Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
Cloud Digital Leader
Free trial
Verified
Question 51
Which policy helps Google Cloud keep customer data private?
- A: Google tests the service availability of customer applications.
- B: Google does not use customer data for advertising purposes.
- C: Google migrates customer data to an offline server when a threat is detected.
- D: Google does not allow customers to change encryption keys.
Question 52
A cloud-native organization is not meeting their service level objective (SLO) but has not exhausted their error budget.
What should the organization prioritize?
- A: Innovation to improve user experience
- B: Hardware reliability to improve availability
- C: Stability to avoid prolonged user downtime
- D: Speed to release new features
Question 53
An organization is moving away from an on-premises infrastructure. Instead, they want to create, access, and share information virtually in the cloud.
What should the organization consider?
- A: Built-in security when moving their data to the cloud
- B: Replacing their perimeter security with data encryption keys
- C: Optimizing cost-management with a capital expenditure model
- D: Increased hardware capacity when moving their data to the cloud
Question 54
An organization has an on-premises IT infrastructure. Their customer-facing application repeatedly fails during peak usage.
What could be causing this issue?
- A: A serverless compute function struggles to scale.
- B: The application contains unclean data.
- C: They don't have enough servers to meet the demand.
- D: The application is only configurable on-premises.
Question 55
What is artificial intelligence?
- A: Any system that ingests data in real time
- B: Any system that automatically structures data
- C: Any system capable of a task that requires smart analytics to generate predictions
- D: Any system capable of a task that normally requires human cognition
Question 56
What does Cloud Logging help an organization do?
- A: Analyze live source code and log code updates.
- B: Deploy infrastructure as code.
- C: Analyze logs and accelerate application troubleshooting.
- D: Manage storage of custom VM images.
Question 57
Your organization uses Active Directory to authenticate users. Users' Google account access must be removed when their Active Directory account is terminated.
How should your organization meet this requirement?
- A: Configure two-factor authentication in the Google domain
- B: Remove the Google account from all IAM policies
- C: Configure BeyondCorp and Identity-Aware Proxy in the Google domain
- D: Configure single sign-on in the Google domain
Question 58
How is privacy defined in the context of cloud technology?
- A: Restrictions on data access and sharing
- B: Procedures to authenticate user identity
- C: Susceptibility to data breaches and cyber attacks
- D: Compliance with regulatory standards
That’s the end of your free questions
You’ve reached the preview limit for Cloud Digital LeaderConsider upgrading to gain full access!
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!