ExamGecko
Home Home / Google / Professional Cloud Network Engineer

Google Professional Cloud Network Engineer Practice Test - Questions Answers, Page 13

Question list
Search
Search

List of questions

Search

Related questions











In your project my-project, you have two subnets in a Virtual Private Cloud (VPC): subnet-a with IP range 10.128.0.0/20 and subnet-b with IP range 172.16.0.0/24. You need to deploy database servers in subneta.

You will also deploy the application servers and web servers in subnet-b. You want to configure firewall rules that only allow database traffic from the application servers to the database servers.

What should you do?

A.
Create network tag app-server and service account [email protected] the tag to the application servers, and associate the service account with the database servers.Run the following command:gcloud compute firewall-rules create app-db-firewall-rule \--action allow \--direction ingress \--rules top:3306 \--source-tags app-server \--target-service-accounts [email protected]
A.
Create network tag app-server and service account [email protected] the tag to the application servers, and associate the service account with the database servers.Run the following command:gcloud compute firewall-rules create app-db-firewall-rule \--action allow \--direction ingress \--rules top:3306 \--source-tags app-server \--target-service-accounts [email protected]
Answers
B.
Create service accounts [email protected] and sa-db@myproject. iam.gserviceaccount.com. Associate service account sa-app with the application servers, and associate the service account sa-db with the database servers. Run the following command:gcloud compute firewall-rules create app-db-firewall-ru--allow TCP:3306 \--source-service-accounts [email protected] \--target-service-accounts sa-db@my-
B.
Create service accounts [email protected] and sa-db@myproject. iam.gserviceaccount.com. Associate service account sa-app with the application servers, and associate the service account sa-db with the database servers. Run the following command:gcloud compute firewall-rules create app-db-firewall-ru--allow TCP:3306 \--source-service-accounts [email protected] \--target-service-accounts sa-db@my-
Answers
C.
Create service accounts [email protected] and sa-db@myproject. iam.gserviceaccount.com. Associate the service account sa-app with the application servers, and associate the service account sa-db with the database servers. Run the following command:gcloud compute firewall-rules create app-db-firewall-ru--allow TCP:3306 \--source-ranges 10.128.0.0/20 \--source-service-accounts [email protected] \--target-service-accounts [email protected]
C.
Create service accounts [email protected] and sa-db@myproject. iam.gserviceaccount.com. Associate the service account sa-app with the application servers, and associate the service account sa-db with the database servers. Run the following command:gcloud compute firewall-rules create app-db-firewall-ru--allow TCP:3306 \--source-ranges 10.128.0.0/20 \--source-service-accounts [email protected] \--target-service-accounts [email protected]
Answers
D.
Create network tags app-server and db-server. Add the app-server tag to the application servers, and add the db-server tag to the database servers. Run the following command:gcloud compute firewall-rules create app-db-firewall-rule \--action allow \--direction ingress \--rules tcp:3306 \--source-ranges 10.128.0.0/20 \--source-tags app-server \--target-tags db-server
D.
Create network tags app-server and db-server. Add the app-server tag to the application servers, and add the db-server tag to the database servers. Run the following command:gcloud compute firewall-rules create app-db-firewall-rule \--action allow \--direction ingress \--rules tcp:3306 \--source-ranges 10.128.0.0/20 \--source-tags app-server \--target-tags db-server
Answers
Suggested answer: D

You are planning a large application deployment in Google Cloud that includes on-premises connectivity. The application requires direct connectivity between workloads in all regions and onpremises locations without address translation, but all RFC 1918 ranges are already in use in the onpremises locations. What should you do?

A.
Use multiple VPC networks with a transit network using VPC Network Peering.
A.
Use multiple VPC networks with a transit network using VPC Network Peering.
Answers
B.
Use overlapping RFC 1918 ranges with multiple isolated VPC networks.
B.
Use overlapping RFC 1918 ranges with multiple isolated VPC networks.
Answers
C.
Use overlapping RFC 1918 ranges with multiple isolated VPC networks and Cloud NAT.
C.
Use overlapping RFC 1918 ranges with multiple isolated VPC networks and Cloud NAT.
Answers
D.
Use non-RFC 1918 ranges with a single global VPC.
D.
Use non-RFC 1918 ranges with a single global VPC.
Answers
Suggested answer: D

Your company's security team wants to limit the type of inbound traffic that can reach your web servers to protect against security threats. You need to configure the firewall rules on the web servers within your Virtual Private Cloud (VPC) to handle HTTP and HTTPS web traffic for TCP only.

What should you do?

A.
Create an allow on match ingress firewall rule with the target tag "web-server" to allow all IP addresses for TCP port 80.
A.
Create an allow on match ingress firewall rule with the target tag "web-server" to allow all IP addresses for TCP port 80.
Answers
B.
Create an allow on match egress firewall rule with the target tag "web-server" to allow all IP addresses for TCP port 80.
B.
Create an allow on match egress firewall rule with the target tag "web-server" to allow all IP addresses for TCP port 80.
Answers
C.
Create an allow on match ingress firewall rule with the target tag "web-server" to allow all IP addresses for TCP ports 80 and 443.
C.
Create an allow on match ingress firewall rule with the target tag "web-server" to allow all IP addresses for TCP ports 80 and 443.
Answers
D.
Create an allow on match egress firewall rule with the target tag "web-server" to allow web server IP addresses for TCP ports 60 and 443.
D.
Create an allow on match egress firewall rule with the target tag "web-server" to allow web server IP addresses for TCP ports 60 and 443.
Answers
Suggested answer: C

Explanation:

Reference: https://cloud.google.com/load-balancing/docs/https

You successfully provisioned a single Dedicated Interconnect. The physical connection is at a colocation facility closest to us-west2. Seventy-five percent of your workloads are in us-east4, and the remaining twenty-five percent of your workloads are in us-central1. All workloads have the same network traffic profile. You need to minimize data transfer costs when deploying VLAN attachments.

What should you do?

A.
Keep the existing Dedicated interconnect. Deploy a VLAN attachment to a Cloud Router in uswest2, and use VPC global routing to access workloads in us-east4 and us-central1.
A.
Keep the existing Dedicated interconnect. Deploy a VLAN attachment to a Cloud Router in uswest2, and use VPC global routing to access workloads in us-east4 and us-central1.
Answers
B.
Keep the existing Dedicated Interconnect. Deploy a VLAN attachment to a Cloud Router in useast4, and deploy another VLAN attachment to a Cloud Router in us-central1.
B.
Keep the existing Dedicated Interconnect. Deploy a VLAN attachment to a Cloud Router in useast4, and deploy another VLAN attachment to a Cloud Router in us-central1.
Answers
C.
Order a new Dedicated Interconnect for a colocation facility closest to us-east4, and use VPC global routing to access workloads in us-central1.
C.
Order a new Dedicated Interconnect for a colocation facility closest to us-east4, and use VPC global routing to access workloads in us-central1.
Answers
D.
Order a new Dedicated Interconnect for a colocation facility closest to us-central1, and use VPC global routing to access workloads in us-east4.
D.
Order a new Dedicated Interconnect for a colocation facility closest to us-central1, and use VPC global routing to access workloads in us-east4.
Answers
Suggested answer: C

You are designing a hybrid cloud environment. Your Google Cloud environment is interconnected with your on-premises network using HA VPN and Cloud Router in a central transit hub VPC. The Cloud Router is configured with the default settings. Your on-premises DNS server is located at 192.168.20.88. You need to ensure that your Compute Engine resources in multiple spoke VPCs can resolve on-premises private hostnames using the domain corp.altostrat.com while also resolving Google Cloud hostnames. You want to follow Google-recommended practices. What should you do?

A.
Create a private forwarding zone in Cloud DNS for 'corp.altostrat.com' called corp-altostrat-com that points to 192.168.20.88. Associate the zone with the hub VPC.Create a private peering zone in Cloud DNS for 'corp.altostrat.com' called corp-altostrat-com associated with the spoke VPCs, with the hub VPC as the target.Set a custom route advertisement on the Cloud Router for 35.199.192.0/19.Configure VPC peering in the spoke VPCs to peer with the hub VPC.
A.
Create a private forwarding zone in Cloud DNS for 'corp.altostrat.com' called corp-altostrat-com that points to 192.168.20.88. Associate the zone with the hub VPC.Create a private peering zone in Cloud DNS for 'corp.altostrat.com' called corp-altostrat-com associated with the spoke VPCs, with the hub VPC as the target.Set a custom route advertisement on the Cloud Router for 35.199.192.0/19.Configure VPC peering in the spoke VPCs to peer with the hub VPC.
Answers
B.
Create a private forwarding zone in Cloud DNS for 'corp.altostrat.com' called corp-altostrat-com that points to 192.168.20.88.Associate the zone with the hub VPC. Create a private peering zone in Cloud DNS for 'corp.altostrat.com' called corp-altostrat-com associated with the spoke PCs, with the hub VPC as the target.Set a custom route advertisement on the Cloud Router for 35.199.192.0/19.
B.
Create a private forwarding zone in Cloud DNS for 'corp.altostrat.com' called corp-altostrat-com that points to 192.168.20.88.Associate the zone with the hub VPC. Create a private peering zone in Cloud DNS for 'corp.altostrat.com' called corp-altostrat-com associated with the spoke PCs, with the hub VPC as the target.Set a custom route advertisement on the Cloud Router for 35.199.192.0/19.
Answers
C.
Create a private forwarding zone in Cloud DNS for 'corp.altostrat.com' called corp-altostrat-com that points to 192.168.20.88. Associate the zone with the hub VPC.Create a private peering zone in Cloud DNS for 'corp.altostrat.com' called corp-altostrat-com associated with the spoke VPCs, with the hub VPC as the target.Set a custom route advertisement on the Cloud Router for 35.199.192.0/19.Create a hub-and-spoke VPN deployment in each spoke VPC to connect back to the on-premises network directly.
C.
Create a private forwarding zone in Cloud DNS for 'corp.altostrat.com' called corp-altostrat-com that points to 192.168.20.88. Associate the zone with the hub VPC.Create a private peering zone in Cloud DNS for 'corp.altostrat.com' called corp-altostrat-com associated with the spoke VPCs, with the hub VPC as the target.Set a custom route advertisement on the Cloud Router for 35.199.192.0/19.Create a hub-and-spoke VPN deployment in each spoke VPC to connect back to the on-premises network directly.
Answers
D.
Create a private forwarding zone in Cloud DNS for 'corp altostrat.com' called corp-altostrat-com that points to 192. 168.20.88. Associate the zone with the hub VPC.Create a private peering zone in Cloud DNS for 'corp.altostrat.com' called corp-altostrat-com associated with the spoke VPCs, with the hub VPC as the target.Sat a custom route advertisement on the Cloud Router for 35.199.192.0/19.Create a hub and spoke VPN deployment in each spoke VPC to connect back to the hub VPC.
D.
Create a private forwarding zone in Cloud DNS for 'corp altostrat.com' called corp-altostrat-com that points to 192. 168.20.88. Associate the zone with the hub VPC.Create a private peering zone in Cloud DNS for 'corp.altostrat.com' called corp-altostrat-com associated with the spoke VPCs, with the hub VPC as the target.Sat a custom route advertisement on the Cloud Router for 35.199.192.0/19.Create a hub and spoke VPN deployment in each spoke VPC to connect back to the hub VPC.
Answers
Suggested answer: A

You have the following firewall ruleset applied to all instances in your Virtual Private Cloud (VPC):

You need to update the firewall rule to add the following rule to the ruleset:

You are using a new user account. You must assign the appropriate identity and Access Management (IAM) user roles to this new user account before updating the firewall rule. The new user account must be able to apply the update and view firewall logs. What should you do?

A.
Assign the compute.securityAdmin and logging.viewer rule to the new user account. Apply the new firewall rule with a priority of 50.
A.
Assign the compute.securityAdmin and logging.viewer rule to the new user account. Apply the new firewall rule with a priority of 50.
Answers
B.
Assign the compute.securityAdmin and logging.bucketWriter role to the new user account. Apply the new firewall rule with a priority of 150.
B.
Assign the compute.securityAdmin and logging.bucketWriter role to the new user account. Apply the new firewall rule with a priority of 150.
Answers
C.
Assign the compute.orgSecurityPolicyAdmin and logging.viewer role to the new user account.Apply the new firewall rule with a priority of 50.
C.
Assign the compute.orgSecurityPolicyAdmin and logging.viewer role to the new user account.Apply the new firewall rule with a priority of 50.
Answers
D.
Assign the compute.orgSecurityPolicyAdmin and logging.bucketWriter role to the new user account. Apply the new firewall rule with a priority of 150.
D.
Assign the compute.orgSecurityPolicyAdmin and logging.bucketWriter role to the new user account. Apply the new firewall rule with a priority of 150.
Answers
Suggested answer: A

Your organization has a single project that contains multiple Virtual Private Clouds (VPCs). You need to secure API access to your Cloud Storage buckets and BigQuery datasets by allowing API access only from resources in your corporate public networks. What should you do?

A.
Create an access context policy that allows your VPC and corporate public network IP ranges, and then attach the policy to Cloud Storage and BigQuery.
A.
Create an access context policy that allows your VPC and corporate public network IP ranges, and then attach the policy to Cloud Storage and BigQuery.
Answers
B.
Create a VPC Service Controls perimeter for your project with an access context policy that allows your corporate public network IP ranges.
B.
Create a VPC Service Controls perimeter for your project with an access context policy that allows your corporate public network IP ranges.
Answers
C.
Create a firewall rule to block API access to Cloud Storage and BigQuery from unauthorized networks.
C.
Create a firewall rule to block API access to Cloud Storage and BigQuery from unauthorized networks.
Answers
D.
Create a VPC Service Controls perimeter for each VPC with an access context policy that allows your corporate public network IP ranges.
D.
Create a VPC Service Controls perimeter for each VPC with an access context policy that allows your corporate public network IP ranges.
Answers
Suggested answer: B

Your company has provisioned 2000 virtual machines (VMs) in the private subnet of your Virtual Private Cloud (VPC) in the us-east1 region. You need to configure each VM to have a minimum of 128 TCP connections to a public repository so that users can download software updates and packages over the internet. You need to implement a Cloud NAT gateway so that the VMs are able to perform outbound NAT to the internet. You must ensure that all VMs can simultaneously connect to the public repository and download software updates and packages. Which two methods can you use to accomplish this? (Choose two.)

A.
Configure the NAT gateway in manual allocation mode, allocate 2 NAT IP addresses, and update the minimum number of ports per VM to 256.
A.
Configure the NAT gateway in manual allocation mode, allocate 2 NAT IP addresses, and update the minimum number of ports per VM to 256.
Answers
B.
Create a second Cloud NAT gateway with the default minimum number of ports configured per VM to 64.
B.
Create a second Cloud NAT gateway with the default minimum number of ports configured per VM to 64.
Answers
C.
Use the default Cloud NAT gateway's NAT proxy to dynamically scale using a single NAT IP address.
C.
Use the default Cloud NAT gateway's NAT proxy to dynamically scale using a single NAT IP address.
Answers
D.
Use the default Cloud NAT gateway to automatically scale to the required number of NAT IP addresses, and update the minimum number of ports per VM to 128.
D.
Use the default Cloud NAT gateway to automatically scale to the required number of NAT IP addresses, and update the minimum number of ports per VM to 128.
Answers
E.
Configure the NAT gateway in manual allocation mode, allocate 4 NAT IP addresses, and update the minimum number of ports per VM to 128.
E.
Configure the NAT gateway in manual allocation mode, allocate 4 NAT IP addresses, and update the minimum number of ports per VM to 128.
Answers
Suggested answer: A, B

You have the following routing design. You discover that Compute Engine instances in Subnet-2 in the asia-southeast1 region cannot communicate with compute resources on-premises. What should you do?

A.
Configure a custom route advertisement on the Cloud Router.
A.
Configure a custom route advertisement on the Cloud Router.
Answers
B.
Enable IP forwarding in the asia-southeast1 region.
B.
Enable IP forwarding in the asia-southeast1 region.
Answers
C.
Change the VPC dynamic routing mode to Global.
C.
Change the VPC dynamic routing mode to Global.
Answers
D.
Add a second Border Gateway Protocol (BGP) session to the Cloud Router.
D.
Add a second Border Gateway Protocol (BGP) session to the Cloud Router.
Answers
Suggested answer: C

You are designing a hybrid cloud environment for your organization. Your Google Cloud environment is interconnected with your on-premises network using Cloud HA VPN and Cloud Router. The Cloud Router is configured with the default settings. Your on-premises DNS server is located at 192.168.20.88 and is protected by a firewall, and your Compute Engine resources are located at 10.204.0.0/24. Your Compute Engine resources need to resolve on-premises private hostnames using the domain corp.altostrat.com while still resolving Google Cloud hostnames. You want to follow Google-recommended practices. What should you do?

A.
Create a private forwarding zone in Cloud DNS for 'corp.altostrat.com' called corp-altostrat-com that points to 192.168.20.88.Configure your on-premises firewall to accept traffic from 10.204.0.0/24.Set a custom route advertisement on the Cloud Router for 10.204.0.0/24
A.
Create a private forwarding zone in Cloud DNS for 'corp.altostrat.com' called corp-altostrat-com that points to 192.168.20.88.Configure your on-premises firewall to accept traffic from 10.204.0.0/24.Set a custom route advertisement on the Cloud Router for 10.204.0.0/24
Answers
B.
Create a private forwarding zone in Cloud DNS for 'corp.altostrat.com' called corp-altostrat-com that points to 192.168 20.88.Configure your on-premises firewall to accept traffic from 35.199.192.0/19 Set a custom route advertisement on the Cloud Router for 35.199.192.0/19.
B.
Create a private forwarding zone in Cloud DNS for 'corp.altostrat.com' called corp-altostrat-com that points to 192.168 20.88.Configure your on-premises firewall to accept traffic from 35.199.192.0/19 Set a custom route advertisement on the Cloud Router for 35.199.192.0/19.
Answers
C.
Create a private forwarding zone in Cloud DNS for 'corp .altostrat.com' called corp-altostrat-com that points to 192.168.20.88.Configure your on-premises firewall to accept traffic from 10.204.0.0/24.Modify the /etc/resolv conf file on your Compute Engine instances to point to 192.168.20 88
C.
Create a private forwarding zone in Cloud DNS for 'corp .altostrat.com' called corp-altostrat-com that points to 192.168.20.88.Configure your on-premises firewall to accept traffic from 10.204.0.0/24.Modify the /etc/resolv conf file on your Compute Engine instances to point to 192.168.20 88
Answers
D.
Create a private zone in Cloud DNS for 'corp altostrat.com' called corp-altostrat-com.Configure DNS Server Policies and create a policy with Alternate DNS servers to 192.168.20.88.Configure your on-premises firewall to accept traffic from 35.199.192.0/19.Set a custom route advertisement on the Cloud Router for 35.199.192.0/19.
D.
Create a private zone in Cloud DNS for 'corp altostrat.com' called corp-altostrat-com.Configure DNS Server Policies and create a policy with Alternate DNS servers to 192.168.20.88.Configure your on-premises firewall to accept traffic from 35.199.192.0/19.Set a custom route advertisement on the Cloud Router for 35.199.192.0/19.
Answers
Suggested answer: D
Total 215 questions
Go to page: of 22