Which two steps should you take?
Your company just completed the acquisition of Altostrat (a current GCP customer). Each company has a separate organization in GCP and has implemented a custom DNS solution. Each organization will retain its current domain and host names until after a full transition and architectural review is done in one year....
Which command should you use?
You are migrating to Cloud DNS and want to import your BIND zone file. Which command should you use?A . - gcloud dns record-sets import ZONE_FILE --zone MANAGED_ZONEB . - gcloud dns record-sets import ZONE_FILE --replace-origin-ns --zoneMANAGED_ZONEC . - gcloud dns record-sets import ZONE_FILE --zone-file-format --zoneMANAGED_ZONED . - gcloud dns...
How should you design this topology?
Your end users are located in close proximity to us-east1 and europe-west1. Their workloads need to communicate with each other. You want to minimize cost and increase network efficiency. How should you design this topology?A . Create 2 VPCs, each with their own regions and individual subnets. Create 2 VPN...
Which two actions can accomplish this?
You have ordered Dedicated Interconnect in the GCP Console and need to give the Letter of Authorization/ Connecting Facility Assignment (LOA-CFA) to your cross-connect provider to complete the physical connection. Which two actions can accomplish this? (Choose two.)A . Open a Cloud Support ticket under the Cloud Interconnect category.B ....
What is the most likely cause of this problem?
Your on-premises data center has 2 routers connected to your Google Cloud environment through a VPN on each router. All applications are working correctly; however, all of the traffic is passing across a single VPN instead of being load-balanced across the 2 connections as desired. During troubleshooting you find: -...
What should you do?
All the instances in your project are configured with the custom metadata enable-osloginvalue set to FALSE and to block project-wide SSH keys. None of the instances are set with any SSH key, and no project-wide SSH keys have been configured. Firewall rules are set up to allow SSH sessions from...
How should you design the topology?
Your organization is deploying a single project for 3 separate departments. Two of these departments require network connectivity between each other, but the third department should remain in isolation. Your design should create separate network administrative domains between these departments. You want to minimize operational overhead. How should you design...
How should you configure the Distribution VPC?
You created a VPC network named Retail in auto mode. You want to create a VPC network named Distribution and peer it with the Retail VPC. How should you configure the Distribution VPC?A . Create the Distribution VPC in auto mode. Peer both the VPCs via network peering.B . Create...
Which session affinity should you choose?
You have deployed a new internal application that provides HTTP and TFTP services to on-premises hosts. You want to be able to distribute traffic across multiple Compute Engine instances, but need to ensure that clients are sticky to a particular instance across both services. Which session affinity should you choose?A...
What should you do?
You need to restrict access to your Google Cloud load-balanced application so that only specific IP addresses can connect. What should you do?A . Create a secure perimeter using the Access Context Manager feature of VPC Service Controls and restrict access to the source IP range of the allowed clients...