What should the customer do to meet these requirements? A. Make sure that the ERP system can validate the JWT assertion in the HTTP requests. B. Make sure that the ERP system can validate the identity headers in the HTTP requests. C. Make sure that the ERP system can validate the x-forwarded-for headers in the HTTP requests. D. Make sure that the ERP system can validate the user’s unique identifier headers in the HTTP requests. Answer: A Question: 74 A company has been running their application on Compute Engine. A bug in the application allowed a malicious user to repeatedly execute a script that results in the Compute Engine instance crashing. Although the bug has been fixed, you want to get notified in case this hack re-occurs. What should you do? A. Create an Alerting Policy in Stackdriver using a Process Health condition, checking that the number of executions of the script remains below the desired threshold. Enable notifications. B. Create an Alerting Policy in Stackdriver using the CPU usage metric. Set the threshold to 80% to be notified when the CPU usage goes above this 80%. C. Log every execution of the script to Stackdriver Logging. Create a User-defined metric in Stackdriver Logging on the logs, and create a Stackdriver Dashboard displaying the metric. D. Log every execution of the script to Stackdriver Logging. Configure BigQuery as a log sink, and create a BigQuery scheduled query to count the number of executions in a specific timeframe.
Answer: C Reference: Question: 75 When creating a secure container image, which two items should you incorporate into the build if possible? (Choose two.) A. Ensure that the app does not run as PID 1.
You've reached the end of your free preview.
Want to read all 5 pages?
- Fall '20
- SYN flood