ExamGecko
Home Home / Google / Professional Cloud Network Engineer

Google Professional Cloud Network Engineer Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions











You want to establish a dedicated connection to Google that can access Cloud SQL via a public IP address and that does not require a third-party service provider.

Which connection type should you choose?

A.
Carrier Peering
A.
Carrier Peering
Answers
B.
Direct Peering
B.
Direct Peering
Answers
C.
Dedicated Interconnect
C.
Dedicated Interconnect
Answers
D.
Partner Interconnect
D.
Partner Interconnect
Answers
Suggested answer: B

Explanation:

When established, Direct Peering provides a direct path from your on-premises network to Google services, including Google Cloud products that can be exposed through one or more public IP addresses. Traffic from Google's network to your on-premises network also takes that direct path, including traffic from VPC networks in your projects. Google Cloud customers must request that direct egress pricing be enabled for each of their projects after they have established Direct Peering with Google. For more information, see Pricing.

Reference: https://cloud.google.com/interconnect/docs/how-to/direct-peering

You are configuring a new instance of Cloud Router in your Organization's Google Cloud environment to allow connection across a new Dedicated Interconnect to your data center Sales, Marketing, and IT each have a service project attached to the Organization's host project.

Where should you create the Cloud Router instance?

A.
VPC network in all projects
A.
VPC network in all projects
Answers
B.
VPC network in the IT Project
B.
VPC network in the IT Project
Answers
C.
VPC network in the Host Project
C.
VPC network in the Host Project
Answers
D.
VPC network in the Sales, Marketing, and IT Projects
D.
VPC network in the Sales, Marketing, and IT Projects
Answers
Suggested answer: C

Explanation:

Reference: https://cloud.google.com/interconnect/docs/how-to/dedicated/using-interconnectsother-projects

You created a new VPC for your development team. You want to allow access to the resources in this VPC via SSH only.

How should you configure your firewall rules?

A.
Create two firewall rules: one to block all traffic with priority 0, and another to allow port 22 with priority 1000.
A.
Create two firewall rules: one to block all traffic with priority 0, and another to allow port 22 with priority 1000.
Answers
B.
Create two firewall rules: one to block all traffic with priority 65536, and another to allow port 3389 with priority 1000.
B.
Create two firewall rules: one to block all traffic with priority 65536, and another to allow port 3389 with priority 1000.
Answers
C.
Create a single firewall rule to allow port 22 with priority 1000.
C.
Create a single firewall rule to allow port 22 with priority 1000.
Answers
D.
Create a single firewall rule to allow port 3389 with priority 1000.
D.
Create a single firewall rule to allow port 3389 with priority 1000.
Answers
Suggested answer: C

Explanation:

Reference: https://geekflare.com/gcp-firewall-configuration/

Your on-premises data center has 2 routers connected to your GCP through a VPN on each router. All applications are working correctly; however, all of the traffic is passing across a single VPN instead of being load-balanced across the 2 connections as desired.

During troubleshooting you find:

• Each on-premises router is configured with the same ASN.

• Each on-premises router is configured with the same routes and priorities.

• Both on-premises routers are configured with a VPN connected to a single Cloud Router.

• The VPN logs have no-proposal-chosen lines when the VPNs are connecting.

• BGP session is not established between one on-premises router and the Cloud Router.

What is the most likely cause of this problem?

A.
One of the VPN sessions is configured incorrectly.
A.
One of the VPN sessions is configured incorrectly.
Answers
B.
A firewall is blocking the traffic across the second VPN connection.
B.
A firewall is blocking the traffic across the second VPN connection.
Answers
C.
You do not have a load balancer to load-balance the network traffic.
C.
You do not have a load balancer to load-balance the network traffic.
Answers
D.
BGP sessions are not established between both on-premises routers and the Cloud Router.
D.
BGP sessions are not established between both on-premises routers and the Cloud Router.
Answers
Suggested answer: A

Explanation:

If the VPN logs show a no-proposal-chosen error, this error indicates that Cloud VPN and your peer VPN gateway were unable to agree on a set of ciphers. For IKEv1, the set of ciphers must match exactly. For IKEv2, there must be at least one common cipher proposed by each gateway. Make sure that you use supported ciphers to configure your peer VPN gateway.

https://cloud.google.com/networkconnectivity/docs/vpn/support/troubleshooting#:~:text=If%20the%20VPN%20logs%20show,of%20ciphers%20must%20match%20exactly.&text=Make%20sure%20that%20you%20use,configure%20your%20peer%20VPN%20gateway.

You need to define an address plan for a future new GKE cluster in your VPC. This will be a VPC native cluster, and the default Pod IP range allocation will be used. You must pre-provision all the needed VPC subnets and their respective IP address ranges before cluster creation. The cluster will initially have a single node, but it will be scaled to a maximum of three nodes if necessary. You want to allocate the minimum number of Pod IP addresses.

Which subnet mask should you use for the Pod IP address range?

A.
/21
A.
/21
Answers
B.
/22
B.
/22
Answers
C.
/23
C.
/23
Answers
D.
/25
D.
/25
Answers
Suggested answer: B

Explanation:

https://cloud.google.com/kubernetes-engine/docs/how-to/aliasips#cluster_sizing_secondary_range_pods

Reference: https://cloud.google.com/kubernetes-engine/docs/how-to/alias-ips

https://cloud.google.com/kubernetes-engine/docs/how-to/flexible-pod-cidr

https://cloud.google.com/kubernetes-engine/docs/concepts/alias-ips#defaults_limits

You have created a firewall with rules that only allow traffic over HTTP, HTTPS, and SSH ports. Whiletesting, you specifically try to reach the server over multiple ports and protocols; however, you donot see any denied connections in the firewall logs. You want to resolve the issue.

What should you do?

A.
Enable logging on the default Deny Any Firewall Rule.
A.
Enable logging on the default Deny Any Firewall Rule.
Answers
B.
Enable logging on the VM Instances that receive traffic.
B.
Enable logging on the VM Instances that receive traffic.
Answers
C.
Create a logging sink forwarding all firewall logs with no filters.
C.
Create a logging sink forwarding all firewall logs with no filters.
Answers
D.
Create an explicit Deny Any rule and enable logging on the new rule.
D.
Create an explicit Deny Any rule and enable logging on the new rule.
Answers
Suggested answer: D

Explanation:

https://cloud.google.com/vpc/docs/firewall-rules-logging#egress_deny_example

You can only enable Firewall Rules Logging for rules in a Virtual Private Cloud (VPC) network. Legacy networks are not supported. Firewall Rules Logging only records TCP and UDP connections. Although you can create a firewall rule applicable to other protocols, you cannot log their connections. You cannot enable Firewall Rules Logging for the implied deny ingress and implied allow egress rules. Log entries are written from the perspective of virtual machine (VM) instances. Log entries are only created if a firewall rule has logging enabled and if the rule applies to traffic sent to or from the VM.

Entries are created according to the connection logging limits on a best effort basis. The number of connections that can be logged in a given interval is based on the machine type. Changes to firewall rules can be viewed in VPC audit logs. https://cloud.google.com/vpc/docs/firewall-ruleslogging#specifications

In your company, two departments with separate GCP projects (code-dev and data-dev) in the same organization need to allow full cross-communication between all of their virtual machines in GCP.

Each department has one VPC in its project and wants full control over their network. Neither department intends to recreate its existing computing resources. You want to implement a solution that minimizes cost.

Which two steps should you take? (Choose two.)

A.
Connect both projects using Cloud VPN.
A.
Connect both projects using Cloud VPN.
Answers
B.
Connect the VPCs in project code-dev and data-dev using VPC Network Peering.
B.
Connect the VPCs in project code-dev and data-dev using VPC Network Peering.
Answers
C.
Enable Shared VPC in one project (e. g., code-dev), and make the second project (e. g., data-dev) a service project.
C.
Enable Shared VPC in one project (e. g., code-dev), and make the second project (e. g., data-dev) a service project.
Answers
D.
Enable firewall rules to allow all ingress traffic from all subnets of project code-dev to all instances in project data-dev, and vice versa.
D.
Enable firewall rules to allow all ingress traffic from all subnets of project code-dev to all instances in project data-dev, and vice versa.
Answers
E.
Create a route in the code-dev project to the destination prefixes in project data-dev and use nexthop as the default gateway, and vice versa.
E.
Create a route in the code-dev project to the destination prefixes in project data-dev and use nexthop as the default gateway, and vice versa.
Answers
Suggested answer: B, D

You need to create a GKE cluster in an existing VPC that is accessible from on-premises. You must meet the following requirements:

IP ranges for pods and services must be as small as possible.

The nodes and the master must not be reachable from the internet.

You must be able to use kubectl commands from on-premises subnets to manage the cluster.

How should you create the GKE cluster?

A.
• Create a private cluster that uses VPC advanced routes.• Set the pod and service ranges as /24.• Set up a network proxy to access the master.
A.
• Create a private cluster that uses VPC advanced routes.• Set the pod and service ranges as /24.• Set up a network proxy to access the master.
Answers
B.
• Create a VPC-native GKE cluster using GKE-managed IP ranges.• Set the pod IP range as /21 and service IP range as /24.• Set up a network proxy to access the master.
B.
• Create a VPC-native GKE cluster using GKE-managed IP ranges.• Set the pod IP range as /21 and service IP range as /24.• Set up a network proxy to access the master.
Answers
C.
• Create a VPC-native GKE cluster using user-managed IP ranges.• Enable a GKE cluster network policy, set the pod and service ranges as /24.• Set up a network proxy to access the master.• Enable master authorized networks.
C.
• Create a VPC-native GKE cluster using user-managed IP ranges.• Enable a GKE cluster network policy, set the pod and service ranges as /24.• Set up a network proxy to access the master.• Enable master authorized networks.
Answers
D.
• Create a VPC-native GKE cluster using user-managed IP ranges.• Enable privateEndpoint on the cluster master.• Set the pod and service ranges as /24.• Set up a network proxy to access the master.• Enable master authorized networks.
D.
• Create a VPC-native GKE cluster using user-managed IP ranges.• Enable privateEndpoint on the cluster master.• Set the pod and service ranges as /24.• Set up a network proxy to access the master.• Enable master authorized networks.
Answers
Suggested answer: D

Explanation:

Creating GKE private clusters with network proxies for controller access When you create a GKE private cluster with a private cluster controller endpoint, the cluster's controller node is inaccessible from the public internet, but it needs to be accessible for administration. By default, clusters can access the controller through its private endpoint, and authorized networks can be defined within the VPC network. To access the controller from on-premises or another VPC network, however, requires additional steps. This is because the VPC network that hosts the controller is owned by Google and cannot be accessed from resources connected through another VPC network peering connection, Cloud VPN or Cloud Interconnect. https://cloud.google.com/solutions/creatingkubernetes- engine-private-clusters-with-net-proxies

You are creating an instance group and need to create a new health check for HTTP(s) load balancing.

Which two methods can you use to accomplish this? (Choose two.)

A.
Create a new health check using the gcloud command line tool.
A.
Create a new health check using the gcloud command line tool.
Answers
B.
Create a new health check using the VPC Network section in the GCP Console.
B.
Create a new health check using the VPC Network section in the GCP Console.
Answers
C.
Create a new health check, or select an existing one, when you complete the load balancer's backend configuration in the GCP Console.
C.
Create a new health check, or select an existing one, when you complete the load balancer's backend configuration in the GCP Console.
Answers
D.
Create a new legacy health check using the gcloud command line tool.
D.
Create a new legacy health check using the gcloud command line tool.
Answers
E.
Create a new legacy health check using the Health checks section in the GCP Console.
E.
Create a new legacy health check using the Health checks section in the GCP Console.
Answers
Suggested answer: A, C

Explanation:

https://cloud.google.com/load-balancing/docs/healthchecks#creating_and_modifying_health_checks

You are in the early stages of planning a migration to GCP. You want to test the functionality of your hybrid cloud design before you start to implement it in production. The design includes services running on a Compute Engine Virtual Machine instance that need to communicate to on-premises servers using private IP addresses. The on-premises servers have connectivity to the internet, but you have not yet established any Cloud Interconnect connections. You want to choose the lowest cost method of enabling connectivity between your instance and on-premises servers and complete the test in 24 hours.

Which connectivity method should you choose?

A.
Cloud VPN
A.
Cloud VPN
Answers
B.
50-Mbps Partner VLAN attachment
B.
50-Mbps Partner VLAN attachment
Answers
C.
Dedicated Interconnect with a single VLAN attachment
C.
Dedicated Interconnect with a single VLAN attachment
Answers
D.
Dedicated Interconnect, but don't provision any VLAN attachments
D.
Dedicated Interconnect, but don't provision any VLAN attachments
Answers
Suggested answer: A
Total 215 questions
Go to page: of 22