Reliable Cloud Infrastructure: Design and Process Flashcards Preview

Coursera Quizzes > Reliable Cloud Infrastructure: Design and Process > Flashcards

Flashcards in Reliable Cloud Infrastructure: Design and Process Deck (41)
Loading flashcards...
1

The course introduces design using a three-tier design model. The three tiers are:

Presentation layer, Business-logic layer, and Data layer.

2

The design process includes which steps?

Begin simple and iterate. Plan for failure. Measure.

3

What is it called when information must be preserved to perform a subsequent step?

Stateful. State information is stored.

4

What is the focus of measurement?

Measure what the user cares about.

5

How does a microservices design complicate business logic ?

Key business logic is implemented as cross-services communication.

6

Which GCP platform services are identified as useful for the 12-factor principle of "store configuration information in the environment"?

Google Cloud Storage and the Metadata Server.

7

What tradeoff occurs with the 12-factor principle of "store state information in the environment"?

Storing state information in the environment is slower than storing it locally on SSD.

8

Which platform processing service is designed to offer the lowest IT overhead so you can focus on the application?

Google App Engine (GAE)

9

What advice is given on horizontal scaling design?

Prefer small stateless servers. Keep servers simple; do one thing well.

10

What does Data Integrity mean?

That users have access to their data and that the data persists without being corrupted or lost.

11

What is the difference between a proxied and a pass-through load balancer?

A proxied load balancer terminates the incoming connection and initiates a separate connection, a pass-through redirects traffic without terminating it.

12

Which form of load balancing enables you to load balance behind an IP address that is only accessible to instances within your Virtual Private Cloud (VPC)?

Internal load balancing.

13

What is the service provided by a third party (such as an ISP) that enables you to connect another cloud directly to your Google cloud resources to create hybrid cloud solutions?

Dedicated interconnect.

14

The design process includes which steps?

Begin simple and iterate. Plan for failure. Measure.

15

What is it called when information must be preserved to perform a subsequent step?

Stateful. State information is stored.

16

What is the focus of measurement?

Measure what the user cares about.

17

What are the categories of requirements described in gathering requirements?

Quantitative, qualitative, scaling, and size.

18

What does Data Integrity mean?

That users have access to their data and that the data persists without being corrupted or lost.

19

What reason is given for the design advice to "design first and dimension later"?

Trying to optimize cost or optimize for size (dimension) before the design is fully developed can lead to confusion and ambiguities in the design process.

20

What is the key advice presented about GCP deployment?

Automate everything you can -- because launch and release automation has an influence over reliability.

21

What is the difference between black box monitoring and white box monitoring?

In black box monitoring you can only monitor external observable events, whereas, in white box monitoring, you can also monitor the system's internal events.

22

From the bottom up, what are the first three layers in the Site Reliability Engineering pyramid?

Monitoring. Incident Response. Post Mortem / Root Cause Analysis.

23

What are the steps in the capacity planning cycle?

Allocate. Approve. Deploy. Forecast.

24

What are three methods for reducing the price of virtual machines (VMs) in GCP?

Sustained use discounts. Committed use discounts. Preemptible VMs.

25

What does "pervasive defense in depth" mean?

Segregation of duties; Google handles some things, others are your responsibility.

26

In most network devices such as a firewall, the network is subject to overload of the capacity of the interface. What is the overload capacity of a firewall in Google's network?

The firewall is virtual, implemented through software defined networking, so there is no physical interface to be overloaded.

27

Which edge features of Google's networking provide automatic protections against Distributed Denial of Service attacks (DDoS) ?

TCP/SSL proxy, Global Load Balancing, and Cloud CDN.

28

Which of the following describes Cross-project VPC network peering?

Projects are isolated in separate VPCs, but using network peering they can communicate over a private address space.

29

When would you use CSEK (Customer Supplied Encryption Keys) ?

When you have a requirement to use your own AES-256 keys rather than those automatically generated by Google.

30

What is the "principle of least privilege" as it relates to IAM Policies?

Grant roles at the smallest scope needed for the individual or service account to be functional with the services they require.