ExamGecko
Home Home / Google / Professional Cloud Network Engineer

Google Professional Cloud Network Engineer Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











You need to restrict access to your Google Cloud load-balanced application so that only specific IP addresses can connect.

What should you do?

A.
Create a secure perimeter using the Access Context Manager feature of VPC Service Controls and restrict access to the source IP range of the allowed clients and Google health check IP ranges.
A.
Create a secure perimeter using the Access Context Manager feature of VPC Service Controls and restrict access to the source IP range of the allowed clients and Google health check IP ranges.
Answers
B.
Create a secure perimeter using VPC Service Controls, and mark the load balancer as a service restricted to the source IP range of the allowed clients and Google health check IP ranges.
B.
Create a secure perimeter using VPC Service Controls, and mark the load balancer as a service restricted to the source IP range of the allowed clients and Google health check IP ranges.
Answers
C.
Tag the backend instances "application," and create a firewall rule with target tag "application" and the source IP range of the allowed clients and Google health check IP ranges.
C.
Tag the backend instances "application," and create a firewall rule with target tag "application" and the source IP range of the allowed clients and Google health check IP ranges.
Answers
D.
Label the backend instances "application," and create a firewall rule with the target label "application" and the source IP range of the allowed clients and Google health check IP ranges.
D.
Label the backend instances "application," and create a firewall rule with the target label "application" and the source IP range of the allowed clients and Google health check IP ranges.
Answers
Suggested answer: C

Explanation:

https://cloud.google.com/load-balancing/docs/https/setting-up-https#sendtraffic

Your end users are located in close proximity to us-east1 and europe-west1. Their workloads need to communicate with each other. You want to minimize cost and increase network efficiency.

How should you design this topology?

A.
Create 2 VPCs, each with their own regions and individual subnets. Create 2 VPN gateways to establish connectivity between these regions.
A.
Create 2 VPCs, each with their own regions and individual subnets. Create 2 VPN gateways to establish connectivity between these regions.
Answers
B.
Create 2 VPCs, each with their own region and individual subnets. Use external IP addresses on the instances to establish connectivity between these regions.
B.
Create 2 VPCs, each with their own region and individual subnets. Use external IP addresses on the instances to establish connectivity between these regions.
Answers
C.
Create 1 VPC with 2 regional subnets. Create a global load balancer to establish connectivity between the regions.
C.
Create 1 VPC with 2 regional subnets. Create a global load balancer to establish connectivity between the regions.
Answers
D.
Create 1 VPC with 2 regional subnets. Deploy workloads in these subnets and have them communicate using private RFC1918 IP addresses.
D.
Create 1 VPC with 2 regional subnets. Deploy workloads in these subnets and have them communicate using private RFC1918 IP addresses.
Answers
Suggested answer: D

Explanation:

https://cloud.google.com/vpc/docs/using-vpc#create-auto-network

We create one VPC network in auto mode that creates one subnet in each Google Cloud region automatically. So, region us-east1 and europe-west1 are in the same network and they can communicate using their internal IP address even though they are in different Regions. They take advantage of Google's global fiber network.

Your organization is deploying a single project for 3 separate departments. Two of these departments require network connectivity between each other, but the third department should remain in isolation. Your design should create separate network administrative domains between these departments. You want to minimize operational overhead.

How should you design the topology?

A.
Create a Shared VPC Host Project and the respective Service Projects for each of the 3 separate departments.
A.
Create a Shared VPC Host Project and the respective Service Projects for each of the 3 separate departments.
Answers
B.
Create 3 separate VPCs, and use Cloud VPN to establish connectivity between the two appropriate VPCs.
B.
Create 3 separate VPCs, and use Cloud VPN to establish connectivity between the two appropriate VPCs.
Answers
C.
Create 3 separate VPCs, and use VPC peering to establish connectivity between the two appropriate VPCs.
C.
Create 3 separate VPCs, and use VPC peering to establish connectivity between the two appropriate VPCs.
Answers
D.
Create a single project, and deploy specific firewall rules. Use network tags to isolate access between the departments.
D.
Create a single project, and deploy specific firewall rules. Use network tags to isolate access between the departments.
Answers
Suggested answer: C

Explanation:

https://cloud.google.com/vpc/docs/vpc-peering

You are migrating to Cloud DNS and want to import your BIND zone file.

Which command should you use?

A.
gcloud dns record-sets import ZONE_FILE --zone MANAGED_ZONE
A.
gcloud dns record-sets import ZONE_FILE --zone MANAGED_ZONE
Answers
B.
gcloud dns record-sets import ZONE_FILE --replace-origin-ns --zone MANAGED_ZONE
B.
gcloud dns record-sets import ZONE_FILE --replace-origin-ns --zone MANAGED_ZONE
Answers
C.
gcloud dns record-sets import ZONE_FILE --zone-file-format --zone MANAGED_ZONE
C.
gcloud dns record-sets import ZONE_FILE --zone-file-format --zone MANAGED_ZONE
Answers
D.
gcloud dns record-sets import ZONE_FILE --delete-all-existing --zone MANAGED ZONE
D.
gcloud dns record-sets import ZONE_FILE --delete-all-existing --zone MANAGED ZONE
Answers
Suggested answer: C

Explanation:

https://cloud.google.com/sdk/gcloud/reference/dns/record-sets/import

You created a VPC network named Retail in auto mode. You want to create a VPC network named Distribution and peer it with the Retail VPC.

How should you configure the Distribution VPC?

A.
Create the Distribution VPC in auto mode. Peer both the VPCs via network peering.
A.
Create the Distribution VPC in auto mode. Peer both the VPCs via network peering.
Answers
B.
Create the Distribution VPC in custom mode. Use the CIDR range 10.0.0.0/9. Create the necessary subnets, and then peer them via network peering.
B.
Create the Distribution VPC in custom mode. Use the CIDR range 10.0.0.0/9. Create the necessary subnets, and then peer them via network peering.
Answers
C.
Create the Distribution VPC in custom mode. Use the CIDR range 10.128.0.0/9. Create the necessary subnets, and then peer them via network peering.
C.
Create the Distribution VPC in custom mode. Use the CIDR range 10.128.0.0/9. Create the necessary subnets, and then peer them via network peering.
Answers
D.
Rename the default VPC as "Distribution" and peer it via network peering.
D.
Rename the default VPC as "Distribution" and peer it via network peering.
Answers
Suggested answer: B

Explanation:

https://cloud.google.com/vpc/docs/vpc#ip-ranges

You are using a third-party next-generation firewall to inspect traffic. You created a custom route of 0.0.0.0/0 to route egress traffic to the firewall. You want to allow your VPC instances without public IP addresses to access the BigQuery and Cloud Pub/Sub APIs, without sending the traffic through the firewall.

Which two actions should you take? (Choose two.)

A.
Turn on Private Google Access at the subnet level.
A.
Turn on Private Google Access at the subnet level.
Answers
B.
Turn on Private Google Access at the VPC level.
B.
Turn on Private Google Access at the VPC level.
Answers
C.
Turn on Private Services Access at the VPC level.
C.
Turn on Private Services Access at the VPC level.
Answers
D.
Create a set of custom static routes to send traffic to the external IP addresses of Google APIs and services via the default internet gateway.
D.
Create a set of custom static routes to send traffic to the external IP addresses of Google APIs and services via the default internet gateway.
Answers
E.
Create a set of custom static routes to send traffic to the internal IP addresses of Google APIs and services via the default internet gateway.
E.
Create a set of custom static routes to send traffic to the internal IP addresses of Google APIs and services via the default internet gateway.
Answers
Suggested answer: A, D

Explanation:

https://cloud.google.com/vpc/docs/private-access-options#pga Private Google Access VM instances that only have internal IP addresses (no external IP addresses) can use Private Google Access. They can reach the _external IP addresses_ of Google APIs and services.

All the instances in your project are configured with the custom metadata enable-oslogin value set to FALSE and to block project-wide SSH keys. None of the instances are set with any SSH key, and no project-wide SSH keys have been configured. Firewall rules are set up to allow SSH sessions from any IP address range. You want to SSH into one instance.

What should you do?

A.
Open the Cloud Shell SSH into the instance using gcloud compute ssh.
A.
Open the Cloud Shell SSH into the instance using gcloud compute ssh.
Answers
B.
Set the custom metadata enable-oslogin to TRUE, and SSH into the instance using a third-party tool like putty or ssh.
B.
Set the custom metadata enable-oslogin to TRUE, and SSH into the instance using a third-party tool like putty or ssh.
Answers
C.
Generate a new SSH key pair. Verify the format of the private key and add it to the instance. SSH into the instance using a third-party tool like putty or ssh.
C.
Generate a new SSH key pair. Verify the format of the private key and add it to the instance. SSH into the instance using a third-party tool like putty or ssh.
Answers
D.
Generate a new SSH key pair. Verify the format of the public key and add it to the project. SSH into the instance using a third-party tool like putty or ssh.
D.
Generate a new SSH key pair. Verify the format of the public key and add it to the project. SSH into the instance using a third-party tool like putty or ssh.
Answers
Suggested answer: A

You work for a university that is migrating to GCP.

These are the cloud requirements:

• On-premises connectivity with 10 Gbps

• Lowest latency access to the cloud

• Centralized Networking Administration Team New departments are asking for on-premises connectivity to their projects. You want to deploy the most cost-efficient interconnect solution for connecting the campus to Google Cloud.

What should you do?

A.
Use Shared VPC, and deploy the VLAN attachments and Interconnect in the host project.
A.
Use Shared VPC, and deploy the VLAN attachments and Interconnect in the host project.
Answers
B.
Use Shared VPC, and deploy the VLAN attachments in the service projects. Connect the VLAN attachment to the Shared VPC's host project.
B.
Use Shared VPC, and deploy the VLAN attachments in the service projects. Connect the VLAN attachment to the Shared VPC's host project.
Answers
C.
Use standalone projects, and deploy the VLAN attachments in the individual projects. Connect the VLAN attachment to the standalone projects' Interconnects.
C.
Use standalone projects, and deploy the VLAN attachments in the individual projects. Connect the VLAN attachment to the standalone projects' Interconnects.
Answers
D.
Use standalone projects and deploy the VLAN attachments and Interconnects in each of the individual projects.
D.
Use standalone projects and deploy the VLAN attachments and Interconnects in each of the individual projects.
Answers
Suggested answer: A

Explanation:

https://cloud.google.com/interconnect/docs/how-to/dedicated/using-interconnects-other-projects

Using Cloud Interconnect with Shared VPC You can use Shared VPC to share your VLAN attachment in a project with other VPC networks. Choosing Shared VPC is preferable if you need to create many projects and would like to prevent individual project owners from managing their connectivity back to your on-premises network. In this scenario, the host project contains a common Shared VPC network usable by VMs in service projects. Because VMs in the service projects use this network, Service Project Admins don't need to create other VLAN attachments or Cloud Routers in the service projects. In this scenario, you must create VLAN attachments and Cloud Routers for a Cloud Interconnect connection only in the Shared VPC host project. The combination of a VLAN attachment and its associated Cloud Router are unique to a given Shared VPC network.

https://cloud.google.com/network-connectivity/docs/interconnect/how-to/enabling-multiplenetworks-access-same-attachment#using_with

https://cloud.google.com/vpc/docs/shared-vpc

You have deployed a new internal application that provides HTTP and TFTP services to on-premiseshosts. You want to be able to distribute traffic across multiple Compute Engine instances, but need toensure that clients are sticky to a particular instance across both services.

Which session affinity should you choose?

A.
None
A.
None
Answers
B.
Client IP
B.
Client IP
Answers
C.
Client IP and protocol
C.
Client IP and protocol
Answers
D.
Client IP, port and protocol
D.
Client IP, port and protocol
Answers
Suggested answer: B

You created a new VPC network named Dev with a single subnet. You added a firewall rule for the network Dev to allow HTTP traffic only and enabled logging. When you try to log in to an instance in the subnet via Remote Desktop Protocol, the login fails. You look for the Firewall rules logs in Stackdriver Logging, but you do not see any entries for blocked traffic. You want to see the logs for blocked traffic.

What should you do?

A.
Check the VPC flow logs for the instance.
A.
Check the VPC flow logs for the instance.
Answers
B.
Try connecting to the instance via SSH, and check the logs.
B.
Try connecting to the instance via SSH, and check the logs.
Answers
C.
Create a new firewall rule to allow traffic from port 22, and enable logs.
C.
Create a new firewall rule to allow traffic from port 22, and enable logs.
Answers
D.
Create a new firewall rule with priority 65500 to deny all traffic, and enable logs.
D.
Create a new firewall rule with priority 65500 to deny all traffic, and enable logs.
Answers
Suggested answer: D

Explanation:

Ingress packets in VPC Flow Logs are sampled after ingress firewall rules. If an ingress firewall rule denies inbound packets, those packets are not sampled by VPC Flow Logs. We want to see the logs for blocked traffic so we have to look for them in firewall logs.

https://cloud.google.com/vpc/docs/flow-logs#key_properties

Total 215 questions
Go to page: of 22