New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Google Associate Cloud Engineer Exam - Topic 4 Question 65 Discussion

Actual exam question for Google's Associate Cloud Engineer exam
Question #: 65
Topic #: 4
[All Associate Cloud Engineer Questions]

You are deploying an application on Google Cloud that requires a relational database for storage. To satisfy your company's security policies, your application must connect to your database through an encrypted and authenticated connection that requires minimal management and integrates with Identity and Access Management (IAM). What should you do?

Show Suggested Answer Hide Answer
Suggested Answer: D

as the instances (normal or preemptible) would be terminated and relaunched if the health check fails either due to application not configured properly or the instances firewall do not allow health check to happen.

GCP provides health check systems that connect to virtual machine (VM) instances on a configurable, periodic basis. Each connection attempt is called a probe. GCP records the success or failure of each probe.

Health checks and load balancers work together. Based on a configurable number of sequential successful or failed probes, GCP computes an overall health state for each VM in the load balancer. VMs that respond successfully for the configured number of times are considered healthy. VMs that fail to respond successfully for a separate number of times are unhealthy.

GCP uses the overall health state of each VM to determine its eligibility for receiving new requests. In addition to being able to configure probe frequency and health state thresholds, you can configure the criteria that define a successful probe.


Contribute your Thoughts:

0/2000 characters
Kayleigh
4 months ago
A doesn't meet the encryption requirement fully.
upvoted 0 times
...
Lakeesha
4 months ago
I disagree, D seems too basic for security needs.
upvoted 0 times
...
Thea
4 months ago
Wait, can we really use IAM for database auth? Sounds cool!
upvoted 0 times
...
Bette
4 months ago
I think C is more secure with SSL/TLS.
upvoted 0 times
...
Denise
4 months ago
Option B is the best choice for IAM integration.
upvoted 0 times
...
Dorothy
5 months ago
I remember practicing a similar question, and I think it emphasized the need for minimal management. That makes me think option B is the best fit.
upvoted 0 times
...
Sue
5 months ago
I feel like the Cloud SQL Auth Proxy is a key part of this question, which makes me lean towards option B or D, but I can't recall the details.
upvoted 0 times
...
Paz
5 months ago
I'm not entirely sure, but I remember something about SSL/TLS being important for secure connections. Maybe option C?
upvoted 0 times
...
Milly
5 months ago
I think we discussed using IAM for authentication in our last study session, so option B might be the right choice.
upvoted 0 times
...
Natalie
5 months ago
Ah, this is a tricky one. I'm not super familiar with all the different authentication methods, so I'll have to eliminate the ones I'm less certain about. I think TACACS and S-RPC are less likely to be the right answer.
upvoted 0 times
...
Kattie
5 months ago
Hmm, I'm a bit unsure about this one. Let me think it through again...
upvoted 0 times
...
Inocencia
5 months ago
Okay, let's think this through step-by-step. The initial bandwidth is 10Gbps, and the RSVP configuration limits the reservable bandwidth to 30% of that. So the reservable bandwidth is 0.3 * 10Gbps = 3Gbps. The LSP is reserving 1Gbps, so the unreserved bandwidth is 3Gbps - 1Gbps = 2Gbps. The answer must be D.
upvoted 0 times
...
Elke
9 months ago
Haha, I bet the correct answer is C. It's like the Goldilocks of options - not too hot, not too cold, just right!
upvoted 0 times
...
Margurite
9 months ago
D is a bit too basic for this scenario. You need more security than just a database user and password.
upvoted 0 times
...
Odelia
10 months ago
I'm torn between B and C. Both use IAM authentication, but C provides the added layer of SSL/TLS encryption. Hmm, tough choice.
upvoted 0 times
Taryn
8 months ago
User1: Agreed. It's better to have that added protection for our database.
upvoted 0 times
...
Jeff
8 months ago
User2: Yeah, that extra layer of security with SSL/TLS encryption in option C is important.
upvoted 0 times
...
Avery
9 months ago
User1: I think option C is the way to go. It has both IAM authentication and SSL/TLS encryption.
upvoted 0 times
...
...
Carmela
10 months ago
Option C seems to be the most comprehensive solution. It ticks all the boxes - encrypted connection, authenticated access, and IAM integration.
upvoted 0 times
Maurine
8 months ago
I think I will go with option C for my application deployment on Google Cloud.
upvoted 0 times
...
Jennie
9 months ago
I agree, option C is the best choice for meeting security requirements.
upvoted 0 times
...
Veta
9 months ago
Option C seems to be the most comprehensive solution. It ticks all the boxes - encrypted connection, authenticated access, and IAM integration.
upvoted 0 times
...
...
Lacresha
11 months ago
I'm not sure, but I think B could also be a valid option. It mentions IAM database authentication and using Cloud SQL Auth Proxy.
upvoted 0 times
...
Leontine
11 months ago
I disagree, I believe the answer is C. It mentions both encrypted SSL mode and IAM database authentication for security.
upvoted 0 times
...
Cherilyn
11 months ago
I think the answer is A. It mentions configuring SSL/TLS client certificates which sounds secure.
upvoted 0 times
...

Save Cancel