00:00

QUESTION 56

- (Exam Topic 3)
An organization notices that some of their cloud expenditures are too high. What should the organization do to control costs?

Correct Answer: B

QUESTION 57

- (Exam Topic 2)
What type of cloud computing service provides raw compute, storage, and network, organized in ways that are familiar to physical data centers?

Correct Answer: C
What is Infrastructure as a service :
IaaS (infrastructure as a service) is a computing model that offers resources on-demand to businesses and individuals via the cloud.
IaaS is attractive because acquiring computing resources to run applications or store data the traditional way requires time and capital. Enterprises must purchase equipment through procurement processes that can take months. They must invest in physical spaces: typically specialized rooms with power and cooling. And after deploying the systems, enterprises need IT, professionals, to manage them.
All this is challenging to scale when demand spikes or the business grows. Enterprises risk running out of capacity or overbuilding and ending up with infrastructure that suffers from low utilization.
These challenges are why IaaS use is steadily growing. Learn more about Compute Engine, Cloud Storage, etc.

QUESTION 58

- (Exam Topic 3)
How is service availability measured in the context of cloud technology?

Correct Answer: B

QUESTION 59

- (Exam Topic 3)
A global organization is developing an application to manage payments and online bank accounts in multiple regions. Each transaction must be handled consistently in their database, and they anticipate almost unlimited growth in the amount of data stored.
Which Google Cloud product should the organization choose?

Correct Answer: B

QUESTION 60

- (Exam Topic 2)
What load balancer type is supported with Cloud Armor security policies?

Correct Answer: D
Google Cloud Armor security policies protect your application by providing Layer 7 filtering and by scrubbing incoming requests for common web attacks or other Layer 7 attributes to potentially block traffic before it reaches your load balanced backend services or backend buckets. Each security policy is made up of a set of rules that filter traffic based on conditions such as an incoming request’s IP address, IP range, region code, or request headers.
-> Google Cloud Armor security policies are available only for backend services behind an external HTTP(S) load balancer. The load balancer can be in Premium Tier or Standard Tier.
-> Google Cloud Armor security policies and IP DENY lists and ALLOW lists are available only for HTTP(S) load balancing.
Reference link- https://cloud.google.com/armor/docs/security-policy-overview