How should you perform reads from Cloud Spanner for this application?
Your application takes an input from a user and publishes it to the user's contacts. This input is stored in a table in Cloud Spanner. Your application is more sensitive to latency and less sensitive to consistency. How should you perform reads from Cloud Spanner for this application?A . Perform...
Which command should you use?
You want to upload files from an on-premises virtual machine to Google Cloud Storage as part of a data migration. These files will be consumed by Cloud DataProc Hadoop cluster in a GCP environment. Which command should you use?A . gsutil cp [LOCAL_OBJECT] gs://[DESTINATION_BUCKET_NAME]/B . gcloud cp [LOCAL_OBJECT] gs://[DESTINATION_BUCKET_NAME]/C ....
Which command should you run?
Your data is stored in Cloud Storage buckets. Fellow developers have reported that data downloaded from Cloud Storage is resulting in slow API performance. You want to research the issue to provide details to the GCP support team. Which command should you run?A . gsutil test Co output.json gs://my-bucketB ....
After installing the Stackdriver Logging Agent, what should you do first?
You want to use the Stackdriver Logging Agent to send an application's log file to Stackdriver from a Compute Engine virtual machine instance. After installing the Stackdriver Logging Agent, what should you do first?A . Enable the Error Reporting API on the project.B . Grant the instance full access to...
Which data structure should you use?
You are parsing a log file that contains three columns: a timestamp, an account number (a string), and a transaction amount (a number). You want to calculate the sum of all transaction amounts for each unique account number efficiently. Which data structure should you use?A . A linked listB ....
What should they do?
For this question, refer to the HipLocal case study. A recent security audit discovers that HipLocal’s database credentials for their Compute Engine-hosted MySQL databases are stored in plain text on persistent disks. HipLocal needs to reduce the risk of these credentials being stolen. What should they do?A . Create a...
How should HipLocal redesign their architecture to ensure that the application scales to support a large increase in users?
For this question, refer to the HipLocal case study. How should HipLocal redesign their architecture to ensure that the application scales to support a large increase in users?A . Use Google Kubernetes Engine (GKE) to run the application as a microservice. Run the MySQL database on a dedicated GKE node.B...
What should you do next?
Your application is running on Compute Engine and is showing sustained failures for a small number of requests. You have narrowed the cause down to a single Compute Engine instance, but the instance is unresponsive to SSH. What should you do next?A . Reboot the machine.B . Enable and check...
What should you do?
Your application is built as a custom machine image. You have multiple unique deployments of the machine image. Each deployment is a separate managed instance group with its own template. Each deployment requires a unique set of configuration values. You want to provide these unique values to each deployment but...
What should you do?
You are creating a Google Kubernetes Engine (GKE) cluster and run this command: The command fails with the error: You want to resolve the issue. What should you do? A. Request additional GKE quota is the GCP Console. B. Request additional Compute Engine quota in the GCP Console. C. Open...