Question 61

You are adding steps to a working automation that uses a service account to authenticate. You need to drive the automation the ability to retrieve files from a Cloud Storage bucket. Your organization requires using the least privilege possible.
What should you do?
  • Question 62

    You are in the process of deploying an internal HTTP(S) load balancer for your web server virtual machine (VM) Instances What two prerequisite tasks must be completed before creating the load balancer?
    Choose 2 answers
  • Question 63

    You have deployed a proof-of-concept application by manually placing instances in a single Compute Engine zone. You are now moving the application to production, so you need to increase your application availability and ensure it can autoscale.
    How should you provision your instances?
  • Question 64

    You have recently been put in charge of managing identity and access management for your organization.
    You have several projects and want to use scripting and automation wherever possible. You want to grant the editor role to a project member.
    Which two methods can you use to accomplish this? (Choose two.)
  • Question 65

    Question:
    Your organization has a new security policy that requires you to monitor all egress traffic payloads from your virtual machines in the us-west2 region. You deployed an intrusion detection system (IDS) virtual appliance in the same region to meet the new policy. You now need to integrate the IDS into the environment to monitor all egress traffic payloads from us-west2. What should you do?