home / exams / Google / gcp-ace / Practice Test 1
gcp-ace Google

Google Associate Cloud Engineer - Practice Test 1

Question #31
Networking

You are managing a custom mode VPC network in Google Cloud. A specific subnet, configured with the IP range 10.0.0.0/20, is experiencing a shortage of primary internal IP addresses for its virtual machines. To address this, you need to expand the available IP addresses for these VMs without disrupting existing configurations unnecessarily. What is the most appropriate action to take?

A. Add a secondary IP range 10.1.0.0/20 to the subnet.
B. Change the subnet IP range from 10.0.0.0/20 to 10.0.0.0/18.
C. Change the subnet IP range from 10.0.0.0/20 to 10.0.0.0/22.
D. Convert the subnet IP range from IPv4 to IPv6.
Question #32
IAM & Security

Your organization utilizes a central Google Cloud project for numerous services, alongside dedicated projects for development and testing. The DevOps team requires access to all production services to fulfill their responsibilities. You need to ensure that future Google Cloud product updates do not inadvertently expand their permissions. Following Google's recommended practices, what action should you take?

A. Grant all members of the DevOps team the Project Editor role at the organization level.
B. Create a custom role that includes only the necessary permissions. Assign this custom role to the DevOps team on the production project.
C. Grant all members of the DevOps team the Project Editor role on the production project.
D. Create a custom role that includes only the necessary permissions. Assign this custom role to the DevOps team at the organization level.
Question #33
Security

You are developing a multi-tenant application on Google Kubernetes Engine (GKE) where each customer's Pod runs potentially untrusted, arbitrary code. To enhance security and maximize isolation between these customer Pods within a single GKE cluster, what is the most effective approach?

A. Implement Binary Authorization to whitelist only approved container images used by your customers' Pods.
B. Create a GKE node pool configured with a sandbox type set to gvisor, and include runtimeClassName: gvisor in the specification of your customers' Pods.
C. Utilize the Container Analysis API to proactively detect vulnerabilities within the container images deployed by your customers' Pods.
D. Configure your GKE nodes to use the cos_containerd image and add a nodeSelector with cloud.google.com/gke-os-distribution: cos_containerd to your customers' Pod specifications.
Question #34
Networking

You have deployed an LDAP server on a Google Compute Engine virtual machine (VM) that uses TLS over UDP port 636 for client communication. You need to ensure that external clients can successfully connect to this LDAP server. What is the most appropriate action to take?

A. Add the network tag `allow-udp-636` directly to the VM instance running the LDAP server.
B. Assign a network tag of your choice to the VM instance. Then, create an ingress firewall rule that permits UDP traffic on port 636 for that specific network tag.
C. Create a custom route named `allow-udp-636` and configure its next hop to be the VM instance hosting the LDAP server.
D. Assign a network tag of your choice to the VM instance. Then, create an egress firewall rule that permits UDP traffic on port 636 for that specific network tag.
Question #35
Identity & Access Management

Your organization utilizes a single sign-on (SSO) identity provider that supports Security Assertion Markup Language (SAML) integration. Your user accounts are managed within Cloud Identity. You need to configure Cloud Identity so that users authenticate using your organization's existing SSO provider. What is the correct approach?

A. In Cloud Identity, configure SSO with Google as the identity provider to access custom SAML applications.
B. In Cloud Identity, set up SSO with a third-party identity provider, where Google acts as the service provider.
C. Obtain OAuth 2.0 credentials, configure the user consent screen, and set up OAuth 2.0 for Mobile & Desktop Apps.
D. Obtain OAuth 2.0 credentials, configure the user consent screen, and set up OAuth 2.0 for Web Server Applications.
Back to gcp-ace 50 questions - page 7 of 10