ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 6 - 312-40 discussion

Report
Export

Scott Herman works as a cloud security engineer in an IT company. His organization has deployed a 3-tier web application in the same Google Cloud Virtual Private Cloud. Each tier (web interface (UI), API, and database) is scaled independently of others. Scott Herman obtained a requirement that the network traffic should always access the database using the API and any request coming directly from the web interface to the database should not be allowed. How should Scott configure the network with minimal steps?

A.
By adding tags to each tier and setting up firewall rules to allow the desired traffic flow
Answers
A.
By adding tags to each tier and setting up firewall rules to allow the desired traffic flow
B.
By adding tags to each tier and setting up routes to allow the desired traffic flow
Answers
B.
By adding tags to each tier and setting up routes to allow the desired traffic flow
C.
By setting up software-based firewalls on individual VMs
Answers
C.
By setting up software-based firewalls on individual VMs
D.
By adding each tier to a different subnetwork
Answers
D.
By adding each tier to a different subnetwork
Suggested answer: A

Explanation:

In Google Cloud Virtual Private Cloud (VPC), network tags are used to apply firewall rules to specific instances. Scott can use these tags to control the traffic flow between the tiers of the web application. Here's how he can configure the network:

1.Assign Network Tags: Assign unique network tags to the instances in each tier -- for example, 'ui-tag' for the web interface, 'api-tag' for the API, and 'db-tag' for the database.

1.Create Firewall Rules: Create firewall rules that allow traffic from the API tier to the database tier by specifying the 'api-tag' as the source filter and 'db-tag' as the target filter.

1.Restrict Direct Access: Ensure that there are no rules allowing direct traffic from the 'ui-tag' to the 'db-tag', effectively blocking any direct requests from the web interface to the database.

1.Apply Rules: Apply the firewall rules to the respective instances based on their tags.

By using network tags and firewall rules, Scott can ensure that the database is only accessible via the API, and direct access from the UI is not permitted.

Google Cloud documentation on setting up firewall rules and using network tags1.

asked 18/09/2024
Jerome Fortin
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first