لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Your company has a Virtual Private Cloud (VPC) with two Dedicated Interconnect connections in two different regions: us-west1 and us-east1. Each Dedicated Interconnect connection is attached to a Cloud Router in its respective region by a VLAN attachment. You need to configure a high availability failover path. By default, all ingress traffic from the on-premises environment should flow to the VPC using the us-west1 connection. If us-west1 is unavailable, you want traffic to be rerouted to us-east1. How sho
A. se regional routing
B. se global routing
C. se regional routing
D. se global routing
عرض الإجابة
اجابة صحيحة: A
السؤال #2
You have the networking configuration shown. In the diagram Two VLAN attachments associated With two Dedicated Interconnect connections terminate on the same Cloud Router (mycloudrouter). The Interconnect connections terminate on two separate on-premises routers. You advertise the same prefixes from the Border Gateway Protocol (BOP) sessions associated with each Of the VLAN attachments. You notice an asymmetric traffic flow between the two Interconnect connections. Which of the following actions should you
A. rom the Google Cloud console, navigate to the Hybrid Connectivity select the Cloud Router, and view BGP sessions
B. rom the Cloud CLI, run gcloud compute --protect_ID router get---status mycloudrouter ----region REGION and review the results
C. rom the Google Cloud console, navigate to Cloud Logging to view VPC Flow Logs and review the results
D. rom the Cloud CLI
--region REGION and review the results.
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Your company has a security team that manages firewalls and SSL certificates. It also has a networking team that manages the networking resources. The networking team needs to be able to read firewall rules, but should not be able to create, modify, or delete them. How should you set up permissions for the networking team?
A. Assign members of the networking team the compute
B. Assign members of the networking team the compute
C. Assign members of the networking team a custom role with only the compute
D. Assign members of the networking team the compute
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Your company is planning a migration to Google Kubernetes Engine. Your application team informed you that they require a minimum of 60 Pods per node and a maximum of 100 Pods per node Which Pod per node CIDR range should you use? To determine the Pod per node CIDR range, you need to calculate how many IP addresses are required for each node, and then choose the smallest CIDR range that can accommodate that number. A CIDR range of /n means that there are 2^(32-n) IP addresses available in that range. For exa
A. 24
B. 25
C. 26
D. 28
عرض الإجابة
اجابة صحيحة: B
السؤال #5
You suspect that one of the virtual machines (VMs) in your default Virtual Private Cloud (VPC) is under a denial-of-service attack. You need to analyze the incoming traffic for the VM to understand where the traffic is coming from. What should you do?
A. nable Data Access audit logs of the VPC
B. nable VPC Flow Logs for the subnet
C. nable VPC Flow Logs for the VPC
D. nable Data Access audit logs of the subnet
عرض الإجابة
اجابة صحيحة: B
السؤال #6
Your company is planning a migration to Google Kubernetes Engine. Your application team informed you that they require a minimum of 60 Pods per node and a maximum of 100 Pods per node Which Pod per node CIDR range should you
use? The correct answer is B. /25
A. 24
B. 25
C. 26
D. 28
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: