Free Google Cloud Architect Professional Exam Braindumps (page: 6)

Page 5 of 68
View Related Case Study

Your agricultural division is experimenting with fully autonomous vehicles. You want your architecture to promote strong security during vehicle operation.
Which two architecture should you consider?
Choose 2 answers:

  1. Treat every micro service call between modules on the vehicle as untrusted.
  2. Require IPv6 for connectivity to ensure a secure address space.
  3. Use a trusted platform module (TPM) and verify firmware and binaries on boot.
  4. Use a functional programming language to isolate code execution cycles.
  5. Use multiple connectivity subsystems for redundancy.
  6. Enclose the vehicle's drive electronics in a Faraday cage to isolate chips.

Answer(s): A,C

Explanation:



View Related Case Study

For this question, refer to the JencoMart case study.

The JencoMart security team requires that all Google Cloud Platform infrastructure is deployed using a least privilege model with separation of duties for administration between production and development resources.
What Google domain and project structure should you recommend?

  1. Create two G Suite accounts to manage users: one for development/test/staging and one for production. Each account should contain one project for every application.
  2. Create two G Suite accounts to manage users: one with a single project for all development applications and one with a single project for all production applications.
  3. Create a single G Suite account to manage users with each stage of each application in its own project.
  4. Create a single G Suite account to manage users with one project for the development/test/staging environment and one project for the production environment.

Answer(s): D

Explanation:

Note: The principle of least privilege and separation of duties are concepts that, although semantically different, are intrinsically related from the standpoint of security. The intent behind both is to prevent people from having higher privilege levels than they actually need

Principle of Least Privilege: Users should only have the least amount of privileges required to perform their job and no more. This reduces authorization exploitation by limiting access to resources such as targets, jobs, or monitoring templates for which they are not authorized.

Separation of Duties: Beyond limiting user privilege level, you also limit user duties, or the specific jobs they can perform. No user should be given responsibility for more than one related function. This limits the ability of a user to perform a malicious action and then cover up that action.


Reference:

https://cloud.google.com/kms/docs/separation-of-duties



View Related Case Study

For this question, refer to the JencoMart case study.

The migration of JencoMart's application to Google Cloud Platform (GCP) is progressing too slowly. The infrastructure is shown in the diagram. You want to maximize throughput.
What are three potential bottlenecks? (Choose 3 answers.)

  1. A single VPN tunnel, which limits throughput
  2. A tier of Google Cloud Storage that is not suited for this task
  3. A copy command that is not suited to operate over long distances
  4. Fewer virtual machines (VMs) in GCP than on-premises machines
  5. A separate storage layer outside the VMs, which is not suited for this task
  6. Complicated internet connectivity between the on-premises infrastructure and GCP

Answer(s): A,D,F



View Related Case Study

For this question, refer to the JencoMart case study

A few days after JencoMart migrates the user credentials database to Google Cloud Platform and shuts down the old server, the new database server stops responding to SSH connections. It is still serving database requests to the application servers correctly.
What three steps should you take to diagnose the problem? Choose 3 answers

  1. Delete the virtual machine (VM) and disks and create a new one.
  2. Delete the instance, attach the disk to a new VM, and investigate.
  3. Take a snapshot of the disk and connect to a new machine to investigate.
  4. Check inbound firewall rules for the network the machine is connected to.
  5. Connect the machine to another network with very simple firewall rules and investigate.
  6. Print the Serial Console output for the instance for troubleshooting, activate the interactive console, and investigate.

Answer(s): C,D,F

Explanation:

https://cloud.google.com/compute/docs/troubleshooting/troubleshooting-ssh

D: Handling "Unable to connect on port 22" error message Possible causes include:

There is no firewall rule allowing SSH access on the port. SSH access on port 22 is enabled on all Compute Engine instances by default. If you have disabled access, SSH from the Browser will not work. If you run sshd on a port other than 22, you need to enable the access to that port with a custom firewall rule.
The firewall rule allowing SSH access is enabled, but is not configured to allow connections from GCP Console services. Source IP addresses for browser-based SSH sessions are dynamically allocated by GCP Console and can vary from session to session.


Reference:

https://cloud.google.com/compute/docs/ssh-in-browser https://cloud.google.com/compute/docs/ssh-in-browser






Post your Comments and Discuss Google Google Cloud Architect Professional exam with other Community members:

Google Cloud Architect Professional Discussions & Posts