Question 21

Your developers are trying to connect to an Ubuntu server over SSH to diagnose some errors. However, the connection times out. Which command should help solve the problem?
  • Question 22

    Your organization has strict requirements to control access to Google Cloud projects. You need to enable your Site Reliability Engineers (SREs) to approve requests from the Google Cloud support team when an SRE opens a support case. You want to follow Google-recommended practices. What should you do?
  • Question 23

    You want to run a single caching HTTP reverse proxy on GCP for a latency-sensitive website.
    This specific reverse proxy consumes almost no CPU. You want to have a 30-GB in-memory cache, and need an additional 2 GB of memory for the rest of the processes. You want to minimize cost. How should you run this reverse proxy?
  • Question 24

    You have a Linux server running on a custom network. There's an allow firewall rule with an IP filter of 0.0.0.0/0 with a protocol/port of tcp:22. The logs on the instance show a constant stream of attempts from different IP addresses, trying to connect via SSH. You suspect this is a brute force attack.
    How might you change the firewall rule to stop this from happening and still enable access for legit users?
  • Question 25

    You've run a command to start up 2 new instances. However, you do not see the instances in the console. What command(s) would help you to identify the cause of the problem?