ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 54 - Professional Cloud Network Engineer discussion

Report
Export

Your company has just launched a new critical revenue-generating web application. You deployed the application for scalability using managed instance groups, autoscaling, and a network load balancer as frontend. One day, you notice severe bursty traffic that the caused autoscaling to reach the maximum number of instances, and users of your application cannot complete transactions. After an investigation, you think it as a DDOS attack. You want to quickly restore user access to your application and allow successful transactions while minimizing cost.

Which two steps should you take? (Choose two.)

A.
Use Cloud Armor to blacklist the attacker's IP addresses.
Answers
A.
Use Cloud Armor to blacklist the attacker's IP addresses.
B.
Increase the maximum autoscaling backend to accommodate the severe bursty traffic.
Answers
B.
Increase the maximum autoscaling backend to accommodate the severe bursty traffic.
C.
Create a global HTTP(s) load balancer and move your application backend to this load balancer.
Answers
C.
Create a global HTTP(s) load balancer and move your application backend to this load balancer.
D.
Shut down the entire application in GCP for a few hours. The attack will stop when the application is offline.
Answers
D.
Shut down the entire application in GCP for a few hours. The attack will stop when the application is offline.
E.
SSH into the backend compute engine instances, and view the auth logs and syslogs to further understand the nature of the attack.
Answers
E.
SSH into the backend compute engine instances, and view the auth logs and syslogs to further understand the nature of the attack.
Suggested answer: B, E
asked 18/09/2024
Guus Schenkelaars
28 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first