In Google Cloud, what does "VPC peering" refer to?

  • Establishing a direct connection between two VPC networks to allow communication between instances in different networks
  • Connecting a VPC network to an on-premises data center using a VPN
  • Configuring firewall rules to control traffic within a VPC network
  • Allocating IP addresses to instances within a VPC network
Understanding VPC peering is crucial for beginners to comprehend how to facilitate communication between applications and services deployed in separate VPC networks within Google Cloud, enabling them to design scalable and interconnected cloud architectures.

Which Google Cloud service does Cloud Deployment Manager integrate with for resource provisioning and management?

  • Google Cloud Storage
  • Google Cloud Functions
  • Google Cloud Monitoring
  • Google Cloud Deployment Manager
Cloud Deployment Manager integrates with Google Cloud Storage for storing configuration files and templates, enabling centralized and version-controlled management of infrastructure configurations.

Scenario: A company wants to ensure that only authorized services can access its sensitive data stored in Google Cloud Storage. Which Google Cloud service should they use?

  • VPC Service Controls
  • Cloud Identity and Access Management (IAM)
  • Google Cloud Armor
  • Cloud Data Loss Prevention (DLP)
Understanding the capabilities of different Google Cloud services is crucial for implementing effective security measures, especially when dealing with sensitive data. VPC Service Controls provide granular control over access to resources, ensuring only authorized services can interact with sensitive data stored in Google Cloud Storage.

_______ in Stackdriver Trace helps in visualizing performance bottlenecks.

  • Heatmaps
  • Histograms
  • Line Charts
  • Pie Charts
Heatmaps in Stackdriver Trace offer a powerful visualization tool to pinpoint performance bottlenecks by highlighting areas of high latency.

The perimeter bridge in VPC Service Controls controls communication between _______ and data resources.

  • users
  • networks
  • applications
  • instances
Understanding the role of the perimeter bridge in controlling communication between users and data resources helps ensure that access to sensitive data is restricted to authorized entities within the VPC.

Scenario: A developer needs to deploy a scalable application that runs on multiple virtual machines. Which Google Cloud service would be the most suitable for this requirement, considering ease of management and scalability?

  • Google Cloud Functions
  • Google App Engine
  • Google Compute Engine
  • Google Cloud Run
Google App Engine abstracts the underlying infrastructure and handles the scaling automatically, allowing developers to focus on writing code without worrying about VM management.

In what scenarios would you choose Cloud Storage Multi-Regional over Regional or Nearline storage classes?

  • High Availability and Global Access
  • Cost Optimization for Infrequently Accessed Data
  • Regulatory Compliance and Data Sovereignty
  • Small-scale Projects with Limited Budget
Understanding the appropriate use cases for different Google Cloud Storage classes helps optimize storage costs and performance based on specific project requirements and constraints.

What is the difference between IAM policies and IAM roles in Google Cloud?

  • IAM Policies define permissions for specific resources or groups of resources, specifying who has what type of access.
  • IAM Roles are a collection of permissions that can be assigned to users, groups, or service accounts, defining their level of access within a project or across projects.
  • IAM Conditions provide additional constraints that can be applied to IAM policies to further control access based on various factors such as time, IP address, or resource attributes.
  • IAM Permissions are individual actions that can be granted to users, groups, or service accounts, specifying what they are allowed to do within a project or across projects.
Understanding the distinction between IAM policies and roles is essential for designing effective access control strategies in Google Cloud Platform. Knowing when to use policies to define fine-grained permissions and when to use roles to assign predefined sets of permissions is key to managing access efficiently.

Scenario: A multinational corporation with offices in different regions wants to ensure data redundancy and disaster recovery for its critical business files. How can Google Cloud Storage help them achieve this objective?

  • Multi-Regional Storage
  • Regional Storage
  • Nearline Storage
  • Coldline Storage
Google Cloud Storage's Multi-Regional Storage offers built-in redundancy and disaster recovery capabilities by automatically replicating data across multiple geographic locations. This ensures that critical business files remain available and protected against regional outages or disasters, meeting the requirements of multinational corporations with offices in different regions.

What authentication mechanism is commonly used to access Cloud Billing APIs securely?

  • OAuth 2.0
  • API Key
  • Basic Authentication
  • SAML
OAuth 2.0 provides a robust mechanism for authentication and authorization, ensuring secure access to Google Cloud Billing APIs.

Scenario: An organization wants to ensure that their developers have consistent development environments across different machines and locations. Which Google Cloud service can help achieve this goal?

  • Google Cloud Build
  • Google Cloud Functions
  • Google Kubernetes Engine
  • Google Cloud Workstations
Google Cloud Workstations is designed to offer managed, consistent development environments, making it the ideal choice for this scenario.

Virtual machines allow users to run multiple _______ systems on a single physical server.

  • Operating
  • File
  • Network
  • Database
Understanding that virtual machines enable the concurrent operation of multiple operating systems on a single physical server is key to leveraging their benefits for workload isolation and resource optimization.