Reliable Cloud Infrastructure: Design and Process Flashcards

1
Q

The course introduces design using a three-tier design model. The three tiers are:

A

Presentation layer, Business-logic layer, and Data layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The design process includes which steps?

A

Begin simple and iterate. Plan for failure. Measure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is it called when information must be preserved to perform a subsequent step?

A

Stateful. State information is stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the focus of measurement?

A

Measure what the user cares about.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does a microservices design complicate business logic ?

A

Key business logic is implemented as cross-services communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which GCP platform services are identified as useful for the 12-factor principle of “store configuration information in the environment”?

A

Google Cloud Storage and the Metadata Server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What tradeoff occurs with the 12-factor principle of “store state information in the environment”?

A

Storing state information in the environment is slower than storing it locally on SSD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which platform processing service is designed to offer the lowest IT overhead so you can focus on the application?

A

Google App Engine (GAE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What advice is given on horizontal scaling design?

A

Prefer small stateless servers. Keep servers simple; do one thing well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does Data Integrity mean?

A

That users have access to their data and that the data persists without being corrupted or lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between a proxied and a pass-through load balancer?

A

A proxied load balancer terminates the incoming connection and initiates a separate connection, a pass-through redirects traffic without terminating it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which form of load balancing enables you to load balance behind an IP address that is only accessible to instances within your Virtual Private Cloud (VPC)?

A

Internal load balancing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the service provided by a third party (such as an ISP) that enables you to connect another cloud directly to your Google cloud resources to create hybrid cloud solutions?

A

Dedicated interconnect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The design process includes which steps?

A

Begin simple and iterate. Plan for failure. Measure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is it called when information must be preserved to perform a subsequent step?

A

Stateful. State information is stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the focus of measurement?

A

Measure what the user cares about.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the categories of requirements described in gathering requirements?

A

Quantitative, qualitative, scaling, and size.

18
Q

What does Data Integrity mean?

A

That users have access to their data and that the data persists without being corrupted or lost.

19
Q

What reason is given for the design advice to “design first and dimension later”?

A

Trying to optimize cost or optimize for size (dimension) before the design is fully developed can lead to confusion and ambiguities in the design process.

20
Q

What is the key advice presented about GCP deployment?

A

Automate everything you can – because launch and release automation has an influence over reliability.

21
Q

What is the difference between black box monitoring and white box monitoring?

A

In black box monitoring you can only monitor external observable events, whereas, in white box monitoring, you can also monitor the system’s internal events.

22
Q

From the bottom up, what are the first three layers in the Site Reliability Engineering pyramid?

A

Monitoring. Incident Response. Post Mortem / Root Cause Analysis.

23
Q

What are the steps in the capacity planning cycle?

A

Allocate. Approve. Deploy. Forecast.

24
Q

What are three methods for reducing the price of virtual machines (VMs) in GCP?

A

Sustained use discounts. Committed use discounts. Preemptible VMs.

25
Q

What does “pervasive defense in depth” mean?

A

Segregation of duties; Google handles some things, others are your responsibility.

26
Q

In most network devices such as a firewall, the network is subject to overload of the capacity of the interface. What is the overload capacity of a firewall in Google’s network?

A

The firewall is virtual, implemented through software defined networking, so there is no physical interface to be overloaded.

27
Q

Which edge features of Google’s networking provide automatic protections against Distributed Denial of Service attacks (DDoS) ?

A

TCP/SSL proxy, Global Load Balancing, and Cloud CDN.

28
Q

Which of the following describes Cross-project VPC network peering?

A

Projects are isolated in separate VPCs, but using network peering they can communicate over a private address space.

29
Q

When would you use CSEK (Customer Supplied Encryption Keys) ?

A

When you have a requirement to use your own AES-256 keys rather than those automatically generated by Google.

30
Q

What is the “principle of least privilege” as it relates to IAM Policies?

A

Grant roles at the smallest scope needed for the individual or service account to be functional with the services they require.

31
Q

What are the two main categories of failures described?

A

Failure due to loss of resources, and failure due to overload.

32
Q

To design to overcome a single point of failure, the N+2 strategy is recommended. What is N+2?

A

One alternative to ‘ N’ to handle an upgrade, and a second to handle a service outage.

33
Q

What is a correlated failure?

A

When a group of related items fail at the same time; the group is a failure domain.

34
Q

How can a design to improve reliability through failover create an opportunity for overload failure?

A

If growth occurs and the capacity is not increased to accommodate the new greater load during failover.

35
Q

What is a cascading failure?

A

When, due to an overload failure, the system seeks additional resources and spreads the overload until the system loses integrity.

36
Q

What is a fan-in or incast failure?

A

When many individual requests are responded to multiple times in error.

37
Q

What is it called when you are trying to make a system more reliable by adding retries and it creates the opportunity for an overload failure?

A

Positive feedback cycle overload failure.

38
Q

What is the recommended action to help cope with failure that involves Objectives and Indicators?

A

Incorporate failure planning including a margin of safety and scheduled downtime into the SLOs and SLIs.

39
Q

Why is DNS recommended for business continuity and disaster recovery?

A

Because you can use it to redirect client requests to an alternate backup service by changing the DNS definition.

40
Q

What is a lazy deletion strategy?

A

When a client deletes an object, it is not annihilated immediately, but concealed and preserved for a period. There may be multiple tiers in the deletion strategy that permit different kinds of recovery of the object.

41
Q

What is a key technology for scalable and resilient design that enables both scaling of capacity and redirecting traffic to alternate resources in the event of a failure?

A

Load balancing.