ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 54 - Professional Cloud Security Engineer discussion

Report
Export

Your team needs to make sure that their backend database can only be accessed by the frontend application and no other instances on the network.

How should your team design this network?

A.
Create an ingress firewall rule to allow access only from the application to the database using firewall tags.
Answers
A.
Create an ingress firewall rule to allow access only from the application to the database using firewall tags.
B.
Create a different subnet for the frontend application and database to ensure network isolation.
Answers
B.
Create a different subnet for the frontend application and database to ensure network isolation.
C.
Create two VPC networks, and connect the two networks using Cloud VPN gateways to ensure network isolation.
Answers
C.
Create two VPC networks, and connect the two networks using Cloud VPN gateways to ensure network isolation.
D.
Create two VPC networks, and connect the two networks using VPC peering to ensure network isolation.
Answers
D.
Create two VPC networks, and connect the two networks using VPC peering to ensure network isolation.
Suggested answer: A

Explanation:

'However, even though it is possible to uses tags for target filtering in this manner, we recommend that you use service accounts where possible. Target tags are not access-controlled and can be changed by someone with the instanceAdmin role while VMs are in service. Service accounts are access-controlled, meaning that a specific user must be explicitly authorized to use a service account. There can only be one service account per instance, whereas there can be multiple tags. Also, service accounts assigned to a VM can only be changed when the VM is stopped'

asked 18/09/2024
Alireza Noura
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first