ExamGecko
Home Home / Google / Professional Cloud Network Engineer

Google Professional Cloud Network Engineer Practice Test - Questions Answers, Page 15

Question list
Search
Search

List of questions

Search

Related questions











Your organization is implementing a new security policy to control how firewall rules are applied to control flows between virtual machines (VMs). Using Google-recommended practices, you need to set up a firewall rule to enforce strict control of traffic between VM A and VM B. You must ensure that communications flow only from VM A to VM B within the VPC, and no other communication paths are allowed. No other firewall rules exist in the VPC. Which firewall rule should you configure to allow only this communication path?

A.
Firewall rule direction: ingressAction: allowTarget: VM B service accountSource ranges: VM A service accountPriority: 1000
A.
Firewall rule direction: ingressAction: allowTarget: VM B service accountSource ranges: VM A service accountPriority: 1000
Answers
B.
Firewall rule direction: ingressAction: allowTarget: specific VM B tagSource ranges: VM A tag and VM A source IP addressPriority: 1000
B.
Firewall rule direction: ingressAction: allowTarget: specific VM B tagSource ranges: VM A tag and VM A source IP addressPriority: 1000
Answers
C.
Firewall rule direction: ingressAction: allowTarget: VM A service accountSource ranges: VM B service account and VM B source IP addressPriority: 100
C.
Firewall rule direction: ingressAction: allowTarget: VM A service accountSource ranges: VM B service account and VM B source IP addressPriority: 100
Answers
D.
Firewall rule direction: ingressAction: allowTarget: specific VM A tagSource ranges: VM B tag and VM B source IP addressPriority: 100
D.
Firewall rule direction: ingressAction: allowTarget: specific VM A tagSource ranges: VM B tag and VM B source IP addressPriority: 100
Answers
Suggested answer: D

You have configured a service on Google Cloud that connects to an on-premises service via a Dedicated Interconnect. Users are reporting recent connectivity issues. You need to determine whether the traffic is being dropped because of firewall rules or a routing decision. What should you do?

A.
Use the Network Intelligence Center Connectivity Tests to test the connectivity between the VPC and the on-premises network.
A.
Use the Network Intelligence Center Connectivity Tests to test the connectivity between the VPC and the on-premises network.
Answers
B.
Use Network Intelligence Center Network Topology to check the traffic flow, and replay the traffic from the time period when the connectivity issue occurred.
B.
Use Network Intelligence Center Network Topology to check the traffic flow, and replay the traffic from the time period when the connectivity issue occurred.
Answers
C.
Configure VPC Flow Logs. Review the logs by filtering on the source and destination.
C.
Configure VPC Flow Logs. Review the logs by filtering on the source and destination.
Answers
D.
Configure a Compute Engine instance on the same VPC as the service running on Google Cloud to run a traceroute targeted at the on-premises service.
D.
Configure a Compute Engine instance on the same VPC as the service running on Google Cloud to run a traceroute targeted at the on-premises service.
Answers
Suggested answer: B

You are configuring a new HTTP application that will be exposed externally behind both IPv4 and IPv6virtual IP addresses, using ports 80, 8080, and 443. You will have backends in two regions: us-west1and us-east1. You want to serve the content with the lowest-possible latency while ensuring highavailability and autoscaling, and create native content-based rules using the HTTP hostname andrequest path. The IP addresses of the clients that connect to the load balancer need to be visible tothe backends. Which configuration should you use?

A.
Use Network Load Balancing
A.
Use Network Load Balancing
Answers
B.
Use TCP Proxy Load Balancing with PROXY protocol enabled
B.
Use TCP Proxy Load Balancing with PROXY protocol enabled
Answers
C.
Use External HTTP(S) Load Balancing with URL Maps and custom headers
C.
Use External HTTP(S) Load Balancing with URL Maps and custom headers
Answers
D.
Use External HTTP(S) Load Balancing with URL Maps and an X-Forwarded-For header
D.
Use External HTTP(S) Load Balancing with URL Maps and an X-Forwarded-For header
Answers
Suggested answer: D

You need to define an address plan for a future new Google Kubernetes Engine (GKE) cluster in your Virtual Private Cloud (VPC). This will be a VPC-native cluster, and the default Pod IP range allocation will be used. You must pre-provision all the needed VPC subnets and their respective IP address ranges before cluster creation. The cluster will initially have a single node, but it will be scaled to a maximum of three nodes if necessary. You want to allocate the minimum number of Pod IP addresses. Which subnet mask should you use for the Pod IP address range?

A.
/21
A.
/21
Answers
B.
/22
B.
/22
Answers
C.
/23
C.
/23
Answers
D.
/25
D.
/25
Answers
Suggested answer: A

You are responsible for designing a new connectivity solution for your organization's enterprise network to access and use Google Workspace. You have an existing Shared VPC with Compute Engine instances in us-west1. Currently, you access Google Workspace via your service provider's internet access. You want to set up a direct connection between your network and Google. What should you do?

A.
Order a Dedicated Interconnect connection in the same metropolitan area. Create a VLAN attachment, a Cloud Router in us-west1, and a Border Gateway Protocol (BGP) session between your Cloud Router and your router.
A.
Order a Dedicated Interconnect connection in the same metropolitan area. Create a VLAN attachment, a Cloud Router in us-west1, and a Border Gateway Protocol (BGP) session between your Cloud Router and your router.
Answers
B.
Order a Direct Peering connection in the same metropolitan area. Configure a Border Gateway Protocol (BGP) session between Google and your router.
B.
Order a Direct Peering connection in the same metropolitan area. Configure a Border Gateway Protocol (BGP) session between Google and your router.
Answers
C.
Configure HA VPN in us-west1. Configure a Border Gateway Protocol (BGP) session between your Cloud Router and your on-premises data center.
C.
Configure HA VPN in us-west1. Configure a Border Gateway Protocol (BGP) session between your Cloud Router and your on-premises data center.
Answers
D.
Order a Carrier Peering connection in the same metropolitan area. Configure a Border Gateway Protocol (BGP) session between Google and your router.
D.
Order a Carrier Peering connection in the same metropolitan area. Configure a Border Gateway Protocol (BGP) session between Google and your router.
Answers
Suggested answer: B

You suspect that one of the virtual machines (VMs) in your default Virtual Private Cloud (VPC) is under a denial-of-service attack. You need to analyze the incoming traffic for the VM to understand where the traffic is coming from. What should you do?

A.
Enable Data Access audit logs of the VPC. Analyze the logs and get the source IP addresses from the subnetworks.get field.
A.
Enable Data Access audit logs of the VPC. Analyze the logs and get the source IP addresses from the subnetworks.get field.
Answers
B.
Enable VPC Flow Logs for the subnet. Analyze the logs and get the source IP addresses from the connection field.
B.
Enable VPC Flow Logs for the subnet. Analyze the logs and get the source IP addresses from the connection field.
Answers
C.
Enable VPC Flow Logs for the VPC. Analyze the logs and get the source IP addresses from the src_location field.
C.
Enable VPC Flow Logs for the VPC. Analyze the logs and get the source IP addresses from the src_location field.
Answers
D.
Enable Data Access audit logs of the subnet. Analyze the logs and get the source IP addresses from the networks.get field.
D.
Enable Data Access audit logs of the subnet. Analyze the logs and get the source IP addresses from the networks.get field.
Answers
Suggested answer: B

You are responsible for configuring firewall policies for your company in Google Cloud. Your security team has a strict set of requirements that must be met to configure firewall rules.

Always allow Secure Shell (SSH) from your corporate IP address.

Restrict SSH access from all other IP addresses.

There are multiple projects and VPCs in your Google Cloud organization. You need to ensure that other VPC firewall rules cannot bypass the security team's requirements. What should you do?

A.
Configure a hierarchical firewall policy to the organization node to allow TCP port 22 for your corporate IP address with priority 0.Configure a hierarchical firewall policy to the organization node to deny TCP port 22 for all IP addresses with priority 1.
A.
Configure a hierarchical firewall policy to the organization node to allow TCP port 22 for your corporate IP address with priority 0.Configure a hierarchical firewall policy to the organization node to deny TCP port 22 for all IP addresses with priority 1.
Answers
B.
Configure a VPC firewall rule to allow TCP port 22 for your corporate IP address with priority 0.Configure a VPC firewall rule to deny TCP port 22 for all IP addresses with priority 1.
B.
Configure a VPC firewall rule to allow TCP port 22 for your corporate IP address with priority 0.Configure a VPC firewall rule to deny TCP port 22 for all IP addresses with priority 1.
Answers
C.
Configure a VPC firewall rule to allow TCP port 22 for your corporate IP address with priority 1.Configure a VPC firewall rule to deny TCP port 22 for all IP addresses with priority 0.
C.
Configure a VPC firewall rule to allow TCP port 22 for your corporate IP address with priority 1.Configure a VPC firewall rule to deny TCP port 22 for all IP addresses with priority 0.
Answers
D.
Configure a hierarchical firewall policy to the organization node to allow TCP port 22 for your corporate IP address with priority 1 Configure a hierarchical firewall policy to the organization node to deny TCP port 22 for all IP addresses with priority 0.
D.
Configure a hierarchical firewall policy to the organization node to allow TCP port 22 for your corporate IP address with priority 1 Configure a hierarchical firewall policy to the organization node to deny TCP port 22 for all IP addresses with priority 0.
Answers
Suggested answer: A

You are designing a new application that has backends internally exposed on port 800. The application will be exposed externally using both IPv4 and IPv6 via TCP on port 700. You want to ensure high availability for this application. What should you do?

A.
Create a network load balancer that used backend services containing one instance group with two instances.
A.
Create a network load balancer that used backend services containing one instance group with two instances.
Answers
B.
Create a network load balancer that uses a target pool backend with two instances.
B.
Create a network load balancer that uses a target pool backend with two instances.
Answers
C.
Create a TCP proxy that uses a zonal network endpoint group containing one instance.
C.
Create a TCP proxy that uses a zonal network endpoint group containing one instance.
Answers
D.
Create a TCP proxy that uses backend services containing an instance group with two instances.
D.
Create a TCP proxy that uses backend services containing an instance group with two instances.
Answers
Suggested answer: D

You work for a university that is migrating to Google Cloud.

These are the cloud requirements:

On-premises connectivity with 10 Gbps

Lowest latency access to the cloud

Centralized Networking Administration Team

New departments are asking for on-premises connectivity to their projects. You want to deploy the most cost-efficient interconnect solution for connecting the campus to Google Cloud.

What should you do?

A.
Use Shared VPC, and deploy the VLAN attachments and Dedicated Interconnect in the host project.
A.
Use Shared VPC, and deploy the VLAN attachments and Dedicated Interconnect in the host project.
Answers
B.
Use Shared VPC, and deploy the VLAN attachments in the service projects. Connect the VLAN attachment to the Shared VPC's host project.
B.
Use Shared VPC, and deploy the VLAN attachments in the service projects. Connect the VLAN attachment to the Shared VPC's host project.
Answers
C.
Use standalone projects, and deploy the VLAN attachments in the individual projects. Connect the VLAN attachment to the standalone projects' Dedicated Interconnects.
C.
Use standalone projects, and deploy the VLAN attachments in the individual projects. Connect the VLAN attachment to the standalone projects' Dedicated Interconnects.
Answers
D.
Use standalone projects and deploy the VLAN attachments and Dedicated Interconnects in each of the individual projects.
D.
Use standalone projects and deploy the VLAN attachments and Dedicated Interconnects in each of the individual projects.
Answers
Suggested answer: A

You have several microservices running in a private subnet in an existing Virtual Private Cloud (VPC).

You need to create additional serverless services that use Cloud Run and Cloud Functions to access the microservices. The network traffic volume between your serverless services and private microservices is low. However, each serverless service must be able to communicate with any of your microservices. You want to implement a solution that minimizes cost. What should you do?

A.
Deploy your serverless services to the serverless VPC. Peer the serverless service VPC to the existing VPC. Configure firewall rules to allow traffic between the serverless services and your existing microservices.
A.
Deploy your serverless services to the serverless VPC. Peer the serverless service VPC to the existing VPC. Configure firewall rules to allow traffic between the serverless services and your existing microservices.
Answers
B.
Create a serverless VPC access connector for each serverless service. Configure the connectors to allow traffic between the serverless services and your existing microservices.
B.
Create a serverless VPC access connector for each serverless service. Configure the connectors to allow traffic between the serverless services and your existing microservices.
Answers
C.
Deploy your serverless services to the existing VPC. Configure firewall rules to allow traffic between the serverless services and your existing microservices.
C.
Deploy your serverless services to the existing VPC. Configure firewall rules to allow traffic between the serverless services and your existing microservices.
Answers
D.
Create a serverless VPC access connector. Configure the serverless service to use the connector for communication to the microservices.
D.
Create a serverless VPC access connector. Configure the serverless service to use the connector for communication to the microservices.
Answers
Suggested answer: D
Total 215 questions
Go to page: of 22