Your company has recently acquired three growing startups in three different countries. You want to reduce overhead in infrastructure management and keep your costs low without sacrificing security and quality of service to your customers. How should you meet these requirements?
A. Host all your subsidiaries' services on-premises together with your existing services.
B. Host all your subsidiaries' services together with your existing services on the public cloud.
C. Build a homogenous infrastructure at each subsidiary, and invest in training their engineers.
D. Build a homogenous infrastructure at each subsidiary, and invest in hiring more engineers.
You want to build an application that will allow customers to register and login. It would be great to have the ability to secure it with multi-factor authentication and the ability to reset credentials. As a small startup, you want to build the main application as quickly as possible and have minimum overhead. Which might be a suitable option for you on Google Cloud?
A. Since identity and credentials should be secure and private, do not trust other ser-vice providers.
B. Cloud Identity
C. Google Workspace
D. Cloud Identity Platform
A bank wants to track the success of their existing ATM network, which has been modernized with APIs to instantly notify customers about their transfers. What is the benefit of using Apigee to achieve this goal?
A. It has dashboards that chart dimensions and metrics to report on APIs.
B. It replicates banking APIs to create new business value.
C. It measures and tracks their total cost of ownership (TCO).
D. It allows developers to connect the banking APIs with the public cloud.
"With cloud messaging you can Customize and deliver messages accordingly to the predetermined time in the user's local time zone." Comment on the above statement.
A. This statement is undefined.
B. The above statement is partially true.
C. The above statement is completely false.
D. The above statement is completely true.
Your customer is moving from AWS to Google Cloud. Data also needs to be moved. There is about 50TB of data. On AWS, the data resides in an S3 bucket. It is going to be moved to Cloud Storage. Data is also being continuously generated on S3 prior to the cutover. It is preferable that this is also periodically transferred. What is the best way to move the data?
A. Use the gsutil command-line option
B. Use the Google Cloud console to drag and drop the files easily
C. Use the Storage Transfer Service
D. Use a Transfer Appliance
Your customer has a reporting tool that is only occasionally used by the leadership team. Usage of it is frequent-once a week, once a month, or once the quarter. They want to run this application in a cost-effective manner. What are the compute options available on Google Cloud which would be suitable? (Choose Two answer)
A. Cloud Run
B. Cloud App Engine Standard
C. Compute Engine
D. Kubernetes Engine
How would a global organization benefit from managing their data with Cloud Spanner?
A. Cloud Spanner is optimized for cold storage
B. Cloud Spanner replicates data across regions in real time
C. Cloud Spanner is optimized to ingest unstructured data
D. Cloud Spanner visualizes and analyzes data in real time
Which policy helps Google Cloud keep customer data private?
A. Google tests the service availability of customer applications.
B. Google does not use customer data for advertising purposes.
C. Google migrates customer data to an offline server when a threat is detected.
D. Google does not allow customers to change encryption keys.
An organization has servers running mission-critical workloads on-premises around the world. They want to modernize their infrastructure with a multi-cloud architecture. What benefit could the organization experience?
A. Ability to disable regional network connectivity during cyber attacks
B. Ability to keep backups of their data on-premises in case of failure
C. Full management access to their regional infrastructure
D. Reduced likelihood of system failure during high demand events
An organization is evaluating its defenses against cyber security threats and is concerned about the risks of social engineering by cyber criminals. How might these attacks happen?
A. SQL injection attacks
B. Physical damage to hardware
C. Phishing emails
D. Distributed denial-of-service attacks