Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Google Professional Cloud Architect (PR000213) Exam - Topic 1 Question 103 Discussion

Actual exam question for Google's Professional Cloud Architect (PR000213) exam
Question #: 103
Topic #: 1
[All Professional Cloud Architect (PR000213) Questions]

Your agricultural division is experimenting with fully autonomous vehicles.

You want your architecture to promote strong security during vehicle operation.

Which two architecture should you consider?

Choose 2 answers:

Show Suggested Answer Hide Answer
Suggested Answer: B

The practice for managing logs generated on Compute Engine on Google Cloud is to install the Cloud Logging agent and send them to Cloud Logging.

The sent logs will be aggregated into a Cloud Logging sink and exported to Cloud Storage.

The reason for using Cloud Storage as the destination for the logs is that the requirement in question requires setting up a lifecycle based on the storage period.

In this case, the log will be used for active queries for 30 days after it is saved, but after that, it needs to be stored for a longer period of time for auditing purposes.

If the data is to be used for active queries, we can use BigQuery's Cloud Storage data query feature and move the data past 30 days to Coldline to build a cost-optimal solution.

Therefore, the correct answer is as follows

1. Install the Cloud Logging agent on all instances.

Create a sync that exports the logs to the region's Cloud Storage bucket.

3. Create an Object Lifecycle rule to move the files to the Coldline Cloud Storage bucket after one month. 4.

4. set up a bucket-level retention policy using bucket locking.'


Contribute your Thoughts:

0/2000 characters
Vilma
4 months ago
C is solid, but what’s the deal with using a Faraday cage?
upvoted 0 times
...
Jordan
5 months ago
A is a must, but I’m not sold on E.
upvoted 0 times
...
Katie
5 months ago
Surprised to see F as an option, sounds extreme!
upvoted 0 times
...
Gaynell
5 months ago
I think B is important too, but not sure about D.
upvoted 0 times
...
Tijuana
5 months ago
Definitely A and C for security!
upvoted 0 times
...
Tonette
6 months ago
I feel like enclosing electronics in a Faraday cage could be overkill. But it might help with isolation, right?
upvoted 0 times
...
Aleta
6 months ago
Using a trusted platform module sounds familiar. I think we practiced a similar question about verifying firmware.
upvoted 0 times
...
Harrison
6 months ago
I'm not entirely sure about requiring IPv6. I think it helps with address space, but does it really improve security?
upvoted 0 times
...
Anglea
6 months ago
I remember we discussed treating microservice calls as untrusted in class. It seems like a good way to enhance security.
upvoted 0 times
...
Ben
6 months ago
The multiple connectivity subsystems for redundancy and IPv6 for secure addressing seem like good strategies to consider. I feel pretty confident about this one.
upvoted 0 times
...
Brandon
6 months ago
I'm not too familiar with some of these concepts like Faraday cages and functional programming languages. I'll have to do some research before attempting this.
upvoted 0 times
...
Bethanie
6 months ago
Okay, I've got this. Treating every microservice call as untrusted and using a trusted platform module are definitely the way to go for strong security.
upvoted 0 times
...
Rickie
6 months ago
Hmm, I'm a bit unsure about this one. I'll have to review the material on secure vehicle architectures again.
upvoted 0 times
...
Judy
6 months ago
This looks like a tricky security question. I'll need to think through the options carefully.
upvoted 0 times
...
Verda
11 months ago
IPv6 for connectivity? Good luck getting that to work on a tractor in the middle of a field. C and E are the winners in my book. Oh, and I'm pretty sure the Faraday cage is just for keeping the aliens out of the vehicle's systems.
upvoted 0 times
Annita
10 months ago
Faraday cage is a must for alien protection.
upvoted 0 times
...
Lachelle
11 months ago
E) Use multiple connectivity subsystems for redundancy.
upvoted 0 times
...
Yen
11 months ago
C) Use a trusted platform module (TPM) and verify firmware and binaries on boot.
upvoted 0 times
...
...
Orville
11 months ago
Haha, using a functional programming language to isolate code execution cycles? I'm pretty sure the farmers won't appreciate that level of complexity. C and E are definitely the way to go here.
upvoted 0 times
...
Nickole
12 months ago
I like the idea of using a TPM and verifying firmware and binaries on boot. That's a solid way to ensure the vehicle's systems are secure. Not sure about the Faraday cage, though - might be a bit over-the-top for a farm vehicle.
upvoted 0 times
Lashanda
10 months ago
Maybe focusing on multiple connectivity subsystems for redundancy could be more practical.
upvoted 0 times
...
Freeman
10 months ago
I think using a Faraday cage might be excessive for a farm vehicle.
upvoted 0 times
...
Ramonita
10 months ago
Yeah, verifying firmware and binaries on boot is crucial for safety.
upvoted 0 times
...
Stephen
11 months ago
I agree, using a TPM is a good security measure.
upvoted 0 times
...
...
Miesha
12 months ago
C and E seem like the most practical options to ensure strong security during vehicle operation. Treating every micro service call as untrusted is a good idea, but it might be overkill for an agricultural vehicle.
upvoted 0 times
...
Marla
1 year ago
I also think we should treat every micro service call between modules as untrusted for added security.
upvoted 0 times
...
Maricela
1 year ago
I agree with Kirby, verifying firmware and binaries on boot is crucial for security.
upvoted 0 times
...
Kirby
1 year ago
I think we should consider using a trusted platform module (TPM) for security.
upvoted 0 times
...

Save Cancel