🔥 40% Off Crucial Exams Memberships — Deal ends today!

3 hours, 32 minutes remaining!
00:20:00

GCP Associate Cloud Engineer Practice Test

Use the form below to configure your GCP Associate Cloud Engineer Practice Test. The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for GCP Associate Cloud Engineer
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

GCP Associate Cloud Engineer Information

GCP Associate Cloud Engineer Exam

The Google Cloud Certified Associate Cloud Engineer (ACE) exam serves as a crucial validation of your skills in deploying, monitoring, and maintaining projects on the Google Cloud Platform. This certification is designed for individuals who can use both the Google Cloud Console and the command-line interface to manage enterprise solutions. The exam assesses your ability to set up a cloud solution environment, plan and configure a cloud solution, deploy and implement it, ensure its successful operation, and configure access and security. It is a solid starting point for those new to the cloud and can act as a stepping stone to professional-level certifications. To be eligible, it's recommended to have at least six months of hands-on experience with Google Cloud products and solutions. The exam itself is a two-hour, multiple-choice and multiple-select test that costs $125.

The ACE exam covers a broad range of Google Cloud services and concepts. Key areas of focus include understanding and managing core services like Compute Engine, Google Kubernetes Engine (GKE), App Engine, and Cloud Storage. You should be proficient in launching virtual machine instances, configuring autoscaling, deploying applications, and knowing the different storage classes and their use cases. Additionally, a strong grasp of Identity and Access Management (IAM) is critical, including managing users, groups, roles, and service accounts according to best practices. The exam also delves into networking aspects like creating VPCs and subnets, and operational tasks such as monitoring with Cloud Monitoring, logging with Cloud Logging, and managing billing accounts. Familiarity with command-line tools like gcloud, bq, and gsutil is also essential.

Practice Exams for Preparation

A vital component of a successful preparation strategy is taking practice exams. These simulations are the best way to get a feel for the tone, style, and potential trickiness of the actual exam questions. By taking practice exams, you can quickly identify your strengths and pinpoint the specific exam domains that require further study. Many who have passed the exam attest that a significant portion of the questions on the actual test were very similar to those found in quality practice exams. These practice tests often provide detailed explanations for each answer, offering a deeper learning opportunity by explaining why a particular answer is correct and the others are not. This helps in not just memorizing answers, but truly understanding the underlying concepts. Fortunately, Google provides a set of sample questions to help you get familiar with the exam format, and numerous other platforms offer extensive practice tests. Consistent practice with these resources can significantly boost your confidence and increase your chances of passing the exam.

GCP Associate Cloud Engineer Logo
  • Free GCP Associate Cloud Engineer Practice Test

  • 20 Questions
  • Unlimited time
  • Setting up a cloud solution environment
    Planning and implementing a cloud solution
    Ensuring successful operation of a cloud solution
    Configuring access and security

Free Preview

This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!

Question 1 of 20

Your organization is creating an internal tool that lists every Identity and Access Management (IAM) policy binding configured in a Google Cloud project so that it can be rebuilt in another environment. To capture the minimum information required to reproduce each binding, which combination of elements must the tool record for every binding it discovers?

  • The resource, the IAM role, and the principal (member) that receives the role.

  • The IAM role, the principal, and any condition attached to the binding.

  • The principal, the resource, and the service perimeter that protects the resource.

  • The resource, the IAM role, and the audit log sink associated with the project.

Question 2 of 20

You are the organization administrator for ExampleCorp's Google Cloud environment. Security mandates that no new Compute Engine VM in any project should obtain an external IPv4 address, except for the network-engineering team that works only in the vpc-test project. Which configuration best meets this requirement while preserving least-privilege and minimizing repetitive work?

  • Create an IAM Deny policy at the Organization level that blocks the compute.instances.create permission for all users, then add an allow rule in the vpc-test project.

  • Delete the default VPC network from every project and create custom VPCs without Internet gateways; leave the default network intact in the vpc-test project.

  • Grant the network-engineering team the Compute Instance Admin role in the vpc-test project and remove that role from all other projects.

  • Apply the compute.vmExternalIpAccess constraint at the Organization level with "enforce" set to true (deny all), then add a project-level policy on vpc-test that allows only the network-engineering service account to use external IP addresses.

Question 3 of 20

Your team is reviewing the release notes for a new Google Cloud service. The notes state that the service is currently offered in "us-central1-a", "northamerica-northeast1", and "global". To plan high availability, they ask you which of these locations is a zone as defined by Google Cloud's resource hierarchy. Which location do you identify?

  • northamerica-northeast1

  • us

  • us-central1-a

  • global

Question 4 of 20

During an onboarding exercise you launch a script that tries to provision 150 vCPUs in the us-central1 region. The command fails with the error Quota 'CPUS' exceeded. You already have Owner permissions in the project. The CTO wants to understand why Google Cloud sets such default quotas in every project. Which explanation best describes the main reason these quotas exist?

  • They enforce each customer's committed-use discounts so that spending cannot exceed budget forecasts.

  • They protect the overall Google Cloud user community by limiting unexpected spikes in consumption from any one project.

  • They satisfy regional data-protection regulations by capping how many resources a single project may deploy in one location.

  • They reserve unused capacity for redundancy, ensuring every project can fail over to another zone during maintenance events.

Question 5 of 20

You are working in Cloud Shell in project analytics-prod. Security asks you to create a new service account called etl-runner and set its display name to "ETL Batch SA" before any roles are granted. Which single gcloud command will accomplish this task?

  • gcloud iam service-accounts add-iam-policy-binding [email protected] --role="roles/iam.serviceAccountUser"

  • gcloud iam service-accounts update [email protected] --display-name="ETL Batch SA" --project=analytics-prod

  • gcloud iam service-accounts create etl-runner --display-name="ETL Batch SA" --project=analytics-prod

  • gcloud services enable iam.googleapis.com --project=analytics-prod && gcloud iam service-accounts add-key [email protected]

Question 6 of 20

Your company just created a new Google Cloud project. A Google Group of developers must be able to create, update, and delete most resources in the project, such as Compute Engine instances and Cloud Storage buckets. However, the security team requires that the group must not be able to modify IAM policies, link or unlink billing accounts, or delete the project. To satisfy these constraints with a single primitive IAM role and follow least-privilege principles, which role should you grant to the group?

  • Owner

  • Viewer

  • Editor

  • No primitive role satisfies these requirements; you must create a custom role

Question 7 of 20

Your team's deployment pipeline suddenly fails when trying to create several n2-standard-16 VM instances in the europe-west1 region. The Compute Engine error message is: "Quota 'CPUS (europe-west1)' exceeded. Limit: 96. Requested: 128." You need to restore the pipeline as quickly as possible and avoid the same problem in the future. Which action should you take first?

  • Modify the Terraform code to deploy smaller n2-standard-8 instances so that total vCPU usage stays under the existing 96-vCPU limit.

  • Create a new Google Cloud project, link it to the same billing account, and rerun the pipeline there to obtain fresh default quotas.

  • Redeploy the workload in another region where remaining CPUS quota is available, then file a quota request after deployment completes.

  • Submit a quota increase request for the CPUS quota in europe-west1 using the Cloud Console Quotas page.

Question 8 of 20

Your organization is moving a critical Linux-based application to a Compute Engine VM. Operations wants CPU and memory metrics to appear in Cloud Monitoring dashboards and needs the application's log files to be searchable in Cloud Logging. They prefer to deploy and maintain as few agents on the VM as possible. Which action will best meet these requirements?

  • Install the legacy Stackdriver Logging agent together with the legacy Stackdriver Monitoring agent to capture the required data.

  • Install the Google Cloud Ops Agent on the virtual machine to send both logs and metrics to Cloud Logging and Cloud Monitoring.

  • Install only the legacy Stackdriver Monitoring agent, which gathers both logs and metrics for Cloud Monitoring.

  • Simply enable the Cloud Logging and Cloud Monitoring APIs; the VM will export all logs and metrics without any agent.

Question 9 of 20

You are asked to link an existing Google Cloud project called finance-prod to your company's centralized billing account. When you attempt this in the Cloud Console, the Link project button is disabled. Your identity currently has the Billing Account Viewer role on the billing account and the Viewer role on the project. Which combination of additional IAM roles will give you the minimum permissions required to complete the link without granting unnecessary broader access?

  • Assign Billing Account Administrator on the billing account and Viewer on the finance-prod project.

  • Assign Owner on the finance-prod project and Billing Account Viewer on the billing account.

  • Assign Billing Account User on the billing account and Project Billing Manager on the finance-prod project.

  • Assign Editor on the finance-prod project; no additional role is needed on the billing account.

Question 10 of 20

Your company just got a Cloud Identity account and now has an Organization node. You must migrate 30 standalone projects owned by different teams. Each project belongs to either the Finance or Engineering department. Teams need autonomy to manage their projects, and org administrators must apply future policy constraints (e.g., disabling external VM IPs) to Engineering only without affecting Finance. Which resource-hierarchy design meets these requirements with the least effort?

  • Leave the projects as standalone (not under any Organization) and use Shared VPC to centralize network administration instead of changing the hierarchy.

  • Create two top-level folders named Finance and Engineering under the Organization, move each project into its folder, and grant department leads IAM roles on their folder.

  • Set up a separate Organization for each department and transfer the projects to the corresponding Organization.

  • Move all projects directly under the Organization and tag them with labels for Finance or Engineering; grant IAM roles individually on every project.

Question 11 of 20

Your company runs dozens of Compute Engine VMs that host internal web applications. SREs want to forward OS-level metrics (CPU, memory, disk, network) and application logs to Cloud Monitoring and Cloud Logging without installing and maintaining two different agents. They also need a single YAML file on each VM to enable collection of NGINX access logs in addition to the default system telemetry. Which approach best meets these requirements with the least operational overhead?

  • Deploy a Prometheus sidecar on every VM for metrics and use a custom script to send log files to a Cloud Storage bucket.

  • Install the Google Cloud Ops Agent on each VM and add an nginx_access logging receiver to the agent's unified config.yaml file.

  • Enable Cloud Audit Logs at the project level and export them to Cloud Monitoring; no agent installation is required.

  • Install the legacy Monitoring agent for metrics and the legacy Logging agent with a Fluentd NGINX plugin to collect logs.

Question 12 of 20

Your company needs a new VPC named corp-net that must contain exactly two subnets: dev-us (10.10.0.0/16) in us-central1 and dev-eu (10.20.0.0/16) in europe-west1. No additional subnets should ever be created automatically. Which approach meets this requirement with the least manual effort?

  • Run gcloud compute networks create corp-net --subnet-mode=custom, then create the dev-us and dev-eu subnets with gcloud compute networks subnets create specifying --network=corp-net, the correct --region, and the desired --range CIDR blocks.

  • Run gcloud compute networks create corp-net --subnet-mode=auto, then use gcloud compute networks subnets expand-ip-range to adjust the IP ranges for dev-us and dev-eu.

  • Create the default VPC, rename two of its existing subnets to dev-us and dev-eu, and change their IP ranges to 10.10.0.0/16 and 10.20.0.0/16.

  • Create an auto-mode VPC named corp-net, delete every automatically created subnet except dev-us and dev-eu, and rely on this configuration going forward.

Question 13 of 20

Your company has a Google Cloud organization with separate folders for "prod" and "dev" projects. Security mandates that no new Compute Engine VM in any project under the prod folder may receive an external IPv4 address, but development teams must remain free to create such VMs in their own folder. Which approach best meets these requirements with the least administrative overhead?

  • Apply the constraint constraints/compute.vmCanIpForward in Deny mode on the organization node to block external IPs for every VM.

  • Remove the roles/compute.networkUser IAM role from all service accounts in prod projects to prevent them from getting external IP addresses.

  • Delete the default VPC network in each prod project and require teams to create only custom subnets without any organization policy.

  • Apply the organization policy constraint constraints/compute.vmExternalIpAccess in Deny mode on the prod folder so it is inherited by all production projects.

Question 14 of 20

A financial services company is creating a Cloud SQL instance that must satisfy German data-residency rules: all data must remain in a single geographic area, yet the database should continue operating if one zone in that area becomes unavailable. In the Google Cloud console, which location type best meets these requirements?

  • Global

  • Regional (europe-west3)

  • Multi-regional (europe)

  • Zonal (europe-west3-c)

Question 15 of 20

Your organization runs several Cloud Storage buckets in a single project. Only one analyst, [email protected], must be able to list and download objects from the bucket gs://analytics-data. She must not access any other GCS resources or change data. As the project owner, which single IAM change best satisfies the requirement while following least-privilege?

Question 16 of 20

Your company currently uses only individual Gmail accounts and has a single Google Cloud project that appears in the console with No organization. Management now wants to apply organization-wide IAM policies and centralize future project creation under an Organization resource, but they do not plan to purchase Google Workspace licenses. What is the most appropriate first step to obtain an Organization resource for the company?

  • Register the company's domain with Cloud Identity, verify domain ownership, and then sign in to Google Cloud from an account in that domain.

  • Convert one founder's Gmail account to a service account and assign it the Organization Administrator role.

  • Create a new self-serve billing account and link it to a placeholder project; the Organization resource is created automatically during billing setup.

  • Open a support ticket with Google Cloud and request that an Organization resource be manually provisioned for the existing project.

Question 17 of 20

During a disaster-recovery review, you are asked which existing resource would remain fully manageable if an entire Google Cloud region became unavailable. The project currently includes: a custom-mode VPC network, three subnetworks (us-east1, us-central1, europe-west1), a regional Cloud NAT gateway in us-east1, and a zonal Compute Engine VM in us-east1-b. Which component is classified as a global resource?

  • The regional Cloud NAT gateway

  • The zonal Compute Engine VM

  • The subnetworks

  • The custom-mode VPC network

Question 18 of 20

Your finance team needs a daily feed of every Google Cloud SKU charge, tagged with project, service, and resource labels, so they can build long-term cost-allocation dashboards and join the data with internal tables using SQL. They ask you, the Cloud Engineer, to recommend the simplest native solution that delivers this granularity without manual file handling. What should you do?

  • Configure Cloud Billing export to Cloud Storage in CSV format and have the finance team import the files into BigQuery when needed.

  • Enable Cloud Billing detailed usage cost export to BigQuery and let the finance team query the dataset for their dashboards.

  • Create a budget for the billing account with Pub/Sub notifications and stream the messages to BigQuery for analysis.

  • Use the Billing Reports page in the Google Cloud console and schedule weekly PDF exports of the cost charts.

Question 19 of 20

Your security team has prohibited granting the storage.objects.getIamPolicy permission in the payroll project. A group of analysts must be able to upload new objects and delete outdated objects in a sensitive Cloud Storage bucket, but they must not view or change IAM policies. The available predefined Storage roles all include the forbidden permission. How should you grant the required access while respecting the security constraint?

  • Use object ACLs to give the analysts OWNER access on all objects in the bucket while leaving IAM unchanged.

  • Enable Uniform bucket-level access and grant the analysts the Storage Admin role on the bucket so they inherit all necessary permissions automatically.

  • Create an organization- or project-level custom IAM role that includes only storage.objects.create and storage.objects.delete, then grant that role on the bucket to the analysts' Google Group.

  • Grant the analysts the predefined Storage Object Admin role on the bucket and add an IAM deny policy for storage.objects.getIamPolicy.

Question 20 of 20

Your organization is setting up its first Google Cloud project. Finance is willing to let Google automatically charge a corporate credit card or bank account whenever spending reaches Google-defined thresholds, and they do not need a formal monthly invoice or purchase-order approval workflow. Which type of Cloud Billing account best satisfies these requirements while keeping administration simple?

  • Request an invoiced (offline) Cloud Billing account so charges appear on a monthly invoice with net-30 terms.

  • Have a Google Cloud reseller manage the project under the reseller's billing account.

  • Create a self-serve (online) Cloud Billing account and attach a corporate credit card or bank account.

  • Operate the project without any billing account and rely solely on the always-free usage limits.