Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Google Cloud DevOps Engineer Professional-Cloud-DevOps-Engineer Questions and answers with Dumpstech

Exam Professional-Cloud-DevOps-Engineer Premium Access

View all detail and faqs for the Professional-Cloud-DevOps-Engineer exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 1 out of 6 pages
Viewing questions 1-10 out of questions
Questions # 1:

You use Terraform to manage an application deployed to a Google Cloud environment The application runs on instances deployed by a managed instance group The Terraform code is deployed by using aCI/CD pipeline When you change the machine type on the instance template used by the managed instance group, the pipeline fails at the terraform apply stage with the following error message

Question # 1

You need to update the instance template and minimize disruption to the application and the number of pipeline runs What should you do?

Options:

A.

Delete the managed instance group and recreate it after updating the instance template

B.

Add a new instance template update the managed instance group to use the new instance template and delete the old instance template

C.

Remove the managed instance group from the Terraform state file update the instance template and reimport the managed instance group.

D.

Set the create_bef ore_destroy meta-argument to true in the lifecycle block on the instance template

Questions # 2:

Your company processes IOT data at scale by using Pub/Sub, App Engine standard environment, and an application written in GO. You noticed that the performance inconsistently degrades at peak load. You could not reproduce this issue on your workstation. You need to continuously monitor the application in production to identify slow paths in the code. You want to minimize performance impact and management overhead. What should you do?

Options:

A.

Install a continuous profiling tool into Compute Engine. Configure the application to send profiling data to the tool.

B.

Periodically run the go tool pprof command against the application instance. Analyze the results by using flame graphs.

C.

Configure Cloud Profiler, and initialize the cloud.go@gle.com/go/profiler library in the application.

D.

Use Cloud Monitoring to assess the App Engine CPU utilization metric.

Questions # 3:

You are building the Cl/CD pipeline for an application deployed to Google Kubernetes Engine (GKE) The application is deployed by using a Kubernetes Deployment, Service, and Ingress The application team asked you to deploy the application by using the blue'green deployment methodology You need to implement the rollback actions What should you do?

Options:

A.

Run the kubectl rollout undo command

B.

Delete the new container image, and delete the running Pods

C.

Update the Kubernetes Service to point to the previous Kubernetes Deployment

D.

Scale the new Kubernetes Deployment to zero

Questions # 4:

You have a CI/CD pipeline that uses Cloud Build to build new Docker images and push them to Docker Hub. You use Git for code versioning. After making a change in the Cloud Build YAML configuration, you notice that no new artifacts are being built by the pipeline. You need to resolve the issue following Site Reliability Engineering practices. What should you do?

Options:

A.

Disable the CI pipeline and revert to manually building and pushing the artifacts.

B.

Change the CI pipeline to push the artifacts to Container Registry instead of Docker Hub.

C.

Upload the configuration YAML file to Cloud Storage and use Error Reporting to identify and fix the issue.

D.

Run a Git compare between the previous and current Cloud Build Configuration files to find and fix the bug.

Questions # 5:

You encountered a major service outage that affected all users of the service for multiple hours. After several hours of incident management, the service returned to normal, and user access was restored. You need to provide an incident summary to relevant stakeholders following the Site Reliability Engineering recommended practices. What should you do first?

Options:

A.

Call individual stakeholders lo explain what happened.

B.

Develop a post-mortem to be distributed to stakeholders.

C.

Send the Incident State Document to all the stakeholders.

D.

Require the engineer responsible to write an apology email to all stakeholders.

Questions # 6:

You are managing an application that exposes an HTTP endpoint without using a load balancer. The latency of the HTTP responses is important for the user experience. You want to understand what HTTP latencies all of your users are experiencing. You use Stackdriver Monitoring. What should you do?

Options:

A.

• In your application, create a metric with a metricKind set to DELTA and a valueType set to DOUBLE.• In Stackdriver's Metrics Explorer, use a Slacked Bar graph to visualize the metric.

B.

• In your application, create a metric with a metricKind set to CUMULATIVE and a valueType set to DOUBLE.• In Stackdriver's Metrics Explorer, use a Line graph to visualize the metric.

C.

• In your application, create a metric with a metricKind set to gauge and a valueType set to distribution.• In Stackdriver's Metrics Explorer, use a Heatmap graph to visualize the metric.

D.

• In your application, create a metric with a metricKind. set toMETRlc_KIND_UNSPECIFIEDanda valueType set to INT64.• In Stackdriver's Metrics Explorer, use a Stacked Area graph to visualize the metric.

Questions # 7:

You need to define SLOs for a high-traffic web application. Customers are currently happy with the application performance and availability. Based on current measurement, the 90th percentile Of latency is 160 ms and the 95th

percentile of latency is 300 ms over a 28-day window. What latency SLO should you publish?

Options:

A.

90th percentile - 150 ms95th percentile - 290 ms

B.

90th percentile - 160 ms95th percentile - 300 ms

C.

90th percentile - 190 ms95th percentile - 330 ms

D.

90th percentile - 300 ms95th percentile - 450 ms

Questions # 8:

You have deployed a fleet Of Compute Engine instances in Google Cloud. You need to ensure that monitoring metrics and logs for the instances are visible in Cloud Logging and Cloud Monitoring by your company's operations and cyber

security teams. You need to grant the required roles for the Compute Engine service account by using Identity and Access Management (IAM) while following the principle of least privilege. What should you do?

Options:

A.

Grant the logging.editor and monitoring.metricwriter roles to the Compute Engine service accounts.

B.

Grant the Logging. admin and monitoring . editor roles to the Compute Engine service accounts.

C.

Grant the logging. logwriter and monitoring. editor roles to the Compute Engine service accounts.

D.

Grant the logging. logWriter and monitoring. metricWriter roles to the Compute Engine service accounts.

Questions # 9:

You are managing an MLOps platform on a Google Kubernetes Engine (GKE) cluster that serves two teams:

    The Research team runs hundreds of small, daily experiments that can run as capacity allows and are highly cost-sensitive.

    The Production team must retrain the company's main language model every Friday at 10:00 PM. This job is business-critical, cannot be interrupted, and must start on time.

You need to configure the modes for Dynamic Workload Scheduler to meet each team's requirements. What should you do?

Options:

A.

Use Flex Start mode for both the Research and Production teams.

B.

Use Flex Start mode for the Research team and Calendar mode for the Production team.

C.

Use Calendar mode for both the Research and Production teams.

D.

Use Calendar mode for the Research team and Flex Start mode for the Production team.

Questions # 10:

You are managing the production deployment to a set of Google Kubernetes Engine (GKE) clusters. You want to make sure only images which are successfully built by your trusted CI/CD pipeline are deployed to production. What should you do?

Options:

A.

Enable Cloud Security Scanner on the clusters.

B.

Enable Vulnerability Analysis on the Container Registry.

C.

Set up the Kubernetes Engine clusters as private clusters.

D.

Set up the Kubernetes Engine clusters with Binary Authorization.

Viewing page 1 out of 6 pages
Viewing questions 1-10 out of questions