1. You are building a product on top of Google Kubernetes Engine (GKE). You have a single GKE cluster. For
each of your customers, a Pod is running in that cluster, and your customers can run arbitrary code inside their
Pod. You want to maximize the isolation between your customers Pods. What should you do?
- A. Use Binary Authorization and whitelist only the container images used by your customers Pods.
- B. Use the Container Analysis API to detect vulnerabilities in the containers used by your customers Pods.
- C. Create a GKE node pool with a sandbox type configured to gvisor. Add the parameter runtimeClassName:gvisor to the specification of your customers Pods.
- D. Use the cos_containerd image for your GKE nodes. Add a nodeSelector with the value cloud.google.com/gke-os-distribution: cos_containerd to the specification of your customers Pods.
3. Create a GKE node pool with a sandbox type configured to gvisor. Add the parameter runtimeClassName: gvisor to the specification of your customers Pods.
2. Your customer has implemented a solution that uses Cloud Spanner and notices some read latency-related performance issues on one table. This table is accessed only by their users using a primary key. The table schema is shown below.

- A. Remove the profile_picture field from the table.
- B. Add a secondary index on the person_id column.
- C. Change the primary key to not have monotonically increasing values.
- D. Create a secondary index using the following Data Definition Language (DDL)
C. Change the primary key to not have monotonically increasing values.
2. Your customer has implemented a solution that uses Cloud Spanner and notices some read latency-related performance issues on one table. This table is accessed only by their users using a primary key. The table schema is shown below.

- A. Remove the profile_picture field from the table.
- B. Add a secondary index on the person_id column.
- C. Change the primary key to not have monotonically increasing values.
- D. Create a secondary index using the following Data Definition Language (DDL)
C. Change the primary key to not have monotonically increasing values.