Practice Free Cloud-Digital-Leader Exam Online Questions
An organization supplies electric car chargers in a nationwide network. They store customer and charging data in BigQuery. They want to efficiently upgrade and maintain their network to reduce waste and achieve their sustainability goals.
How can Google Cloud services help the organization?
- A . Secure data access by using Identity and Access Management.
- B . Move data from BigQuery to Cloud Storage to reduce storage costs.
- C . Provide access to third-party developers by creating an API using Apigee.
- D . Create a model in BiaQuery to Dredict future maintenance schedules.
An organization has migrated several large databases to the cloud. It wants to increase the value of its data, improve cost controls and strengthen regulatory compliance.
What should the organization do?
- A . Delete data stored for over a year.
- B . Establish an effective data governance program.
- C . Export relational data to modern NoSQL databases.
- D . Create monthly reports on data access and uses.
What is the difference between Standard and Coldline storage?
- A . Coldline storage is for data for which a slow transfer rate is acceptable.
- B . Standard and Coldline storage have different durability guarantees.
- C . Standard and Coldline storage use different APIs.
- D . Coldline storage is for infrequently accessed data.
D
Explanation:
Reference: https://www.msp360.com/resources/blog/google-cloud-nearline-storage-vs-coldline-vs-standard/
Google Cloud Coldline is a new cold-tier storage for archival data with access frequency of less than once per year. Unlike other cold storage options, Nearline has no delays prior to data access, so now it is the leading solution among competitors.
What is a defining function of streaming analytics?
- A . Processing data records in batches
- B . Processing data records continuously
- C . Accessing data with high latency
- D . Processing a one-off data backfill
Which Google Cloud product or feature makes specific recommendations based on security risks and compliance violations?
- A . Google Cloud firewalls
- B . Security Command Center
- C . Cloud Deployment Manager
- D . Google Cloud Armor
B
Explanation:
Reference: https://cloud.google.com/security-command-center
Security Command Center is Security and risk management platform for Google Cloud.
Reference link- https://cloud.google.com/security-command-center
Which Google Cloud product can report on and maintain compliance on your entire Google Cloud organization to cover multiple projects?
- A . Cloud Logging
- B . Identity and Access Management
- C . Google Cloud Armor
- D . Security Command Center
D
Explanation:
Security Command Center is a centralized security and risk management platform for your Google Cloud resources.
It is a single tool that offers a variety of security features including:
Which of the following NIST Cloud characteristics uses the business model of shared re-sources in a cloud environment?
- A . Elasticity
- B . Availability
- C . Broad Network Access
- D . Multi-Tenancy
D
Explanation:
In cloud computing, multitenancy means that multiple customers of a cloud vendor are using the same computing resources. Even though they share resources, cloud customers aren’t aware of each other, and their data is kept totally separate. Mul-titenancy is a crucial component of cloud computing; without it, cloud services would be far less practical. Multitenant architecture is a feature in many types of public cloud com-puting, including IaaS, PaaS, SaaS, containers, and serverless computing.
You are working with a user to set up an application in a new VPC behind a firewall and it is noticed that the user is concerned about data egress. Therefore, to provide assistance you want to con-figure the fewest open egress ports.
Which of the following statement is correct?
- A . Set up a high-priority (1000) rule that blocks all egress and a low-priority (65534) rule that allows only the appropriate ports.
- B . Set up a low-priority (65534) rule that blocks all egress and a high-priority rule (1000) that allows only the appropriate ports.
- C . Set up a high-priority (1000) rule to allow the appropriate ports.
- D . Set up a high-priority (1000) rule that pairs both ingress and egress ports.
B
Explanation:
Implied rules Every VPC network has two implied firewall rules.
These rules exist, but are not shown in the Cloud Console:
Implied allow egress rule. An egress rule whose action is allow, destination is 0.0.0.0/0, and priority is the lowest possible (65535) lets any instance send traffic to any destination, except for traffic blocked by Google Cloud. A higher priority firewall rule may restrict outbound access.
Internet access is allowed if no other firewall rules deny outbound traffic and if the instance has an external IP address or uses a Cloud NAT instance. For more information, see Internet access requirements.
Reference link- https://cloud.google.com/vpc/docs/firewalls
Compute Engine provides machine type recommendations to help you optimize the re-source utilization of your virtual machine (VM) instances.
What is this capability called?
- A . App Engine
- B . None of the above
- C . Rightsizing Recommendations
- D . Recommendation Engine
C
Explanation:
Compute Engine provides machine type recommendations to help you optimize the resource utilization of your virtual machine (VM) instances. These recommendations are generated automatically based on system metrics gathered by the Cloud Monitoring service over the previous 8 days. Use these recommendations to resize your instance’s machine type to use the instance’s resources more efficiently. This feature is also known as rightsizing recommendations
Reference link- https://cloud.google.com/compute/docs/instances/apply-machine-type-recommendations-for-instances
An organization operates their entire IT infrastructure from Google Cloud.
What should they do to prepare for data breaches?
- A . Reduce reliance on multi-factor authentication
- B . Data security is Google’s responsibility, so preparation is minimal
- C . Create an incident plan to mitigate impacts
- D . Strengthen their data center perimeter security