apples in
their crop, like those with irregular sizes or scratches. The goal is to identify
only the apples that are actually bad so that no good apples are wasted. Which
metric should the model focus on?
- Precision
Which stage of the machine learning workflow includes data upload and feature
engineering?
- Data preparation
When you build an ML pipeline on Vertex AI to automate the ML workflow, what are
the components you can use?
- You can include both prebuilt components (by Google) and custom components into
the pipeline.
Which of the following provides a toolkit to automate, monitor, and govern machine
learning systems by orchestrating the workflow in a serverless manner?
- Vertex AI Pipelines
Which of the following is the best way to generate more creative or unexpected
content by adjusting the model parameters in Generative AI Studio?
- Set the temperature to a high value.
Which of the following is a type of prompt that allows a large language model to
perform a task with only a small number of examples?
- Few-shot prompt
You run a call center that handles customer questions from multiple channels, such
as email, phone calls, and chat. You want to improve customer satisfaction and
agent efficiency by using AI to automate routine requests, help agents with complex
tasks and discover insights. Which AI solution on Google Cloud should you choose?
- Contact Center AI
Which stage in a data pipeline involves modifying and preparing data for specific
downstream requirements?
- Transform
What is the key difference between a data lake and a data warehouse?
- Data lakes store raw, unprocessed data, while data warehouses store processed and
organized data.
What is the purpose of Analytics Hub in Google Cloud?
- To enable secure and controlled data sharing within and outside an organization.
Which Google Cloud product is best suited for storing unstructured data like images
and videos?
- Cloud Storage
Which of the following services efficiently moves large datasets from on-premises,
multicloud file systems, object stores, and HDFS into Cloud Storage and supports
scheduled transfers?
- Storage Transfer Service
Which tool or service uses the “cp” command to facilitate ad-hoc transfers directly
to Cloud Storage from various on-premise sources?
- gcloud storage command
In Datastream event messages, which section contains the actual data changes in a
key-value format?
- Payload
Which of the following tools is best suited for migrating very large datasets
offline?
- Transfer Appliance
What is the main advantage of using BigLake tables over external tables in
BigQuery?
- BigLake tables offer enhanced performance, security, and flexibility.
Which of the following best describes the BigQuery Data Transfer Service?
- It is a fully-managed service for scheduling and automating data transfers into
BigQuery from various sources.
Which of the following BigQuery features or services allows you to query data
directly in Cloud Storage without loading it into BigQuery?
- External tables
The LOAD DATA statement in BigQuery is best suited for which scenario?
- Automating data loading into BigQuery tables within a script or application.
Which of the following best describes the core concept of extract, load, and
transform (ELT)?
- Loading data into a data warehouse and then transforming it within the warehouse.
Which of the following features makes Dataproc Serverless for Spark ideal for
interactive development and exploration?
- JupyterLab integration
Which Google Cloud service is best suited for building complex data pipelines with
a visual, drag-and-drop interface?
- Data Fusion
Which Google Cloud service is specifically designed for serverless, no-code data
transformation using recipes?
- Dataprep
Which Google Cloud service is recommended for handling streaming data pipelines
that require millisecond-level latency analytics?
- Bigtable
Which of the following Google Cloud services allows you to execute code in response
to various Google Cloud events?
- Cloud Run functions
Which of the following Google Cloud services allows you to automate tasks by
invoking your workloads at specified, recurring intervals?
- Cloud Scheduler
One of your managers comes to you and states that they need to have more wrap up
time for one of their queues. They are currently dealing with a difficult issue
with callers in that queue. How would you give agents working in that queue more
time on the wrap up?
- Access the queue the manager is assigned to and modify the queue-level automatic
wrap up settings to be longer than the current time.
One of your newest agents is dealing with an escalated call right now. You make the
decision that you would like to hear the call for yourself. To do this you would
need to:
- Barge in on the call
One of your queues is for a small sales team that is eager to answer calls. Right
now Deltacast is the go-to routing configuration for all of your queues, but how
might you leverage a different CCAIP routing option so that all sales team agents
in this queue get the call offered at the same time and the quickest or most
efficient agent will be able to respond?
- Switch the routing option for this sales queue to multicast.
- Enable auto answer.
Which of the following is not an option for after-hours deflection in the mobile
channel for chats? (Choose TWO)
- External deflection link
- Email
Where do you enable an FAQ page as the landing page for your mobile app?
- Settings > Operation management
You are starting a new campaign in which you will have agents manually dial
consumers off a pre-generated list. What type of campaign are you planning to
start?
- Preview
Let’s imagine you are running a political research company. You no longer want an
ongoing progressive campaign that is assigned to your “Political Survey” IVR queue
calling consumers during EST business hours (9am to 5pm). How could you fix this?
- You create a time zone management list and apply it to the current campaign
You are currently running a campaign where agents are reserved to take calls after
the system places the call. What type of campaign is this?
- Progressive
If an agent is using Smart Compose in the chat adapter, what will the feature do?
- Automatically complete responses for the agent using conversation context.
If you are using Virtual Task Assistant and the agent moves the caller to a Task
Assistant to complete some confidential information, what should the agent do?
- Stay on the line and when the caller is done, the agent will continue the call
with them.
When an agent is in a chat and they view the sentiment score at the top of the
adapter, what does that indicate?
- The emotional intent within the current chat.
What are the prerequisites for LLM Baseline Summarization model training?
- LLM Baseline Summarization does not need model training.
In which phase of the Terraform workflow do you write configuration files based on
the scope defined by your organization?
- Author
In which phase of the Terraform workflow can you run pre-deployment checks against
the policy library?
- Validate
What is the most common use case for output values in Terraform?
- Print resource attributes of a root module CLI after its deployment.
State true or false. A state file is stored by default in a local file named
terraform.tfstate.
- True
The default, standard manager role does NOT have access to which of the following
items in the settings menu?
- Queue configuration
Which of the following is a best practice for browser settings for CCAIP?
- Disable ad blockers
Within live monitoring, an admin manager has the ability to view which of the
following: Choose two.
- All connected, completed, and queued calls
- All dashboard data
Which dashboard provides a view of all logged-in agents and allows you to filter
them?
- Agent monitoring
What are some metrics you can include in an Agent Performance Metrics Report?
Choose two.
- Occupancy
- Hold time
CCAIP users must have which permission in order to take calls and chats?
- Agent permission
Consider the types of calls listed below. Which type of call will not be included
in a historical report for calls?
- Connected calls
Which of the following details are present when viewing the chat details in
connected chats?
- Agent’s name
Which report do you need to access to review chats that have the lowest CSAT score?
- Performance metrics report
Which report gives a summary of all interactions, including transfers to the same
or a different queue?
- Queue summary- all interactions
Which of the following can you see in the queue reports dashboard?
- Service level for the current day
Which of the following is included in the Virtual Agent live monitoring dashboard?
- The resolution rate per Virtual Agent.
Which of the following metrics are included in the downloaded Virtual Agent Detail
Report?
- Queue name
When it comes to Virtual Agents, what is a planned transfer?
- When a voice Virtual Agent transfers a call or chat to a human agent through
design.
An agent on your team has been having issues using the CCAI Platform. You reach out
to them and ask what browser they are using. The agent is utilizing Firefox and has
cleared the cache. What are the right troubleshooting steps for this issue?
- The agent should be using Chrome for CCAI Platform. They should switch to this
browser and try again.
If the CRM softwares becomes unavailable during an agent’s shift, what can they do
for the rest of their workday?
- The agent can continue to work as normal while the CRM is down. They can continue
to take chats and calls in CCAI Platform instead.
One of the agents on your team has been having connection issues when working in
the office or at home. You have checked the browser, cleared the cache, and made
sure all software is up to date. The agent is using a wireless connection
everywhere they work. What could be wrong with their connection?
- The agent should be using a hardwired connection to get optimal connection
results.
Which of the following is the ideal use case for Extract and Load (EL)
- Scheduled periodic loads of log files (e.g. once a day)
Dataproc provides the ability for Spark programs to separate compute and storage
by:
- Reading and writing data directly from/to Cloud Storage
Which of the following statements are true about Dataproc? (Select all 2 correct
answers)
- Lets you run Spark and Hadoop clusters with minimal administration
- Helps you create job-specific clusters without HDFS
Match each of the terms with what they do when setting up clusters in Dataproc:
TermDefinition__ 1. ZoneA. Costs less but may not be available always__ 2. Standard
Cluster modeB. Determines the Google data center where compute nodes will be__ 3.
PreemptibleC. Provides 1 primary and N workers
- B<br>C<br>A
Which of the following statements are true? (Select all 2 correct responses)
- Dataflow transforms support both batch and streaming pipelines
- Dataflow executes Apache Beam pipelines
Match each of the Dataflow terms with what they do in the life of a dataflow job:
TermDefinition__ 1. TransformA. Output endpoint for your pipeline__ 2.
PCollectionB. A data processing operation or step in your pipeline__ 3. SinkC. A
set of data in your pipeline
- B<br>C<br>A
Cloud Storage, Bigtable, Cloud SQL, Spanner, and Firestore represent which type of
services?
- Database and storage
Pub/Sub, Dataflow, Dataproc, and Cloud Data Fusion align to which stage of the
data-to-AI workflow?
- Ingestion and process
AutoML, Vertex AI Workbench, and TensorFlow align to which stage of the data-to-AI
workflow?
- Machine learning
Compute Engine, Google Kubernetes Engine, App Engine, and Cloud Functions represent
which type of services?
- Compute
Which data storage class is best for storing data that needs to be accessed less
than once a year, such as online backups and disaster recovery?
- Archive storage
Due to several data types and sources, big data often has many data dimensions.
This can introduce data inconsistencies and uncertainties. Which type of challenge
might this present to data engineers?
- Veracity
When you build scalable and reliable pipelines, data often needs to be processed in
near-real time, as soon as it reaches the system. Which type of challenge might
this present to data engineers?
- Velocity
Which Google Cloud product acts as an execution engine to process and implement
data processing pipelines?
- Dataflow
Data has been loaded into BigQuery, and the features have been selected and
preprocessed. What should happen next when you use BigQuery ML to develop a machine
learning model?
- Create the ML model inside BigQuery.
You want to use machine learning to group random photos into similar groups. Which
should you use?
- Unsupervised learning, cluster analysis
You want to use machine learning to identify whether an email is spam. Which should
you use?
- Supervised learning, logistic regression
Which BigQuery feature leverages geography data types and standard SQL geography
functions to analyze a data set?
- Geospatial analysis
Which pattern describes source data that is moved into a BigQuery table in a single
operation?
- Batch load
BigQuery is a fully managed data warehouse. What does “fully managed” refer to?
- BigQuery manages the underlying structure for you.
In a supervised machine learning model, what provides historical data that can be
used to predict future data?
- Labels
Your company has a lot of data, and you want to train your own machine model to see
what insights ML can provide. Due to resource constraints, you require a codeless
solution. Which option is best?
- AutoML
Which Google Cloud product lets users create, deploy, and manage machine learning
models in one unified platform?
- Vertex AI
Which Vertex AI tool automates, monitors, and governs machine learning systems by
orchestrating the workflow in a serverless manner?
- Vertex AI Pipelines
Which of the following are true? Please select all that apply
- Use conversation context as user metadata.
- Support private knowledge base.
- Provide generative answers and citations.
- Answers and links agent's questions to conversation context.
What’s the word length when you should consider breaking down the document?
- 1000 words
LLM Summarization for voice doesn’t support more than 2 audio channels.
- True
Map the correct model configurations as per use case between Cell A and Cell B.
- A:4, B:3, C:1, D:2
Which of the following components initiates the call recording process in a SIPREC
integration?
- Customer's SBC (SRC)
When a customer calls a support line integrated with Agent Assist, what is the
initial step GTP takes upon receiving the SIP INVITE message?
- Manages the call signaling process
Which are the places where the integration of Agent Assist in CCAIP requires
configuration?
- Agent Assist Console or Project & CCAIP Platform
Virtual agents are useful in the context of Agent Assist, because they attempt to
resolve customer queries on their own before escalating to a human agent.
- True
What activities are performed in the discovery phase of the Delivery Life cycle?
- All of these activities are performed in the discovery phase of the Delivery Life
cycle.
What are all the GenAI powered features in the Agent Assist ?
- These are all GenAI powered features in the Agent Assist
The “In-Call Details” tab provides you with which data points? (Choose TWO)
- Phone number
- Entry point
You would like to select a different language for your adapter. Where can you
change your language in the adapter?
- The options menu (three dots)
When you click the “Transfer/Add” button on the adapter, it will provide you with
three options. What are those three options?
- Agent, queue, outside line
Which agent status color indicates that you are in unavailable status?
- Red
When a chat notification comes in, what happens if you click the notification?
- The chat is answered.
How can you view your individual and team-average chat statistics in the chat
adapter?
- Click the Chat icon, then select show chat overview, followed by options and
select Stats.
What is one way you can initiate the use of chat shortcuts?
- Click in the chat window and type a forward slash.
What status should you set yourself to, in order to receive incoming chats?
- Available
How should you set the time and date on your computer?
- Synced automatically with the internet
If you are using a Chrome browser and are experiencing issues, what steps should
you try? (Choose two)
- Check that third-party cookies are not blocked.
- Clear your cache.
Sarah is a network architect. They are responsible for the network design between
Cymbal’s on-premises network and Google Cloud resources, and also between Cymbal’s
Google Cloud resources and a partner company’s Google Cloud resources. These
connections must provide private IP connectivity and support up to 100 Gbps of data
exchange with minimum possible latency. Which options satisfy these requirements?
(select 2 of the options)
- VPC peering between VPC networks for Cymbal and the partner company.
- A Dedicated Interconnect connection between Cymbal’s on-premises network and
their Google Cloud VPC network.
To reduce latency, you will be replacing an existing Cloud VPN Classic VPN
connection. You will connect your organization’s on premises data center to Google
Cloud resources in a VPC network with all resources in a single subnet and region
using private/internal IP connectivity. The connection will need to support 1.5
Gbps of traffic. Due to cost considerations, you would like to order the option
that provides just enough bandwidth and not more but must have significantly lower
latency than the existing Cloud VPN connection. What should you use?
- A Partner Interconnect connection with 1 or 2 VLAN attachments
Cymbal needs to create one or more VPC networks to host their cloud services in 3
regions: Northeastern US, Western Europe, and Southeast Asia. The services require
bi-directional inter-regional communication on port 8443. The services receive
external internet traffic on port 443. What is the minimal network topology in
Google Cloud that would satisfy these requirements?
- 1 custom VPC network, with a subnet in each region). The VPC network has the
default routes, and the appropriate firewall rules added to support the traffic
requirements
Cymbal has a network support engineering team which will need access to create or
change subnet names, locations, and IP address ranges for some but not all
subnetworks of a VPC network in a Google Cloud project. Cymbal uses the principle
of least privilege and would like to restrict role-usage to Google predefined
roles. Which role should be assigned to this group?
- The Compute Network Admin role bound at the resource level for the subnetworks of
the VPC network that will be created or changed by the team.
You are a network engineer designing a network IP plan and need to select an IP
address range to use for a subnet. The subnet will need to host up to 2000 virtual
machines, each to be assigned one IP address from the subnet range. It will also
need to fit in the network IP range 10.1.0.0/16 and be as small as possible. What
subnet range should you use?
- 10.1.240.0/21
You need to create a GKE cluster, be able to connect to pod IP addresses from your
on-premises environment, and control access to pods directly using firewall rules.
You will need to support 300 nodes, 30000 pods, and 2000 services. Which
configuration satisfies these requirements?
- A GKE VPC-native cluster in a subnet with primary IP range 10.0.240.0/20, pod IP
range of 10.252.0.0/15, and service IP range of 10.0.224.0/20
Cymbal wants to ensure communication from their on-premises data centers to the GKE
control plane stays private using internal IP communication and their Dedicated
Interconnect links. However, they will need to allow administrators to periodically
connect to the cluster control plane from remote internet-accessible locations that
don’t have access to the on-premises private network. You want to select a
configuration and connection approach that will enable these requirements while
providing the highest security. What should you do?
- Deploy a private GKE cluster with public endpoint access disabled. Create a VM in
the same subnet with only an internal IP address and provide IAP tunnel based SSH
access to remote administrators for this VM. Have remote administrators connect via
IAP tunnel SSH to this VM when requiring access to the GKE cluster control plane.
You are designing a VPN solution to connect Cymbal’s on-premises data center to
Google Cloud. You have a BGP-capable VPN gateway installed in the data center and
require 99.99% availability for the VPN link. What Cloud VPN configuration meets
these requirements while requiring the least setup and maintenance?
- HA VPN with Cloud Router and dynamic routing
You are selecting Google Cloud locations to deploy Google Cloud VMs. You have
general requirements to maximize availability and reduce average user latency with
a lower priority goal of reducing networking costs. The users served by these VMs
will be in Toronto and Montreal. You must deploy workloads requiring instances at
99.5% availability in Toronto and 99.99% availability in Montreal. These instances
all exchange a large amount of traffic among themselves. Which deployment option
satisfies these requirements?
- Deploy instances in multiple zones in the northamerica-northeast1(Montreal)
region and a single zone in the northamerica-northeast2 (Toronto).
You are a network engineer designing a solution for hosting a Cymbal web
application in Google Cloud. The application will serve a collection of static and
dynamic web resources served over HTTPS to users worldwide. You need to design a
solution that maximizes availability while minimizing average user latency. Which
of the following features of Google Cloud networking can you utilize? (select 2)
- An Application Load Balancer with a backend service connected to a set of
regional MIGs, distributed over the regions closest to the users, to improve
availability and minimize latency.
- Cloud CDN could be used to cache static content resources at edge locations close
to end-users, increasing their availability and minimizing their latency.
Which benefits does Cymbal Bank achieve by deploying replica resources to multiple
zones in a region? Select two answers.
- Improved Availability
- Increased Capacity
Which Google Cloud features will Cymbal Bank use to connect their on-premise
networks to Google Cloud? Select two answers.
- Dedicated Interconnect
- Cloud VPN
Cymbal has a custom VPC network with two subnets (in us-central1 and us-east1)
hosting 500 VMs each. The primary ranges for each are 10.128.128.0/23 and
10.128.192.0/23. The VPC has default routes and 3 firewall rules (all at priority
1000), one (A) allowing ingress on TCP port 443 from any IP address, another (B)
allowing ingress on TCP port 8443 from the primary ranges of each subnet, and a
third (C) denying egress to the primary ranges for each subnet for all ports and
protocols except for TCP port 8443. They would like to consolidate the 1000 VMs
into a single subnet (to reduce networking costs) in us-central1 (and use a primary
IP range for that subnet to support that) and delete the us-east1 subnet. They
would like to ensure the simplest possible firewall rules in the new configuration
providing the same traffic control. Select the sequence of configuration steps that
can accomplish this with minimal interruption to the workloads.
- Expand the subnet in us-central1 to a primary IP range 10.128.128.0/22, delete
the VMs in the us-east1 subnet one at a time and re-create them in the us-central1
subnet, delete the us-east1 subnet, update the B and C firewall rules use the
single us-central1 subnet primary range.
You are designing a networking scheme for Cymbal, with the requirement to use
internal IP addresses for communication, with the lowest possible latency. Cymbal
has several teams, each with their own projects: P1, P2, and P3. Cymbal would like
consolidated network billing, administration, and access control for their cloud
environment. VMs in these projects need to connect to VMs in a partner
organization, in projects P4 and P5. Select the networking option that best
satisfies these requirements.
- Connect the VMs across the Cymbal projects (P1-P3) using a Shared VPC network
(Shared VPC host project P6 with VPC V6, and P1-P3 are the service projects) and
then peer that Shared VPC network to the partner organization VPCs (V6 peered to V4
and V6 to V5).
You are designing a VPC network with the requirement that all external traffic
destined for the Internet be passed through a proxy VM. The proxy will have
software installed to scan, detect, and drop invalid egress traffic, to help
prevent data exfiltration, outbound attacks, or access to blocked websites. Select
the configuration below that can most easily accomplish this.
- Delete the system-generated default route, then create a custom route to
destination 0.0.0.0/0. Specify the next hop as the proxy VM, and configure the
proxy VM to enable IP forwarding.
Cymbal needs to connect two on-premises networks to a single VPC network in Google
Cloud. One on-premises network supports BGP routing and is located near the us-
central1 region. The other on-premises network does not support BGP routing and is
located near us-east1. The VPC network has subnets in each of these regions. You
will use Cloud VPN to enable private communication between the on-premises networks
and the VPC network. Select the configuration that provides the highest
availability and the lowest average latency.
- Configure the VPC for global dynamic routing mode, create Cloud Routers in each
of the 2 regions, connect the office close to us-central1 to the VPC using an HA
VPN gateway with dynamic routing in us-central1, and connect the other office via a
Classic VPN gateway using static routing in us-east1.
You are configuring firewall rules for securing a set of microservices (MS1, MS2,
MS3) running in separate managed instance groups (MIGs) of VMs in a single subnet
of a VPC network. The primary range of the VPC network is 10.128.128.0/20. MS1 will
send requests to MS2 on TCP port 8443, MS2 will send requests to MS3 on TCP port
8663, and MS3 will need to send requests to MS1 on TCP port 8883. There will be no
other communication to or between these microservices. Select a simple and secure
firewall configuration to support this traffic requirement.
- Create service accounts (S1, S2, S3) for the microservices and assign those
service accounts to the instance template for the MIG used by each microservice,
create 3 ingress allow firewall rules, the first for TCP 8443 from source S1 to
target S2, the second for TCP 8663 from source S2 to target S3, the third for TCP
8883 from source S3 to target S1.
Cymbal has an existing subnet that they’d like to use for a new VPC-native GKE
cluster. The subnet primary IP address range is 10.128.128.0/20. Currently there
are 1000 other VMs using that subnet and have taken 1000 of the available IP
addresses. The new GKE cluster should support 200,000 pods and 30,000 services.
Select the minimal set of configuration steps and the smallest possible IP ranges
to enable this.
- Create a GKE VPC-native cluster in the subnet, specifying the pod range to be of
size /13 and services range to be of size /17.
You are trying to determine which firewall rule(s) is/are incorrectly blocking
requests between two VMs running within a VPC network: VM1 and VM2. Firewall
logging is enabled for all firewall rules, including metadata. The Firewall
Insights and Recommendations API also have been enabled. All insights have been
enabled, and observation period set over a period capturing the blocked requests.
Select a valid troubleshooting approach to find the incorrectly configured firewall
rule.
- Go to Logs Explorer or Legacy Logs Viewer page, view the firewall logs and filter
for logs matching the source and destination VMs VM1 and VM2 using the
jsonPayload.instance.project_id, jsonPayload.instance.vm_name,
jsonPayload.instance.region, and jsonPayload.instance.zone,
jsonPayload.remote_instance.vm_name, jsonPayload.remote_instance.region, and
jsonPayload.remote_instance.zone
You will be deploying a VPC-native GKE cluster into an existing service project of
a Shared VPC. You will create an Ingress to trigger the automatic creation,
connection, and firewall configuration of an Application Load Balancer to a service
deployed in the cluster for container-native load balancing. Select the option
corresponding to the IAM policy binding of least privilege necessary.
- Assign the service-service-project-num@container-engine-
robot.iam.gserviceaccount.com service account (where service-project-num is the
project number of the service project) the Host Service Agent User (in the host
project) and the Compute Network User (for the subnet of the GKE cluster in the
shared VPC in the host project).
Given the requirements and constraints covered in the case study, which GKE cluster
configuration would best align with Cymbal Bank's security and portability goals?
- Public access enabled, authorized networks enabled, intra-node visibility
disabled, built-in network policies.
How is Cymbal Bank improving efficiency of applying firewall rules uniformly across
their four shared VPCs?
- Hierarchical firewall rules
Select the list of the resources that must be created or configured to enable
packet mirroring.
- A packet mirroring policy, an internal passthrough Network Load Balancer
configured for packet mirroring, an instance group of collector instances, and
firewall rules
You are designing a load balanced autoscaling front-end for Cymbal Bank. It is
intended to be deployed into Google Kubernetes Engine (GKE). You want to use
container-native load balancing and autoscale based on the amount of traffic to the
service. Select the type of backend and autoscaling that would accomplish this.
- A zonal network endpoint group of Kubernetes pods which autoscale using a
Horizontal Pod Autoscaler.
You are designing a system in Google Cloud to ensure all traffic being sent between
two subnets is passed through a security gateway VM. The VM runs 3rd party software
that scans traffic for known attack signatures, then forwards or drops traffic
based on the scan results. You want to accomplish this without using public IP
addresses. Select a configuration that satisfies these requirements.
- Create the 2 subnets in 2 separate VPCs. Create a VM with 2 network interfaces
(NICs), with each NIC connected to the subnet in each VPC. Create custom routes in
each VPC to send traffic destined for each subnet originating in the opposite
subnet through the VM.
Cymbal Bank wants a web application to have global anycast load balancing across
multiple regions. The web application will serve static asset files and will also
use REST APIs that serve dynamic responses. The load balancer should support HTTP
and HTTPS requests and redirect HTTP to HTTPS. The load balancer should also serve
all the requests from the same domain name, with different paths indicating static
versus dynamic resources. Select the load balancer configuration that would most
effectively enable this scenario.
- A global external Application Load Balancer with two global forwarding rules,
forwarding to two target proxies, one with URL map and no backend service and the
other with URL map, one backend service, and one backend bucket.
You are configuring hybrid DNS for Google Cloud using Cloud DNS and your on
premises DNS. You have three VPC networks in Google Cloud in three different
projects that will need to forward DNS requests for a particular private domain to
the on premises DNS. All 3 projects have Cloud VPN connections to the on premises
network. Select the Google recommended approach for enabling this requirement.
- For the VPC in one of the projects, create a Cloud DNS forwarding zone for its
VPC. For the VPC in each of the other projects, create a Cloud DNS peering zone
that targets the VPC with the forwarding zone.
Cymbal Bank would like to protect their services which are deployed behind an
Application Load Balancer from L7 distributed denial of service (DDoS), SQL
injection (SQLi) and cross-site scripting (XSS) attacks. Select the simplest
approach to accomplish this.
- Configure Google Cloud Armor with the appropriate rules.
Cymbal Bank will use a hybrid DNS approach. Cymbal has a VPC in Google Cloud that
connects to their on premises networks via Interconnect. You will use Google Cloud
DNS for Cymbal’s public DNS zone at cymbalbank.com, and also for private DNS for
resources at gcp.cymbalbank.com. You will use Cymbal’s on premises DNS, which is
configured as authoritative for on premises private resources at
corp.cymbalbank.com. Select the Cloud DNS managed zone configuration that will
satisfy the requirements.
- Create a Cloud DNS private managed zone for gcp.cymbalbank.com, a public managed
zone for cymbalbank.com, and a third forwarding zone for corp.cymbalbank.com that
forwards DNS requests to the on-premise DNS.
Cymbal Bank uses Cloud CDN to cache a web-application served from a backend bucket
connected to a Cloud Storage bucket. You need to cache all the web-app files with
appropriate time to live (TTL) except for the index.html file. The index.html file
contains links to versioned files and should always be fetched or re-validated from
the origin. Select the configuration option to satisfy these requirements with
minimal effort.
- Set the Cloud CDN cache mode for the backend bucket to CACHE_ALL_STATIC, and
ensure the Cache-Control metadata for index.html is not set or set to no-store, no-
cache, or private.
Cymbal Bank is serving files from a backend bucket and wants to ensure time-limited
read access without authentication. The backend bucket uses signed URLs to access
those files. The files are also being cached in Cloud CDN. There is a problem with
one of the files. You want to delete the file. You also want to immediately ensure
no read access via the signed URL to the cached file copy in Cloud CDN, although
the expiry time is currently set to sometime in the future. Select the option that
accomplishes this with lowest cost and effort.
- Delete the key used to create the signed URL.
Which managed service will Cymbal Bank use to allow their private VMs to make
secure requests to the internet?
- Cloud NAT
Which managed service will Cymbal Bank use to protect their Google Cloud resources
from application layer DDoS attack?
- Google Cloud Armor
You are setting up a Dedicated Interconnect connection and need to provide the
highest capacity possible. Select the circuit configuration that achieves this.
- 2 100 Gbps circuits
You have an HA VPN gateway with 2 interfaces in active/active mode. You would like
to reconfigure them to active/passive mode. Select the simplest configuration
change that will satisfy this requirement.
- Update the base advertised route priority for one of the HA VPN tunnel’s BGP
sessions.
Cymbal Bank is connecting one of their Shared VPC networks to their on-premise
network via Dedicated Interconnect. Select the recommended approach for configuring
their VLAN attachments and Cloud Routers.
- Create the VLAN attachments and Cloud Routers in the Shared VPC host project.
Cymbal Bank is connecting a branch office with an old VPN gateway that doesn’t
support BGP. The old VPN gateway only supports IKEv1 and does not support local and
remote traffic selectors to be configured as 0.0.0.0/0. Select the configuration
option that can satisfy these requirements.
- Configure a Classic VPN gateway to connect to the on-premises gateway using
static routing with a policy-based tunnel with local and remote traffic selectors
matching the office VPN but reversed.
Cymbal Bank wants to achieve 99.9% availability with Dedicated Interconnect. You
want to support 100 Gbps of throughput, even if a single interconnect connection
were to fail. Select the simplest and least expensive configuration that can meet
these requirements.
- 2 100 Gbps connections in separate edge availability zones of the co-location
facility, 4 50 Gbps VLAN attachments
You are using the gcloud tool to create a Classic VPN with static routing and a
route-based tunnel. The on-premises resources are all in the 192.168.1.0/24 range.
You have issued commands to create the VPN gateway, IP addresses, forwarding rules,
and the VPN tunnel. Select the correct final resource that must be created.
- A route with destination 192.168.1.0/24 and next hop set to the VPN gateway
Cymbal Bank is connecting a branch office with a modern VPN gateway that supports
BGP to Google Cloud in a region. The office VPN gateway has two interfaces and only
requires a single tunnel to each to provide 99.99% availability. Select the
simplest Google Cloud VPN configuration that will provide 99.99% availability.
- An external VPN gateway resource with 2 interfaces, a Cloud Router in the same
region, a cloud HA VPN gateway with one tunnel from each interface to each external
VPN gateway interface, and BGP sessions for both tunnels
Cymbal Bank would like to achieve 99.99% availability for their Dedicated
Interconnect link from an on-premises network to their VPC. Select the
configuration that will achieve this.
- 2 Cloud Routers in 2 distinct regions, with the VPC in global dynamic routing
mode
Cymbal Bank has a Cloud Router in a region; the VPC advertises some of its subnets.
The VPC advertises none of the subnets in other regions. You require an update to
advertise all subnets in all regions for that VPC. You also want to automatically
advertise newly added subnets, as well as stop advertising removed subnets in the
future. Select the simplest configuration that will accomplish this goal.
- Check the dynamic routing mode of the VPC and update it to global if it is
currently regional. Configure the Cloud Router to default advertisement mode.
What is the minimum number of VPN tunnels required for a Cloud VPN HA configuration
to an on-premise peer VPN gateway that provides 99.99% availability?
- 2
You are designing a monitoring alert to notify you when a Cloud VPN tunnel
approaches the limits for bandwidth. Select the metrics that would be important to
include in the alerting policies.
- vpn.googleapis.com/network/sent_bytes_count,
vpn.googleapis.com/network/received_bytes_count,
vpn.googleapis.com/network/sent_packets_count,
vpn.googleapis.com/network/received_packets_count
Cymbal Bank has configured a Classic VPN with a policy-based tunnel to connect to a
branch office with an older VPN device that does not support BGP. You have
completed the configuration of the office VPN and the logs and monitoring suggest
that the tunnel is up and functioning correctly. You find when testing with ping
and traceroute that you can reach some VMs but not others in the VPC across the
tunnel from the office. You can reach some servers but not others in the office
from VMs in the VPC. You have verified the firewall configurations in both
environments and determined that is not the cause of the problem. Select the next
troubleshooting step you should attempt.
- Investigate the configuration of the local and remote traffic selectors in the
Classic VPN tunnel and office VPN configuration.
Cymbal Bank's network team wants to track and analyze detailed logs of all API
calls made to their Google Cloud resources, including timestamps, user identities,
and specific actions taken. Which Google Cloud service is the most appropriate
choice for Cymbal Bank's network team to achieve this goal?
- Cloud Logging
Cymbal Bank needs to log all cache hits and misses for their static assets served
from Cloud CDN via an Application Load Balancer backend bucket. What should you do?
- Use the default behavior, no configuration required.
You are trying to debug a connectivity issue between VMs in the same VPC using
internal IP addresses. The issue began immediately after configuring routes and
firewall rules. What should you do to troubleshoot the problem?
- Use Connectivity Tests to determine the connectivity problem.
You are using VPC Flow Logs to analyze traffic arriving at a subnet. You need to
capture approximately 10% of the traffic and determine how much traffic originates
from outside the subnet. VPC Flow Logs has already been enabled for the subnet. You
want to use the least expensive process. How should you configure the VPC Flow
Logs?
- Configure them with a sampling rate of 1.0 and a filter expression for the
connection destination IP within the IP range of the subnet.
How will Cymbal Bank detect transient connectivity issues with VPN and Interconnect
connections between their data centers and Google Cloud?
- Cloud Monitoring alerts
Which tool will Cymbal Bank use to verify and troubleshoot connectivity between
resources in their on-premises environment and those in Google Cloud VPCs?
- Connectivity Tests
You are designing a new network infrastructure in Google Cloud to support a global
e-commerce application. Which two of the following are key considerations you
should prioritize in your network design?
- To inform and guide design choices, ensuring the network aligns with
organizational goals and constraints.
- To ensure high availability and disaster recovery capabilities for the network.
You are designing a Google Cloud network for a large financial services company
with strict security requirements. The network needs to isolate sensitive customer
data from other resources and limit communication between specific network
segments. Which of the following network topologies would be most suitable for this
scenario?
- Gated ingress and egress
You are migrating a large ecommerce company's existing on-premises data center to
Google Cloud. The on-premises network consists of geographically dispersed regional
offices, each with its own network segment requiring secure isolation. However,
central management and communication between all regional offices are critical for
business operations. Which network topology would most effectively address these
requirements in Google Cloud?
- Hub-and-spoke
How can you use Pod securityContexts to control security? Choose all responses that
are correct (2 correct responses).
- Limit access to some Linux capabilities, like granting certain privileges to a
process, but not to all root user privileges.
- Enable AppArmor, which uses security profiles to restrict individual program
actions.
Workload Identity is a feature that bridges the gap between what two Google Cloud
services?
- Kubernetes service accounts and IAM service accounts.
You need to implement account controls to grant junior admin users the ability to
view details about production clusters and applications, and to fully manage and
test lab resources inside your GKE cluster environments. Which account control
mechanism is best suited for this granular control?
- Kubernetes RBAC.
You need to monitor specific applications running on your production GKE Clusters.
How can you create a logical structure for your application that allows you to
selectively monitor the application's components using Cloud Monitoring? Choose all
responses that are correct (2 correct responses).
- Add Labels to the Pods in Kubernetes that identify the applications.
- Filter the Cloud Monitoring logs using Kubernetes labels.
You are troubleshooting an issue which happened in the last hour. You enter the
command 'kubectl logs --since=3h demo-pod'. However, the events you are looking for
do not appear in the output. What is the likely cause?
- The log file was greater than 100MB in size, and it has been rotated.
You are a systems administrator tasked with monitoring and maintaining a cluster of
Google Kubernetes Engine (GKE) instances. Which of the following tools would you
use to collect and store logs from your GKE cluster?
- Cloud Logging.
How do you enable a GKE Pod to securely access a Google Cloud storage service?
- Grant the cluster's Kubernetes Service Account the necessary permissions to
access the Google Cloud service using Workload Identity.
You are considering options for your business continuity and data protection plans
and have identified a number of systems that need to be archived periodically for
regulatory compliance. These archives must be kept for up to 5 years and will need
to be audited quarterly. Apart from the quarterly audit, there is no expectation
that they will need to be accessed routinely. What Cloud Storage solution best
matches these requirements?
- Cloud Storage - Coldline.
CI/CD pipelines exist along a spectrum of implementations. Google Cloud tools such
as Cloud Build create pipelines at which level of the spectrum?
- Dev-centric CI/CD.
Which of the following is not a recommended practice for a GKE CI/CD pipeline?
- Manually testing the application after each build.
As the world and business changes, organizations have to decide between embracing
new technology and transforming, or keeping their technology and approaches the
same. What risks might an organization face by not transforming as their market
evolves?
- Focusing on ‘how’ they operate can prevent organizations from seeing
transformation opportunities.
An organization has a new application, and user subscriptions are growing faster
than on-premises infrastructure can handle. What benefit of the cloud might help
them in this situation?
- It's scalable, so the organization could shorten their infrastructure deployment
time.
Select the two capabilities that form the basis of a transformation cloud? Select
two correct answers.
- Open infrastructure gives the freedom to innovate by running applications in the
place that makes the most sense.
- Data cloud provides a unified solution to manage data across the entire data
lifecycle.
An organization wants to innovate using the latest technologies, but also has
compliance needs that specify data must be stored in specific locations. Which
cloud approach would best suit their needs?
- Hybrid Cloud
An organization has shifted from a CapEx to OpEx based spending model. Which of
these statements is true?
- They will only pay for what they use.
Which network performance metric describes the amount of data a network can
transfer in a given amount of time?
- Bandwidth
In the cloud computing shared responsibility model, what types of content are
customers always responsible for, regardless of the computing model chosen?
- The customer is responsible for securing anything that they create within the
cloud, such as the configurations, access policies, and user data.
A solar energy company wants to analyze weather data to better understand the
seasonal impact on their business. On which platform could they find free-to-use
weather datasets?
- Google Cloud Marketplace
Which step in the data value chain is where collected raw data is transformed into
a form that’s ready to derive insights from?
- Data processing
Which is a repository designed to ingest, store, explore, process, and analyze any
type or volume of raw data, regardless of the source?
- Data lake
A car insurance company has a large database that stores customer details,
including the vehicles they own and past claims. The structure of the database
means that information is stored in tables, rows, and columns. What type of
database is this?
- A relational database
New cloud tools make it possible to harness the potential of unstructured data.
Which of these use cases best demonstrates this?
- Analyzing social media posts to identify sentiment toward a brand
Which represents the proprietary customer datasets that a business collects from
customer or audience transactions and interactions?
- First-party data
Which Google Cloud product can be used to synchronize data across databases,
storage systems, and applications?
- Datastream
Data in the form of video, pictures, and audio recordings is well suited to object
storage. Which product is best for storing this kind of data?
- Cloud Storage
Which is the best SQL-based storage option for a transactional workload that
requires local or regional scalability?
- Cloud SQL
Which strategy describes when databases are migrated from on-premises and private
cloud environments to the same type of database hosted by a public cloud provider?
- Lift and shift
A data analyst for an online retailer must produce a sales report at the end of
each quarter. Which Cloud Storage class should the retailer use for data accessed
every 90 days?
- Coldline
Which would be the best SQL-based storage option for a transactional workload that
requires global scalability?
- Spanner
What is Google's big data database service that powers many core Google services,
including Google Search, Google Analytics, Google Maps Platform, and Gmail?
- Bigtable
What feature of Looker makes it easy to integrate into existing workflows and share
with multiple teams at an organization?
- It’s 100% web based.
What is Google Cloud’s distributed messaging service that can receive messages from
various device streams such as gaming events, Internet of Things (IoT) devices, and
application streams?
- Pub/Sub
A travel company is in the early stages of developing a new application and wants
to test it on a variety of configurations: different operating systems, processors,
and storage options. What cloud computing option should they use?
- Virtual machine instances
What phrase refers to when a workload is rehosted without changing anything in the
workload's code or architecture.
- Lift and shift
What is one way that organizations can create new revenue streams through APIs?
- By charging developers to access their APIs
What term describes a set of instructions that lets different software programs
communicate with each other?
- Application programming interface
What is the name of Google Cloud's API management service that can operate APIs
with enhanced scale, security, and automation?
- Apigee
Which is a fully managed cloud infrastructure solution that lets organizations run
their Oracle workloads on dedicated servers in the cloud?
- Bare metal solution
What name is given to an environment where an organization uses more than one
public cloud provider as part of its architecture?
- Multicloud
What’s the name of Google Cloud’s production-ready platform for running Kuberenetes
applications across multiple cloud environments?
- GKE Enterprise
After a Deployment has been created and its component Pods are running, which
component is responsible for ensuring that a replacement Pod is launched whenever a
Pod fails or is evicted?
- ReplicaSet
Inter-pod affinity rules are specified at the zone level, not at the individual
Node level. To apply this override, which additional parameter must be configured
in the Pod manifest YAML?
- topologyKey: failure-domain.beta.kubernetes.io/zone
You are resolving a range of issues with a Deployment and need to make a large
number of changes. Which command can you execute to group these changes into a
single rollout, thus avoiding pushing out a large number of rollouts?
- kubectl rollout pause deployment
Which of the following commands will display the desired, current, up-to-date, and
available status of all the ReplicaSets within a Deployment?
- kubectl get
How do you configure a Kubernetes Job so that Pods are retained after completion?
- Configure the cascade flag for the Job with a value of false.
You are configuring a Job to convert a sample of a large number of video files to a
different format. Which parameter should you configure to stop the process once a
sufficient quantity is reached?
- completions=4
You have autoscaling enabled on your cluster. What conditions are required for the
autoscaler to decide to delete a node?
- If a node is underutilized and running Pods can be run on other Nodes.
You need to apply a network policy to five Pods to block ingress traffic from other
Pods. Each Pod has a label of app:demo-app. In your network policy manifest, you
have specified the label app:demo-app in spec.podSelector. The policy is configured
and listed when you view Network Policies on your cluster. However, it’s not having
the intended effect. Pods can still be pinged from other Pods within the cluster.
What is the cause of this and what action can you take to correct it?
- You have not enabled network policies on the cluster. Enable network policies and
recreate all of the nodes.
You have updated your application and deployed a new Pod. How can you ensure
consistent network access to the Pod throughout its lifecycle?
- Deploy a Kubernetes Service with a selector that locates the application's Pods.
You are designing a GKE solution. One of your requirements is that network traffic
load balancing should be directed to Pods instead of balanced across nodes. How can
you enable this for your environment?
- Configure or migrate your cluster to VPC-Native Mode and deploy a container-
native load balancer.
During testing, you cannot find the Google Cloud load balancer that should have
been configured for your application. You check the manifest and notice that the
application's frontend service type is ClusterIP. How can you correct this?
- Define spec.type as LoadBalancer in the YAML manifest for the service and
redeploy the application.
Your Pod has been rescheduled, and the original IP address that was assigned to the
Pod is no longer accessible. What is the reason for this?
- The new Pod has received a different IP address.
A StatefulSet consists of four Pods that are named Demo-0, Demo-1, Demo-2 and Demo-
3. The StatefulSet originally had only two replica Pods but this number was
recently increased to four. An update is being rolled out to The StatefulSet is
currently being updated with a rolling strategy. Which Pod in the StatefulSet will
be updated last?
- Demo-0
You need to store image registry credentials to allow Pods to pull images from a
private repository. What type of Kubernetes Secret should you create?
- A Docker-Registry Secret.
A GKE application might need persistent storage. The app owner creates a
PersistentVolumeClaim (PVC) with a StorageClassName labeled "standard." What type
of storage will likely be used for the volume?
- Google Persistent Disk.
You have created a ConfigMap and want to make the data available to your
application. Where should you configure the directory path parameters in the Pod
manifest to allow your application to access the data as files?
- spec.containers.volumeMounts
Which of the following are benefits of running TFX on Google Cloud? Select all that
apply.
- Increase your pipeline development and experimentation velocity.
- Simplify scaling of TFX pipeline data processing as your data grows
- Automate your ML operational processes for individual and multiple ML pipelines.
How is TFX pipeline data organized after ingestion by the ExampleGen component?
Select one.
- Spans, Versions, Splits
Select all the following that are outputs of a TFX pipeline run on Google Cloud:
- Pipeline run artifacts stored in Cloud Storage
- A TensorFlow SavedModel pushed to Cloud Storage or AI Platform Prediction
- Pipeline logs written to Cloud Logging
What Google Cloud development tool can be used to store and share TFX pipeline code
for portability, reproducibility and reuse?
- Container Registry
Which managed Google Cloud service auto-scales and distributes TFX component data
processing? Select one.
- Dataflow
Which orchestrator would you select for single machine development and debugging of
your TFX pipeline? Select one.
- Apache Beam DirectRunner
Which Google Cloud developer tool powers CI/CD workflows for building, testing, and
deploying TFX pipeline code? Select one.
- Cloud Build
Your ML Engineering team has existing ML pipeline code written in Java. Which TFX
custom component option can you re-use this code in your TFX pipeline to speed up
development? Select one.
- Pre-built container
When designing a custom TFX component from a Python function, which of the
following steps are needed? Select all that apply.
- Initialize your custom component object to pass with other components in a list
to the pipeline orchestrator for execution.
- Decorate your Python function with the @component decorator.
- Annotate input and output artifact types and runtime parameter types
Which of the following elements of the ML Metadata data model are stored in an ML
Metadata (MLMD) store? Select all that apply:
- Events
- Executions
- Contexts
What standard TFX objects can be used for performing advanced TFX metadata
operations? Select one.
- Pipeline nodes
Which of the following are use cases for ML Metadata? Select all that apply:
- Visualize a pipeline DAG of components connected by artifact dependencies.
- Record and query context of workflow runs.
- Load two Artifacts of the same type for comparison.
When we train a model in our continuous training pipeline, we want to compare the
new model’s performance with the previous model’s performance. If the new model is
worse than the previous model, then we do not want to deploy it. Which operator
will best help us to create a task to include this logic in our pipeline?
- BigQueryValueCheckOperator
One of the stages of a continuous training pipeline is ensuring that data you plan
to use for training satisfies your business rules. What was the name of this stage?
- Data validation
Which APIs are available in the MLflow Project?
- All of answers are correct.
Which API you can use toto plug in continuous integration and deployment (CI/CD)
tools such as Jenkins to automatically test and transition your models ?
- Model registry API
Which of the following MLflow components is used for managing and deploying models
from a variety of ML libraries to a variety of model serving and inference
platforms ?
- MLflow Projects
Which of the following are benefits of the service choreography pattern? Select
two.
- Service choreography allows for decentralized control.
- Services are loosely coupled.
Cymbal Bank publishes its APIs through Apigee. Cymbal Bank has recently acquired
ABC Corp, which uses a third-party identity provider. You have been tasked with
connecting ABC Corp’s identity provider to Apigee for single sign-on (SSO). You
need to set up SSO so that Google is the service provider. You also want to monitor
and log high-risk activities. Which two choices would you select to enable SSO?
- Review Network mapping results, and assign SSO profiles to required users.
- Use openssl to generate public and private keys. Store the public key in an X.509
certificate, and encrypt using RSA or DSA for SAML. Sign in to the Google Admin
console, and under Security, upload the certificate.
Cymbal Bank leverages Google Cloud storage services, an on-premises Apache Spark
Cluster, and a web application hosted on a third-party cloud. The Spark cluster and
web application require limited access to Cloud Storage buckets and a Cloud SQL
instance for only a few hours per day. You have been tasked with sharing
credentials while minimizing the risk that the credentials will be compromised.
What should you do?
- Create a service account with appropriate permissions. Have the Spark Cluster and
the web application authenticate as delegated requests, and share the short-lived
service account credential as a JWT.
Cymbal Bank has a team of developers and administrators working on different sets
of Google Cloud resources. The Bank’s administrators should be able to access the
serial ports on Compute Engine Instances and create service accounts. Developers
should only be able to access serial ports. How would you design the organization
hierarchy to provide the required access?
- Deny Serial Port Access and Service Account Creation at the organization level.
Create a ‘dev’ folder and set enforced: false for
constraints/compute.disableSerialPortAccess. Create a new ‘admin’ folder inside the
‘dev’ folder, and set enforced: false for
constraints/iam.disableServiceAccountCreation. Give developers access to the ‘dev’
folder, and administrators access to the ‘admin’ folder.
You are an administrator for Cymbal Bank’s Mobile Development Team. You want to
control how long different users can access the Google Cloud console, the Cloud
SDK, and any applications that require user authorization for Google Cloud scopes
without having to reauthenticate. More specifically, you want users with elevated
privileges (project owners and billing administrators) to reauthenticate more
frequently than regular users at the organization level. What should you do?
- In the Admin console, select Google Cloud session control and set a
reauthentication policy that requires reauthentication. Choose the reauthentication
frequency from the drop-down list.
Cymbal Bank has acquired a non-banking financial company (NBFC). This NBFC uses
Active Directory as their central directory on an on-premises Windows Server. You
have been tasked with migrating all the NBFC users and employee information to
Cloud Identity. What should you do?
- Use Cloud VPN to connect the on-premises network to your Google Cloud
environment. Select an on-premises domain-joined Windows Server. On the domain-
joined Windows Server, run Configuration Manager and Google Cloud Directory Sync.
Use Cloud VPN’s encrypted channel to transfer users from the on-premises Active
Directory to Cloud Identity.
Cymbal Bank recently discovered service account key misuse in one of the teams
during a security audit. As a precaution, going forward you do not want any team in
your organization to generate new external service account keys. You also want to
restrict every new service account’s usage to its associated Project. What should
you do?
- Navigate to Organizational policies in the Google Cloud Console. Select your
organization. Select iam.disableServiceAccountKeyCreation. Customize the applied to
property, and set Enforcement to ‘On’. Click Save. Repeat the process for
iam.disableCrossProjectServiceAccountUsage.
Cymbal Bank is divided into separate departments. Each department is divided into
teams. Each team works on a distinct product that requires Google Cloud resources
for development. How would you design a Google Cloud organization hierarchy to best
match Cymbal Bank’s organization structure and needs?
- Create an Organization node. Under the Organization node, create Department
folders. Under each Department, create a Teams folder. Under each Team, create
Product folders. Add Projects to the Product folders.
Cymbal Bank has certain default permissions and access for their analyst, finance,
and teller teams. These teams are organized into groups that have a set of role-
based IAM permissions assigned to them. After a recent acquisition of a small bank,
you find that the small bank directly assigns permissions to their employees in
IAM. You have been tasked with applying Cymbal Bank’s organizational structure to
the small bank. Employees will need access to Google Cloud services. What should
you do?
- Reset all user permissions in the small bank’s IAM. Use Cloud Identity to create
dynamic groups for each of the bank’s teams. Use the dynamic groups’ metadata field
for team type to allocate users to their appropriate group with a Python script.
Which feature of Google Cloud will Cymbal Bank use to control the source locations
and times that authorized identities will be able to access resources?
- IAM Conditions
Which tool will Cymbal Bank use to synchronize their identities from their on-
premise identity management system to Google Cloud?
- Google Cloud Directory Sync
The data from Cymbal Bank’s loan applicants resides in a shared VPC. A credit
analysis team uses a CRM tool hosted in the App Engine standard environment. You
need to provide credit analysts with access to this data. You want the charges to
be incurred by the credit analysis team. What should you do?
- Add ingress firewall rules to allow NAT and Health Check ranges for the App
Engine standard environment in the Shared VPC network. Create a client-side
connector in the Service Project using the Shared VPC Project ID. Verify that the
connector is in a READY state. Create an ingress rule on the Shared VPC network to
allow the connector using Network Tags or IP ranges.
You have recently joined Cymbal Bank as a cloud engineer. You created a custom VPC
network, selecting to use the automatic subnet creation mode and nothing else. The
default network still exists in your project. You create a new Linux VM instance
and select the custom VPC as the network interface. You try to SSH into your
instance, but you are getting a “connection failed” error. What answer best
explains why you cannot SSH into the instance?
- You did not set up any firewall rules on your custom VPC network. While the
default VPC comes with a predefined firewall rule that allows SSH traffic, these
need to be added to any custom VPCs.
Cymbal Bank has designed an application to detect credit card fraud that will
analyze sensitive information. The application that’s running on a Compute Engine
instance is hosted in a new subnet on an existing VPC. Multiple teams who have
access to other VMs in the same VPC must access the VM. You want to configure the
access so that unauthorized VMs or users from the internet can’t access the fraud
detection VM. What should you do?
- Use subnet isolation. Create a service account for the fraud detection engine.
Create service accounts for each of the teams’ Compute Engine instances that will
access the engine. Add a firewall rule using: gcloud compute firewall-rules create
ACCESS_FRAUD_ENGINE --network <network name> --allow TCP:80 --source-service-
accounts <list of service accounts> --target-service-accounts <fraud detection
engine’s service account>
Cymbal Bank needs to connect its employee MongoDB database to a new human resources
web application on the same network. Both the database and the application are
autoscaled with the help of Instance templates. As the Security Administrator and
Project Editor, you have been tasked with allowing the application to read port
27017 on the database. What should you do?
- Create service accounts for the application and database. Create a firewall rule
using:gcloud compute firewall-rules create ALLOW_MONGO_DB --network network-name --
allow TCP:27017 --source-service-accounts web-application-service-account --target-
service-accounts database-service-account
Cymbal Bank has published an API that internal teams will use through the
Application Load Balancer. You need to limit the API usage to 200 calls every hour.
Any exceeding usage should inform the users that servers are busy. Which gcloud
command would you run to throttle the load balancing for the given specification?
- gcloud compute security-policies rules create priority --security-policy sec-
policy --src-ip-ranges=source-range --action=throttle --rate-limit-threshold-
count=200 --rate-limit-threshold-interval-sec=3600 --conform-action=allow --exceed-
action=deny-429 --enforce-on-key=HTTP-HEADER
Cymbal Bank is releasing a new loan management application using a Compute Engine
managed instance group. External users will connect to the application using a
domain name or IP address protected with TLS 1.2. A load balancer already hosts
this application and preserves the source IP address. You are tasked with setting
up the SSL certificate for this load balancer. What should you do?
- Create a Google-managed SSL certificate. Attach a global static external IP
address to the global external Application Load Balancer. Validate that an existing
URL map will route the incoming service to your managed instance group backend.
Load your certificate and create an HTTPS proxy routing to your URL map. Create a
global forwarding rule that routes incoming requests to the proxy.
An external audit agency needs to perform a one-time review of Cymbal Bank’s Google
Cloud usage. The auditors should be able to access a Default VPC containing
BigQuery, Cloud Storage, and Compute Engine instances where all the usage
information is stored. You have been tasked with enabling the access from their on-
premises environment, which already has a configured VPN. What should you do?
- Use a Cloud VPN tunnel. Use Cloud DNS to create DNS zones and records for
*.googleapis.com. Set up on-premises routing with Cloud Router. Use Cloud Router
custom route advertisements to announce routes for Google Cloud destinations.
Cymbal Bank’s Customer Details API runs on a Compute Engine instance with only an
internal IP address. Cymbal Bank’s new branch is co-located outside the Google
Cloud points-of-presence (PoPs) and requires a low-latency way for its on-premises
apps to consume the API without exposing the requests to the public internet. Which
solution would you recommend?
- Use Partner Interconnect. Use a service provider to access their enterprise grade
infrastructure to connect to the Google Cloud environment.
Your organization has a website running on Compute Engine. This instance only has a
private IP address. You need to provide SSH access to an on-premises developer who
will debug the website from the authorized on-premises location only. How do you
enable this?
- Use Identity-Aware Proxy (IAP). Set up IAP TCP forwarding by creating ingress
firewall rules on port 22 for TCP using the gcloud command.
Which tool will Cymbal Bank use to enforce authentication and authorization for
services deployed to Google Cloud?
- Identity-Aware proxy
How will Cymbal Bank enable resources with only internal IP addresses to make
requests to the Internet?
- Cloud NAT
Cymbal Bank needs to statistically predict the days customers delay the payments
for loan repayments and credit card repayments. Cymbal Bank does not want to share
the exact dates a customer has defaulted or made a payment with data analysts.
Additionally, you need to hide the customer name and the customer type, which could
be corporate or retail. How do you provide the appropriate information to the data
analysts?
- Generalize all dates to year and month with date shifting. Use a predefined
infoType for customer name. Use a custom infoType for customer type with a custom
dictionary.
Cymbal Bank uses Google Kubernetes Engine (GKE) to deploy its Docker containers.
You want to encrypt the boot disk for a cluster running a custom image so that the
key rotation is controlled by the Bank. GKE clusters will also generate up to 1024
randomized characters that will be used with the keys with Docker containers. What
steps would you take to apply the encryption settings with a dedicated hardware
security layer?
- Create a new GKE cluster with customer-managed encryption and HSM enabled. Deploy
the containers to this cluster. Delete the old GKE cluster. Use Cloud HSM to
generate random bytes and provide an additional layer of security.
You are building an AI model on Google Cloud to analyze customer data and predict
purchase behavior. This model will have access to sensitive information like
purchase history and demographics. To protect this data and prevent misuse of the
model, what THREE security controls are most important to implement?
- Monitor the model's performance for anomalies and biases, then manually intervene
if needed.
- Enable Google Cloud Armor on your deployed model to block malicious requests.
- Deploy the model in a region with the highest data security standards.
You're building a machine learning model on Google Cloud. You're choosing between
two options: managing the infrastructure yourself (IaaS) or using Google's managed
services (PaaS). To ensure the best security posture for both the model and its
data, which TWO factors should you prioritize when defining security requirements
for each hosting option?
- Data location and residency restrictions
- Granular access controls and permissions
Cymbal Bank has hired a data analyst team to analyze scanned copies of loan
applications. Because this is an external team, Cymbal Bank does not want to share
the name, gender, phone number, or credit card numbers listed in the scanned
copies. You have been tasked with hiding this PII information while minimizing
latency. What should you do?
- Use the Cloud Data Loss Prevention (DLP) API to make redact image requests.
Provide your project ID, built-in infoTypes, and the scanned copies when you make
the requests.
Cymbal Bank calculates employee incentives on a monthly basis for the sales
department and on a quarterly basis for the marketing department. The incentives
are released with the next month’s salary. Employee’s performance documents are
stored as spreadsheets, which are retained for at least one year for audit. You
want to configure the most cost-effective storage for this scenario. What should
you do?
- Upload the spreadsheets to Cloud Storage. Select the Nearline storage class for
the sales department and Coldline storage for the marketing department. Use object
lifecycle management rules to set the storage class to Archival after 365 days.
Process the data on BigQuery using jobs that run monthly for Sales and quarterly
for Marketing.
Cymbal Bank has a Cloud SQL instance that must be shared with an external agency.
The agency’s developers will be assigned roles and permissions through a Google
Group in Identity and Access Management (IAM). The external agency is on an annual
contract and will require a connection string, username, and password to connect to
the database. How would you configure the group’s access?
- Use Secret Manager. Use the duration attribute to set the expiry period to one
year. Add the secretmanager.secretAccessor role for the group that contains
external developers.
Cymbal Bank needs to migrate existing loan processing applications to Google Cloud.
These applications transform confidential financial information. All the data
should be encrypted at all stages, including sharing between sockets and RAM. An
integrity test should also be performed every time these instances boot. You need
to use Cymbal Bank’s encryption keys to configure the Compute Engine instances.
What should you do?
- Create a Confidential VM instance with Customer-Supplied Encryption Keys. In
Cloud Logging, collect all logs for sevLaunchAttestationReportEvent.
Which tool will Cymbal Bank use to scan for, detect, and optionally transform
sensitive data to prevent exposure?
- Sensitive Data Protection
What feature will allow Cymbal Bank to delete or change the storage class of
objects in Cloud Storage buckets?
- Lifecycle management rules
Cymbal Bank runs a Node.js application on a Compute Engine instance. Cymbal Bank
needs to share this base image with a ‘development’ Google Group. This base image
should support secure boot for the Compute Engine instances deployed from this
image. How would you automate the image creation?
- Prepare a shell script. Add the command gcloud compute instances stop with the
Node.js instance name. Set up certificates for secure boot. Add gcloud compute
images create, and specify the Compute Engine instance’s persistent disk and zone
and the certificate files. Add gcloud compute images add-iam-policy-binding and
specify the ‘development’ group.
The loan application from Cymbal Bank’s lending department collects credit reports
that contain credit payment information from customers. According to bank policy,
the PDF reports are stored for six months in Cloud Storage, and access logs for the
reports are stored for three years. You need to configure a cost-effective storage
solution for the access logs. What should you do?
- Set up a logging export bucket in Cloud Storage to collect data from Cloud Audit
Logs. Configure object lifecycle management rules to delete logs after three years.
Cymbal Bank wants to use Cloud Storage and BigQuery to store safe deposit usage
data. Cymbal Bank needs a cost-effective approach to auditing only Cloud Storage
and BigQuery data access activities. How would you use Cloud Audit Logs to enable
this analysis?
- Enable Data Access Logs for ADMIN_READ, DATA_READ, and DATA_WRITE for Cloud
Storage. All Data Access Logs are enabled for BigQuery by default.
Cymbal Bank has Docker applications deployed in Google Kubernetes Engine. The bank
has no offline containers. This GKE cluster is exposed to the public internet and
has recently recovered from an attack. Cymbal Bank suspects that someone in the
organization changed the firewall rules and has tasked you to analyze and find all
details related to the firewall for the cluster. You want the most cost-effective
solution for this task. What should you do?
- View the GKE logs in Cloud Logging. Use the log scoping tool to filter the
Firewall Rules log. Create a dataset in BigQuery to accept the logs. Export the
logs to BigQuery using the command gcloud logging sinks create. Query this dataset.
Cymbal Bank uses Docker containers to interact with APIs for its personal banking
application. These APIs are under PCI-DSS compliance. The Kubernetes environment
running the containers will not have internet access to download required packages.
How would you automate the pipeline that is building these containers?
- Create a Dockerfile with a container definition and a Cloud Build configuration
file. Use the Cloud Build configuration file to build and deploy the image from
Dockerfile to a Google Container registry. In the configuration file, include the
Google Container Registry path and the Google Kubernetes Engine cluster. Upload the
configuration file to a Git repository. Create a trigger in Cloud Build to automate
the deployment using the Git repository.
Cymbal Bank uses Compute Engine instances for its APIs, and recently discovered
bitcoin mining activities on some instances. The bank wants to detect all future
mining attempts and notify the security team. The security team can view the
Security Command Center and Cloud Audit Logs. How should you configure the
detection and notification?
- Enable Anomaly Detection in the Security Command Center. Create and configure a
Pub/Sub topic and an email service. Create a Cloud Run function to send email
notifications for suspect activities. Export findings to a Pub/Sub topic, and use
them to invoke the Cloud Run function.
Cymbal Bank has suffered a remote botnet attack on Compute Engine instances in an
isolated project. The affected project now requires investigation by an external
agency. An external agency requests that you provide all admin and system events to
analyze in their local forensics tool. You want to use the most cost-effective
solution to enable the external analysis. What should you do?
- Use Cloud Audit Logs. Filter Admin Activity audit logs for only the affected
project. Use a Pub/Sub topic to stream the logs from Cloud Audit Logs to the
external agency’s forensics tool.
Cymbal Bank has received Docker source files from its third-party developers in an
Artifact Registry repository. These Docker files will be part of a CI/CD pipeline
to update Cymbal Bank’s personal loan offering. The bank wants to prevent the
possibility of remote users arbitrarily using the Docker files to run any code. You
have been tasked with using Container Analysis’ On-Demand scanning to scan the
images for a one-time update. What should you do?
- Prepare a cloudbuild.yaml file. In this file, add four steps in order—build,
scan, severity check, and push—specifying the location of Artifact Registry
repository. Specify severity level as CRITICAL. Start the build with the command
gcloud builds submit.
Cymbal Bank experienced a recent security issue. A rogue employee with admin
permissions for Compute Engine assigned existing Compute Engine users some
arbitrary permissions. You are tasked with finding all these arbitrary permissions.
What should you do to find these permissions most efficiently?
- Use Event Threat Detection and trigger the IAM Anomalous grants detector. Publish
results to the Security Command Center. In the Security Command Center, select
Event Threat Detection as the source, filter by category: iam, and sort to find the
attack time window. Click on Persistence: IAM Anomalous Grant to display Finding
Details. View the Source property of the Finding Details section.
How will Cymbal Bank be able to determine who performed a particular administrative
action and when?
- Audit logs
Which feature of Google Cloud will Cymbal Bank use to prevent unauthorized
container images from being deployed into production environments?
- Binary Authorization
Cymbal Bank plans to launch a new public website where customers can pay their
equated monthly installments (EMI) using credit cards. You need to build a secure
payment processing solution using Google Cloud which should follow the PCI-DSS
isolation requirements. How would you architect a secure payment processing
environment with Google Cloud services to follow PCI-DSS? (Select the two correct
choices)
- Create a new Google Cloud project with restricted access (separate from
production environment) for the payment processing solution. Configure firewall
rules, a VPN tunnel, and an Application Load Balancer for a new Compute Engine
instance.
- Deploy a Linux base image from preconfigured operating system images. Install
only the libraries you need. Deploy using Terraform.
You are a cloud engineer at Cymbal Bank. You need to share the auditing and
compliance standards with your CTO that cover controls over financial reporting and
both public and private controls over security, availability, and confidentiality.
Which compliance standard covers this?
- SOX
You are designing a web application for Cymbal Bank so that customers who have
credit card issues can contact dedicated support agents. Customers may enter their
complete credit card number when chatting with or emailing support agents. You want
to ensure compliance with PCI-DSS and prevent support agents from viewing this
information in the most cost-effective way. What should you do?
- Implement Cloud Data Loss Prevention using its REST API.
Cymbal Bank’s Insurance Analyst needs to collect and store anonymous protected
health information of patients from various hospitals. The information is currently
stored in Cloud Storage, where each hospital has a folder that contains its own
bucket. You have been tasked with collecting and storing the healthcare data from
these buckets into Cymbal Bank’s Cloud Storage bucket while maintaining HIPAA
compliance. What should you do?
- Use the Cloud Healthcare API to read the data from the hospital buckets and use
de-identification to redact the sensitive information. Use Dataflow to ingest the
Cloud Healthcare API feed and write data in a new Project that contains the Cloud
Storage bucket. Give the Insurance Analyst the ‘Editor’ role on this Project.
Cymbal Bank has a compliance requirement to have control over key lifecycle and
rotation periods. Which Google Cloud feature can they leverage to satisfy that
requirement?
- CMEK with Cloud KMS
For transient network issues, what error-handling approach should you implement?
- Retry with exponential backoff
Which of the following statements about Google Cloud Client Libraries are true?
Select two.
- Cloud Client Libraries handle retry logic and authentication.
- Cloud Client Libraries support a language's natural conventions and styles.
Which of the following statements about Cloud Code are true? Select two.
- Cloud Code works with both Cloud Run and Kubernetes applications.
- Cloud Code integrates with Secret Manager to securely store sensitive data.
Which command-line tools does the Google Cloud SDK include? Select two.
- gcloud
- bq
You're building a banking application that is expected to have a very large number
of users around the world. When users make a deposit, they want to see the result
of this deposit reflected immediately when they view their balance. What data
storage option is ideal for storing account balance information for users?
- Spanner is ideal because it supports strongly consistent reads in addition to
horizontal scalability, low latency, and high throughput.
You have a very large database that you're using for complex queries in a suite of
business intelligence applications. You want to move the data to a fully-managed
solution. Which option is ideal for such use cases?
- BigQuery
How should you authenticate to Google Cloud APIs from your production application
that is deployed to Cloud Run?
- Attach a service account to your application.
Your photo-sharing application requires user login. You don't want to build a
custom user authentication system that stores usernames and passwords. What is the
best way to authenticate your users?
- You can leverage federated identity management by using Firebase Authentication.
Your enterprise has an online expense reporting application. Employees must be able
to access the application without having to log into the corporate VPN. How can you
enable this type of access?
- You can use Identity-Aware Proxy to provide application-level access.
How can you invoke pre-trained machine learning APIs (such as the Vision API or
Natural Language API) from your application?
- Use the REST API.
You're developing an application that labels entities in video before storing the
files. Which API should you use?
- Video Intelligence API
Which of the following statements about continuous integration and delivery are
accurate? Select two.
- Continuous integration is a developer workflow in which developers pull from the
main branch and commit their changes into a feature branch in a source code
repository.
- Continuous delivery is a workflow that is triggered when changes are pushed to
the main branch in the repository.
How can Cloud Build and Artifact Registry help you build a continuous integration
and delivery pipeline? Select two.
- With Cloud Build, the artifacts produced by each build step are persisted in
the /workspace folder and can be used by the following build step.
- By using Artifact Registry and Cloud Build, you can create build pipelines that
are automatically triggered when you commit code to a repository.
You have an application running on virtual machines in another cloud provider. You
want to move this application into Google Cloud with as few changes as possible.
Which execution environment should you consider?
- Compute Engine
Users are encountering errors in your application. You want to view the stack trace
to determine where the error occurred. Which service would help you view the stack
trace?
- Error Reporting
You want to stream logs into Cloud Logging from third-party applications running on
Compute Engine instances. What service should you consider?
- Ops Agent
You want to set up monitoring for your mission-critical application. What signals
should you monitor in your dashboards?
- Saturation, Latency, Traffic, Errors