Dataprep is used to normalize data before processing, if necessary.
Nearline ,the data could be accessed every month.
Dataflow : ?
Coldline has a higher cost for data access than Nearline, which makes it a poor choice for data accessed “every month or two.”
KPIs must be specific and measurable.You should be able to compare your measurement against a threshold value to determine whether it is acceptable.
Firestore does not meet the requirements for consistent low latency, scaling throughput seamlessly, and petabyte-scaling data.
Firestore works with document-based data, whereas Bigtable is a columnar database.
Carrier Peering lets you connect to Google’s public infrastructure when you can’t satisfy the peering requirements yourself.
RFC 1918 class B address space
AutoML Video is ideal for creating custom ML models with a video data type, especially for those with no ML or AI experience.
AutoML Vision enables you to train machine learning models to classify your images according to your own defined labels
Vertex AI is a unified platform for both AI and ML needs, capable of utilizing the same data source to train multiple ML models, with or without AI expertise.
Cloud Run is a fully managed service for containers and does not allow for custom configurations.
Anthos is a modern application management platform that supports a consistent development and operations experience for both cloud and on-premises environments.
Migrate for Anthos and GKE is for migrating containerized applications, not VMs.
Migrate for Compute Engine migrates VMs from on-premises to Google Cloud Compute Engine.
Migrate for Compute Engine features the replication of data to GCP to ensure zero interruptions.
Containers run a single operating system in a cluster and launch quicker than VMs, making this the best choice.
Google defence in depth layers
Hardware is the outermost security tier in Google Cloud's defense in depth model.
Software
Storage
Identity
Network
Operations is the innermost security tier in Google Cloud's defense in depth model.
An IAM anomalous grant detects privileges granted to IAM users and service accounts that are not members of the organization permitted to use resources
https://www.studyfetch.com/platform/onboarding/createSet
The cloud provider is responsible for network security for all computing models.
External identities, like Azure Active Directory, can be granted access to Google Cloud resources via the workload identity federation feature of Cloud IAM.
Displaying uptime checks is a function of Cloud Monitoring.