ExamGecko
Home Home / Google / Professional Cloud Network Engineer

Google Professional Cloud Network Engineer Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

Related questions











You recently noticed a recurring daily spike in network usage in your Google Cloud project. You need to identify the virtual machine (VM) instances and type of traffic causing the spike in traffic utilization while minimizing the cost and management overhead required. What should you do?

A.
Enable VPC Flow Logs and send the output to BigQuery for analysis.
A.
Enable VPC Flow Logs and send the output to BigQuery for analysis.
Answers
B.
Enable Firewall Rules Logging for all allowed traffic and send the output to BigQuery for analysis.
B.
Enable Firewall Rules Logging for all allowed traffic and send the output to BigQuery for analysis.
Answers
C.
Configure Packet Mirroring to send all traffic to a VM. Use Wireshark on the VM to identity traffic utilization for each VM in the VPC.
C.
Configure Packet Mirroring to send all traffic to a VM. Use Wireshark on the VM to identity traffic utilization for each VM in the VPC.
Answers
D.
Deploy a third-party network appliance and configure it as the default gateway. Use the thirdparty network appliance to identify users with high network traffic.
D.
Deploy a third-party network appliance and configure it as the default gateway. Use the thirdparty network appliance to identify users with high network traffic.
Answers
Suggested answer: C

You need to enable Private Google Access for use by some subnets within your Virtual Private Cloud (VPC). Your security team set up the VPC to send all internet-bound traffic back to the on- premises data center for inspection before egressing to the internet, and is also implementing VPC Service Controls in the environment for API-level security control. You have already enabled the subnets for Private Google Access. What configuration changes should you make to enable Private Google Access while adhering to your security team's requirements?

A.
Create a private DNS zone with a CNAME record for *.googleapis.com to restricted.googleapis.com, with an A record pointing to Google's restricted API address range.Create a custom route that points Google's restricted API address range to the default internet gateway as the next hop.
A.
Create a private DNS zone with a CNAME record for *.googleapis.com to restricted.googleapis.com, with an A record pointing to Google's restricted API address range.Create a custom route that points Google's restricted API address range to the default internet gateway as the next hop.
Answers
B.
Create a private DNS zone with a CNAME record for *.googleapis.com to restricted.googleapis.com, with an A record pointing to Google's restricted API address range.Change the custom route that points the default route (0/0) to the default internet gateway as the next hop.
B.
Create a private DNS zone with a CNAME record for *.googleapis.com to restricted.googleapis.com, with an A record pointing to Google's restricted API address range.Change the custom route that points the default route (0/0) to the default internet gateway as the next hop.
Answers
C.
Create a private DNS zone with a CNAME record for *.googleapis.com to private.googleapis.com, with an A record painting to Google's private AP address range.Change the custom route that points the default route (0/0) to the default internet gateway as the next hop.
C.
Create a private DNS zone with a CNAME record for *.googleapis.com to private.googleapis.com, with an A record painting to Google's private AP address range.Change the custom route that points the default route (0/0) to the default internet gateway as the next hop.
Answers
D.
Create a private DNS zone with a CNAME record for *.googleapis.com to private.googleapis.com, with an A record pointing to Google's private API address range.Create a custom route that points Google's private API address range to the default internet gateway as the next hop.
D.
Create a private DNS zone with a CNAME record for *.googleapis.com to private.googleapis.com, with an A record pointing to Google's private API address range.Create a custom route that points Google's private API address range to the default internet gateway as the next hop.
Answers
Suggested answer: C

You have deployed an HTTP(s) load balancer, but health checks to port 80 on the Compute Enginevirtual machine instance are failing, and no traffic is sent to your instances. You want to resolve theproblem. Which commands should you run?

A.
gcloud compute instances add-access-config instance-1
A.
gcloud compute instances add-access-config instance-1
Answers
B.
gcloud compute firewall-rules create allow-lb --network load-balancer --allow tcp --destinationranges 130.211.0.0/22,35.191.0.0/16 --direction EGRESS
B.
gcloud compute firewall-rules create allow-lb --network load-balancer --allow tcp --destinationranges 130.211.0.0/22,35.191.0.0/16 --direction EGRESS
Answers
C.
gcloud compute firewall-rules create allow-lb --network load-balancer --allow tcp --source-ranges 130.211.0.0/22,35.191.0.0/16 --direction INGRESS
C.
gcloud compute firewall-rules create allow-lb --network load-balancer --allow tcp --source-ranges 130.211.0.0/22,35.191.0.0/16 --direction INGRESS
Answers
D.
gcloud compute health-checks update http health-check --unhealthy-threshold 10
D.
gcloud compute health-checks update http health-check --unhealthy-threshold 10
Answers
Suggested answer: C

You deployed a hub-and-spoke architecture in your Google Cloud environment that uses VPC Network Peering to connect the spokes to the hub. For security reasons, you deployed a private Google Kubernetes Engine (GKE) cluster in one of the spoke projects with a private endpoint for the control plane. You configured authorized networks to be the subnet range where the GKE nodes are deployed. When you attempt to reach the GKE control plane from a different spoke project, you cannot access it. You need to allow access to the GKE control plane from the other spoke projects.

What should you do?

A.
Add a firewall rule that allows port 443 from the other spoke projects.
A.
Add a firewall rule that allows port 443 from the other spoke projects.
Answers
B.
Enable Private Google Access on the subnet where the GKE nodes are deployed.
B.
Enable Private Google Access on the subnet where the GKE nodes are deployed.
Answers
C.
Configure the authorized networks to be the subnet ranges of the other spoke projects.
C.
Configure the authorized networks to be the subnet ranges of the other spoke projects.
Answers
D.
Deploy a proxy in the spoke project where the GKE nodes are deployed and connect to the control plane through the proxy.
D.
Deploy a proxy in the spoke project where the GKE nodes are deployed and connect to the control plane through the proxy.
Answers
Suggested answer: C

You recently deployed your application in Google Cloud. You need to verify your Google Cloud network configuration before deploying your on-premises workloads. You want to confirm that your Google Cloud network configuration allows traffic to flow from your cloud resources to your onpremises network. This validation should also analyze and diagnose potential failure points in your Google Cloud network configurations without sending any data plane test traffic. What should you do?

A.
Use Network Intelligence Center's Connectivity Tests.
A.
Use Network Intelligence Center's Connectivity Tests.
Answers
B.
Enable Packet Mirroring on your application and send test traffic.
B.
Enable Packet Mirroring on your application and send test traffic.
Answers
C.
Use Network Intelligence Center's Network Topology visualizations.
C.
Use Network Intelligence Center's Network Topology visualizations.
Answers
D.
Enable VPC Flow Logs and send test traffic.
D.
Enable VPC Flow Logs and send test traffic.
Answers
Suggested answer: C

In your Google Cloud organization, you have two folders: Dev and Prod. You want a scalable and consistent way to enforce the following firewall rules for all virtual machines (VMs) with minimal cost:

Port 8080 should always be open for VMs in the projects in the Dev folder.

Any traffic to port 8080 should be denied for all VMs in your projects in the Prod folder.

What should you do?

A.
Create and associate a firewall policy with the Dev folder with a rule to open port 8080. Create and associate a firewall policy with the Prod folder with a rule to deny traffic to port 8080.
A.
Create and associate a firewall policy with the Dev folder with a rule to open port 8080. Create and associate a firewall policy with the Prod folder with a rule to deny traffic to port 8080.
Answers
B.
Create a Shared VPC for the Dev projects and a Shared VPC for the Prod projects. Create a VPC firewall rule to open port 8080 in the Shared VPC for Dev. Create a firewall rule to deny traffic to port 8080 in the Shared VPC for Prod.Deploy VMs to those Shared VPCs.
B.
Create a Shared VPC for the Dev projects and a Shared VPC for the Prod projects. Create a VPC firewall rule to open port 8080 in the Shared VPC for Dev. Create a firewall rule to deny traffic to port 8080 in the Shared VPC for Prod.Deploy VMs to those Shared VPCs.
Answers
C.
In all VPCs for the Dev projects, create a VPC firewall rule to open port 8080. In all VPCs for the Prod projects, create a VPC firewall rule to deny traffic to port 8080.
C.
In all VPCs for the Dev projects, create a VPC firewall rule to open port 8080. In all VPCs for the Prod projects, create a VPC firewall rule to deny traffic to port 8080.
Answers
D.
Use Anthos Config Connector to enforce a security policy to open port 8080 on the Dev VMs and deny traffic to port 8080 on the Prod VMs.
D.
Use Anthos Config Connector to enforce a security policy to open port 8080 on the Dev VMs and deny traffic to port 8080 on the Prod VMs.
Answers
Suggested answer: A

You need to configure the Border Gateway Protocol (BGP) session for a VPN tunnel you just created between two Google Cloud VPCs, 10.1.0.0/16 and 172.16.0.0/16. You have a Cloud Router (router-1) in the 10.1.0.0/16 network and a second Cloud Router (router-2) in the 172.16.0.0/16 network.

Which configuration should you use for the BGP session?

A.
A.
Answers
B.
B.
Answers
C.
C.
Answers
D.
D.
Answers
Suggested answer: C

Your company's on-premises network is connected to a VPC using a Cloud VPN tunnel. You have a static route of 0.0.0.0/0 with the VPN tunnel as its next hop defined in the VPC. All internet bound traffic currently passes through the on-premises network. You configured Cloud NAT to translate the primary IP addresses of Compute Engine instances in one region. Traffic from those instances will now reach the internet directly from their VPC and not from the on-premises network. Traffic from the virtual machines (VMs) is not translating addresses as expected. What should you do?

A.
Lower the TCP Established Connection Idle Timeout for the NAT gateway.
A.
Lower the TCP Established Connection Idle Timeout for the NAT gateway.
Answers
B.
Add firewall rules that allow ingress and egress of the external NAT IP address, have a target tag that is on the Compute Engine instances, and have a priority value higher than the priority value of the default route to the VPN gateway.
B.
Add firewall rules that allow ingress and egress of the external NAT IP address, have a target tag that is on the Compute Engine instances, and have a priority value higher than the priority value of the default route to the VPN gateway.
Answers
C.
Add a default static route to the VPC with the default internet gateway as the next hop, the network tag associated with the Compute Engine instances, and a higher priority than the priority of the default route to the VPN tunnel.
C.
Add a default static route to the VPC with the default internet gateway as the next hop, the network tag associated with the Compute Engine instances, and a higher priority than the priority of the default route to the VPN tunnel.
Answers
D.
Increase the default min-ports-per-vm setting for the Cloud NAT gateway.
D.
Increase the default min-ports-per-vm setting for the Cloud NAT gateway.
Answers
Suggested answer: A

You are designing a Partner Interconnect hybrid cloud connectivity solution with geo-redundancy across two metropolitan areas. You want to follow Google-recommended practices to set up the following region/metro pairs:

(region 1/metro 1)

(region 2/metro 2)

What should you do?

A.
Create a Cloud Router in region 1 with two VLAN attachments connected to metro1-zone1-x.Create a Cloud Router in region 2 with two VLAN attachments connected to metro1-zone2-x.
A.
Create a Cloud Router in region 1 with two VLAN attachments connected to metro1-zone1-x.Create a Cloud Router in region 2 with two VLAN attachments connected to metro1-zone2-x.
Answers
B.
Create a Cloud Router in region 1 with one VLAN attachment connected to metro1-zone1-x.Create a Cloud Router in region 2 with two VLAN attachments connected to metro2-zone2-x.
B.
Create a Cloud Router in region 1 with one VLAN attachment connected to metro1-zone1-x.Create a Cloud Router in region 2 with two VLAN attachments connected to metro2-zone2-x.
Answers
C.
Create a Cloud Router in region 1 with one VLAN attachment connected to metro1-zone2-x.Create a Cloud Router in region 2 with one VLAN attachment connected to metro2-zone2-x.
C.
Create a Cloud Router in region 1 with one VLAN attachment connected to metro1-zone2-x.Create a Cloud Router in region 2 with one VLAN attachment connected to metro2-zone2-x.
Answers
D.
Create a Cloud Router in region 1 with one VLAN attachment connected to metro1-zone1-x and one VLAN attachment connected to metro1-zone2-x.Create a Cloud Router in region 2 with one VLAN attachment connected to metro2-zone1-x and one VLAN attachment to metro2-zone2-x.
D.
Create a Cloud Router in region 1 with one VLAN attachment connected to metro1-zone1-x and one VLAN attachment connected to metro1-zone2-x.Create a Cloud Router in region 2 with one VLAN attachment connected to metro2-zone1-x and one VLAN attachment to metro2-zone2-x.
Answers
Suggested answer: B

You are designing the network architecture for your organization. Your organization has three developer teams: Web, App, and Database. All of the developer teams require access to Compute Engine instances to perform their critical tasks. You are part of a small network and security team that needs to provide network access to the developers. You need to maintain centralized control over network resources, including subnets, routes, and firewalls. You want to minimize operational overhead. How should you design this topology?

A.
Configure a host project with a Shared VPC. Create service projects for Web, App, and Database.
A.
Configure a host project with a Shared VPC. Create service projects for Web, App, and Database.
Answers
B.
Configure one VPC for Web, one VPC for App, and one VPC for Database. Configure HA VPN between each VPC.
B.
Configure one VPC for Web, one VPC for App, and one VPC for Database. Configure HA VPN between each VPC.
Answers
C.
Configure three Shared VPC host projects, each with a service project: one for Web, one for App, and one for Database.
C.
Configure three Shared VPC host projects, each with a service project: one for Web, one for App, and one for Database.
Answers
D.
Configure one VPC for Web, one VPC for App, and one VPC for Database. Use VPC Network Peering to connect all VPCs in a full mesh.
D.
Configure one VPC for Web, one VPC for App, and one VPC for Database. Use VPC Network Peering to connect all VPCs in a full mesh.
Answers
Suggested answer: C
Total 215 questions
Go to page: of 22