Your team is developing an application in Google Cloud that executes with user identities maintained by Cloud Identity. Each of your application's users will have an associated Pub/Sub topic to which messages are published, and a Pub/Sub subscription where the same user will retrieve published messages. You need to ensure that only authorized users can publish and subscribe to their own specific Pub/Sub topic and subscription. What should you do?
You are building an API that will be used by Android and iOS apps The API must:
* Support HTTPs
* Minimize bandwidth cost
* Integrate easily with mobile apps
Which API architecture should you use?
You are using Cloud Build to create a new Docker image on each source code commit to a Cloud Source Repositoties repository. Your application is built on every commit to the master branch. You want to release specific commits made to the master branch in an automated method. What should you do?
You need to deploy resources from your laptop to Google Cloud using Terraform. Resources in your Google Cloud environment must be created using a service account. Your Cloud Identity has the roles/iam.serviceAccountTokenCreator Identity and Access Management (IAM) role and the necessary permissions to deploy the resources using Terraform. You want to set up your development environment to deploy the desired resources following Google-recommended best practices. What should you do?
https://cloud.google.com/iam/docs/best-practices-for-managing-service-account-keys#file-system
Whenever possible, avoid storing service account keys on a file system. If you can't avoid storing keys on disk, make sure to restrict access to the key file, configure file access auditing, and encrypt the underlying disk.
https://cloud.google.com/iam/docs/best-practices-for-managing-service-account-keys#software-keystore
In situations where using a hardware-based key store isn't viable, use a software-based key store to manage service account keys. Similar to hardware-based options, a software-based key store lets users or applications use service account keys without revealing the private key. Software-based key store solutions can help you control key access in a fine-grained manner and can also ensure that each key access is logged.
You are developing a single-player mobile game backend that has unpredictable traffic patterns as users interact with the game throughout the day and night. You want to optimize costs by ensuring that you have enough resources to handle requests, but minimize over-provisioning. You also want the system to handle traffic spikes efficiently. Which compute platform should you use?
Arthur
1 months agoAzalee
2 months agoLuisa
2 months agoBarney
3 months agoKiley
3 months agoMaxima
4 months agoRozella
5 months agoLizette
5 months agoPaulene
5 months agoJolanda
6 months agoAbraham
6 months agoAbel
6 months agoWendell
7 months agoVeronica
7 months agoLouisa
7 months agoLauran
7 months agoAlishia
8 months agoVeronika
8 months agoSarah
8 months agoTheron
8 months agoJeanice
8 months agoDaniel
8 months agoBonita
9 months agoAleisha
9 months agoNana
9 months agoNaomi
9 months agoMartina
10 months agoTalia
10 months agoMarya
10 months agoShanda
10 months agoChau
10 months agoMilly
11 months agoMicaela
11 months agoMozell
11 months agoBette
12 months agoVernell
1 years agoLemuel
1 years agoBarrett
1 years agoPhil
1 years agoMalcom
1 years agoCora
1 years ago