Free Professional Cloud DevOps Engineer Exam Braindumps

You support a Node.js application running on Google Kubernetes Engine (GKE) in production. The application makes several HTTP requests to dependent applications. You want to anticipate which dependent applications might cause performance issues. What should you do?

  1. Instrument all applications with Stackdriver Profiler.
  2. Instrument all applications with Stackdriver Trace and review inter-service HTTP requests.
  3. Use Stackdriver Debugger to review the execution of logic within each application to instrument all applications.
  4. Modify the Node.js application to log HTTP request and response times to dependent applications. Use Stackdriver Logging to find dependent applications that are performing poorly.

Answer(s): B



You are deploying an application that needs to access sensitive information. You need to ensure that this information is encrypted and the risk of exposure is minimal if a breach occurs. What should you do?

  1. Store the encryption keys in Cloud Key Management Service (KMS) and rotate the keys frequently
  2. Inject the secret at the time of instance creation via an encrypted configuration management system.
  3. Integrate the application with a Single sign-on (SSO) system and do not expose secrets to the application.
  4. Leverage a continuous build pipeline that produces multiple versions of the secret for each instance of the application.

Answer(s): A



You support a web application that is hosted on Compute Engine. The application provides a booking service for thousands of users. Shortly after the release of a new feature, your monitoring dashboard shows that all users are experiencing latency at login. You want to mitigate the impact of the incident on the users of your service. What should you do first?

  1. Roll back the recent release.
  2. Review the Stackdriver monitoring.
  3. Upsize the virtual machines running the login services.
  4. Deploy a new release to see whether it fixes the problem.

Answer(s): C



You use Cloud Build to build your application. You want to reduce the build time while minimizing cost and development effort. What should you do?

  1. Use Cloud Storage to cache intermediate artifacts.
  2. Run multiple Jenkins agents to parallelize the build.
  3. Use multiple smaller build steps to minimize execution time.
  4. Use larger Cloud Build virtual machines (VMs) by using the machine-type option.

Answer(s): C



Your organization recently adopted a container-based workflow for application development. Your team develops numerous applications that are deployed continuously through an automated build pipeline to the production environment. A recent security audit alerted your team that the code pushed to production could contain vulnerabilities and that the existing tooling around virtual machine (VM) vulnerabilities no longer applies to the containerized environment. You need to ensure the security and patch level of all code running through the pipeline. What should you do?

  1. Set up Container Analysis to scan and report Common Vulnerabilities and Exposures.
  2. Configure the containers in the build pipeline to always update themselves before release.
  3. Reconfigure the existing operating system vulnerability software to exist inside the container.
  4. Implement static code analysis tooling against the Docker files used to create the containers.

Answer(s): A