Q1. Your CTO has asked you to implement a postmortem policy on every incident for internal use. You want to define what a good postmortem is to ensure that the policy is successful at your company. What should you do? Choose 2 answers A. Ensure that all postmortems include what caused the incident, identify the person or team responsible for causing the incident. and how to prevent a future occurrence of the incident.
A.Ensure that all postmortems include what caused the incident, how the incident could have been worse, and how to prevent a future occurrence of the incident.
B. Ensure that all postmortems include the severity of the incident, how to prevent a future occurrence of the incident. and what caused the incident without naming internal system components.
C. Ensure that all postmortems include how the incident was resolved and what caused the incident without naming customer information.
D. Ensure that all postmortems include all incident participants in postmortem authoring and share postmortems as widely as possible,
Correct Answer: B, E
Q2. Your uses Jenkins running on Google Cloud VM instances for CI/CD. You need to extend the functionality to use infrastructure as code automation by using Terraform. You must ensure that the Terraform Jenkins instance is authorized to create Google Cloud resources. You want to follow Google-recommended practices- What should you do?
A.Add the auth application-default command as a step in Jenkins before running the Terraform commands.
B. Create a dedicated service account for the Terraform instance. Download and copy the secret key value to the GOOGLE environment variable on the Jenkins server.
C. Confirm that the Jenkins VM instance has an attached service account with the appropriate Identity and Access Management (IAM) permissions.
D. use the Terraform module so that Secret Manager can retrieve credentials.
Correct Answer: C
Q3. You are deploying an application to Cloud Run. The application requires a password to start. Your organization requires that all passwords are rotated every 24 hours, and your application must have the latest password. You need to deploy the application with no downtime. What should you do?
A.Store the password in Secret Manager and send the secret to the application by using environment variables.
B. Store the password in Secret Manager and mount the secret as a volume within the application.
C. Use Cloud Build to add your password into the application container at build time. Ensure that Artifact Registry is secured from public access.
D. Store the password directly in the code. Use Cloud Build to rebuild and deploy the application each time the password changes.
Correct Answer: B
Q4. You deployed an application into a large Standard Google Kubernetes Engine (GKE) cluster. The application is stateless and multiple pods run at the same time. Your application receives inconsistent traffic. You need to ensure that the user experience remains consistent regardless of changes in traffic. and that the resource usage of the cluster is optimized. What should you do?
A.Configure a cron job to scale the deployment on a schedule.
B. Configure a Horizontal Pod Autoscaler.
C. Configure a Vertical Pod Autoscaler.
D. Configure cluster autoscaling on the node pool.
Correct Answer: B
$ 39
jamesale.jhoan –
The practice tests are excellent and provide a clear idea of what to expect on the actual exam. These are incredbly useful for preparation & I’m 100% satisfied.