home / exams / Google / gcp-ace / Practice Test 3
gcp-ace Google

Google Associate Cloud Engineer - Practice Test 3

Question #46
Networking

Your global application receives SSL-encrypted TCP traffic on port 443 and serves clients worldwide. To minimize latency for these clients, which Google Cloud load balancing option should you implement?

A. HTTPS Load Balancer
B. SSL Proxy Load Balancer
C. Network Load Balancer
D. Internal TCP/UDP Load Balancer with a firewall rule allowing ingress from 0.0.0.0/0
Question #47
Networking & Security

You have a Google Cloud project with a default VPC containing two subnets: `subnet-a` and `subnet-b`. Your database instances are deployed in `subnet-a`, and your application servers are in `subnet-b`. You need to implement a firewall rule to permit only database-specific traffic originating from the application servers to reach the database instances. Which configuration should you implement?

A. Create service accounts `sa-app` and `sa-db`. Associate `sa-app` with the application servers and `sa-db` with the database instances. Create an ingress firewall rule allowing traffic from source service account `sa-app` to target service account `sa-db`.
B. Create network tags `app-server` and `db-server`. Apply the `app-server` tag to the application servers and the `db-server` tag to the database instances. Create an egress firewall rule allowing traffic from source network tag `app-server` to target network tag `db-server`.
C. Create a service account `sa-app` and a network tag `db-server`. Associate `sa-app` with the application servers and apply the `db-server` tag to the database instances. Create an ingress firewall rule allowing traffic from source VPC IP addresses to target the `subnet-a` IP addresses.
D. Create a network tag `app-server` and a service account `sa-db`. Apply the `app-server` tag to the application servers and associate `sa-db` with the database instances. Create an egress firewall rule allowing traffic from source network tag `app-server` to target service account `sa-db`.
Question #48
Security

Your team manages several Linux virtual machines on Google Cloud. You need to implement a secure and cost-effective method for your team to SSH into these instances. Which approach should you take?

A. Attach a public IP address to each instance and configure firewall rules to allow SSH connections from the internet on port 22.
B. Utilize the `gcloud compute ssh` command with the `--tunnel-through-iap` flag, ensuring ingress traffic from the IP range 35.235.240.0/20 is allowed on port 22.
C. Implement a third-party remote access solution to manage SSH connections to the instances.
D. Deploy a bastion host with a public IP address and configure it to act as an SSH jump server to access the internal instances.
Question #49
Compute

A team of data scientists occasionally requires a Google Kubernetes Engine (GKE) cluster for long-running, non-restartable jobs that necessitate GPUs. To minimize costs while meeting these requirements, what is the most appropriate solution?

A. Enable node auto-provisioning on the GKE cluster.
B. Create a node pool of instances with GPUs, and enable autoscaling on this node pool with a minimum size of 1.
C. Create a VerticalPodAutoscaler for those workloads.
D. Create a node pool with preemptible VMs and GPUs attached to those VMs.
Question #50
Networking

A VM instance is deployed within a Virtual Private Cloud (VPC) using single-stack subnets. To enable other services within the same VPC to reliably communicate with this VM, a fixed IP address is required. You need to achieve this while adhering to Google's recommended practices and minimizing costs. What is the most appropriate action?

A. Promote the existing IP address of the VM to become a static external IP address.
B. Promote the existing IP address of the VM to become a static internal IP address.
C. Reserve a new static external IPv6 address and assign it to the VM.
D. Reserve a new static external IP address and assign it to the VM.
Back to gcp-ace 50 questions - page 10 of 10