ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 121 - Professional Cloud Network Engineer discussion

Report
Export

In your project my-project, you have two subnets in a Virtual Private Cloud (VPC): subnet-a with IP range 10.128.0.0/20 and subnet-b with IP range 172.16.0.0/24. You need to deploy database servers in subneta.

You will also deploy the application servers and web servers in subnet-b. You want to configure firewall rules that only allow database traffic from the application servers to the database servers.

What should you do?

A.
Create network tag app-server and service account [email protected] the tag to the application servers, and associate the service account with the database servers.Run the following command:gcloud compute firewall-rules create app-db-firewall-rule \--action allow \--direction ingress \--rules top:3306 \--source-tags app-server \--target-service-accounts [email protected]
Answers
A.
Create network tag app-server and service account [email protected] the tag to the application servers, and associate the service account with the database servers.Run the following command:gcloud compute firewall-rules create app-db-firewall-rule \--action allow \--direction ingress \--rules top:3306 \--source-tags app-server \--target-service-accounts [email protected]
B.
Create service accounts [email protected] and sa-db@myproject. iam.gserviceaccount.com. Associate service account sa-app with the application servers, and associate the service account sa-db with the database servers. Run the following command:gcloud compute firewall-rules create app-db-firewall-ru--allow TCP:3306 \--source-service-accounts [email protected] \--target-service-accounts sa-db@my-
Answers
B.
Create service accounts [email protected] and sa-db@myproject. iam.gserviceaccount.com. Associate service account sa-app with the application servers, and associate the service account sa-db with the database servers. Run the following command:gcloud compute firewall-rules create app-db-firewall-ru--allow TCP:3306 \--source-service-accounts [email protected] \--target-service-accounts sa-db@my-
C.
Create service accounts [email protected] and sa-db@myproject. iam.gserviceaccount.com. Associate the service account sa-app with the application servers, and associate the service account sa-db with the database servers. Run the following command:gcloud compute firewall-rules create app-db-firewall-ru--allow TCP:3306 \--source-ranges 10.128.0.0/20 \--source-service-accounts [email protected] \--target-service-accounts [email protected]
Answers
C.
Create service accounts [email protected] and sa-db@myproject. iam.gserviceaccount.com. Associate the service account sa-app with the application servers, and associate the service account sa-db with the database servers. Run the following command:gcloud compute firewall-rules create app-db-firewall-ru--allow TCP:3306 \--source-ranges 10.128.0.0/20 \--source-service-accounts [email protected] \--target-service-accounts [email protected]
D.
Create network tags app-server and db-server. Add the app-server tag to the application servers, and add the db-server tag to the database servers. Run the following command:gcloud compute firewall-rules create app-db-firewall-rule \--action allow \--direction ingress \--rules tcp:3306 \--source-ranges 10.128.0.0/20 \--source-tags app-server \--target-tags db-server
Answers
D.
Create network tags app-server and db-server. Add the app-server tag to the application servers, and add the db-server tag to the database servers. Run the following command:gcloud compute firewall-rules create app-db-firewall-rule \--action allow \--direction ingress \--rules tcp:3306 \--source-ranges 10.128.0.0/20 \--source-tags app-server \--target-tags db-server
Suggested answer: D
asked 18/09/2024
Daniel Ramos
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first