Google Professional Cloud Network Engineer Exam Practice Questions (P. 1)
- Full Access (308 questions)
- One Year of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #1
You need to restrict access to your Google Cloud load-balanced application so that only specific IP addresses can connect.
What should you do?
What should you do?
- ACreate a secure perimeter using the Access Context Manager feature of VPC Service Controls and restrict access to the source IP range of the allowed clients and Google health check IP ranges.
- BCreate a secure perimeter using VPC Service Controls, and mark the load balancer as a service restricted to the source IP range of the allowed clients and Google health check IP ranges.
- CTag the backend instances "application," and create a firewall rule with target tag "application" and the source IP range of the allowed clients and Google health check IP ranges.Most Voted
- DLabel the backend instances "application," and create a firewall rule with the target label "application" and the source IP range of the allowed clients and Google health check IP ranges.
Correct Answer:
C
Reference:
https://link.springer.com/chapter/10.1007/978-1-4842-1004-8_4
C
Reference:
https://link.springer.com/chapter/10.1007/978-1-4842-1004-8_4
send
light_mode
delete
Question #2
Your end users are located in close proximity to us-east1 and europe-west1. Their workloads need to communicate with each other. You want to minimize cost and increase network efficiency.
How should you design this topology?
How should you design this topology?
- ACreate 2 VPCs, each with their own regions and individual subnets. Create 2 VPN gateways to establish connectivity between these regions.
- BCreate 2 VPCs, each with their own region and individual subnets. Use external IP addresses on the instances to establish connectivity between these regions.
- CCreate 1 VPC with 2 regional subnets. Create a global load balancer to establish connectivity between the regions.
- DCreate 1 VPC with 2 regional subnets. Deploy workloads in these subnets and have them communicate using private RFC1918 IP addresses.Most Voted
Correct Answer:
D
VPC Network Peering enables you to peer VPC networks so that workloads in different VPC networks can communicate in private RFC 1918 space. Traffic stays within Google's network and doesn't traverse the public internet.
Reference:
https://cloud.google.com/vpc/docs/vpc-peering
D
VPC Network Peering enables you to peer VPC networks so that workloads in different VPC networks can communicate in private RFC 1918 space. Traffic stays within Google's network and doesn't traverse the public internet.
Reference:
https://cloud.google.com/vpc/docs/vpc-peering
send
light_mode
delete
Question #3
Your organization is deploying a single project for 3 separate departments. Two of these departments require network connectivity between each other, but the third department should remain in isolation. Your design should create separate network administrative domains between these departments. You want to minimize operational overhead.
How should you design the topology?
How should you design the topology?
- ACreate a Shared VPC Host Project and the respective Service Projects for each of the 3 separate departments.
- BCreate 3 separate VPCs, and use Cloud VPN to establish connectivity between the two appropriate VPCs.
- CCreate 3 separate VPCs, and use VPC peering to establish connectivity between the two appropriate VPCs.Most Voted
- DCreate a single project, and deploy specific firewall rules. Use network tags to isolate access between the departments.
Correct Answer:
C
send
light_mode
delete
Question #4
You are migrating to Cloud DNS and want to import your BIND zone file.
Which command should you use?
Which command should you use?
- Agcloud dns record-sets import ZONE_FILE --zone MANAGED_ZONE
- Bgcloud dns record-sets import ZONE_FILE --replace-origin-ns --zone MANAGED_ZONE
- Cgcloud dns record-sets import ZONE_FILE --zone-file-format --zone MANAGED_ZONEMost Voted
- Dgcloud dns record-sets import ZONE_FILE --delete-all-existing --zone MANAGED ZONE
Correct Answer:
C
Once you have the exported file from your other provider, you can use the gcloud dns record-sets import command to import it into your managed zone.
To import record-sets, you use the dns record-sets import command. The --zone-file-format flag tells importto expect a BIND zone formatted file. If you omit this flag, import expects a YAML-formatted records file.
Reference:
https://medium.com/@prashantapaudel/gcp-certification-series-2-4-planning-and-configuring-network-resources-8045ac2cc2ac
C
Once you have the exported file from your other provider, you can use the gcloud dns record-sets import command to import it into your managed zone.
To import record-sets, you use the dns record-sets import command. The --zone-file-format flag tells importto expect a BIND zone formatted file. If you omit this flag, import expects a YAML-formatted records file.
Reference:
https://medium.com/@prashantapaudel/gcp-certification-series-2-4-planning-and-configuring-network-resources-8045ac2cc2ac
send
light_mode
delete
Question #5
You created a VPC network named Retail in auto mode. You want to create a VPC network named Distribution and peer it with the Retail VPC.
How should you configure the Distribution VPC?
How should you configure the Distribution VPC?
- ACreate the Distribution VPC in auto mode. Peer both the VPCs via network peering.
- BCreate the Distribution VPC in custom mode. Use the CIDR range 10.0.0.0/9. Create the necessary subnets, and then peer them via network peering.Most Voted
- CCreate the Distribution VPC in custom mode. Use the CIDR range 10.128.0.0/9. Create the necessary subnets, and then peer them via network peering.
- DRename the default VPC as "Distribution" and peer it via network peering.
Correct Answer:
B
Reference:
https://cloud.google.com/vpc/docs/using-vpc
B
Reference:
https://cloud.google.com/vpc/docs/using-vpc
send
light_mode
delete
Question #6
You are using a third-party next-generation firewall to inspect traffic. You created a custom route of 0.0.0.0/0 to route egress traffic to the firewall. You want to allow your VPC instances without public IP addresses to access the BigQuery and Cloud Pub/Sub APIs, without sending the traffic through the firewall.
Which two actions should you take? (Choose two.)
Which two actions should you take? (Choose two.)
- ATurn on Private Google Access at the subnet level.Most Voted
- BTurn on Private Google Access at the VPC level.
- CTurn on Private Services Access at the VPC level.
- DCreate a set of custom static routes to send traffic to the external IP addresses of Google APIs and services via the default internet gateway.Most Voted
- ECreate a set of custom static routes to send traffic to the internal IP addresses of Google APIs and services via the default internet gateway.
Correct Answer:
AD
send
light_mode
delete
Question #7
All the instances in your project are configured with the custom metadata enable-oslogin value set to FALSE and to block project-wide SSH keys. None of the instances are set with any SSH key, and no project-wide SSH keys have been configured. Firewall rules are set up to allow SSH sessions from any IP address range. You want to SSH into one instance.
What should you do?
What should you do?
- AOpen the Cloud Shell SSH into the instance using gcloud compute ssh.Most Voted
- BSet the custom metadata enable-oslogin to TRUE, and SSH into the instance using a third-party tool like putty or ssh.
- CGenerate a new SSH key pair. Verify the format of the private key and add it to the instance. SSH into the instance using a third-party tool like putty or ssh.
- DGenerate a new SSH key pair. Verify the format of the public key and add it to the project. SSH into the instance using a third-party tool like putty or ssh.
Correct Answer:
A
send
light_mode
delete
Question #8
You work for a university that is migrating to GCP.
These are the cloud requirements:
"¢ On-premises connectivity with 10 Gbps
"¢ Lowest latency access to the cloud
"¢ Centralized Networking Administration Team
New departments are asking for on-premises connectivity to their projects. You want to deploy the most cost-efficient interconnect solution for connecting the campus to Google Cloud.
What should you do?
These are the cloud requirements:
"¢ On-premises connectivity with 10 Gbps
"¢ Lowest latency access to the cloud
"¢ Centralized Networking Administration Team
New departments are asking for on-premises connectivity to their projects. You want to deploy the most cost-efficient interconnect solution for connecting the campus to Google Cloud.
What should you do?
- AUse Shared VPC, and deploy the VLAN attachments and Interconnect in the host project.Most Voted
- BUse Shared VPC, and deploy the VLAN attachments in the service projects. Connect the VLAN attachment to the Shared VPC's host project.
- CUse standalone projects, and deploy the VLAN attachments in the individual projects. Connect the VLAN attachment to the standalone projects' Interconnects.
- DUse standalone projects and deploy the VLAN attachments and Interconnects in each of the individual projects.
Correct Answer:
A
A
GPT-4o - Answer
Choosing option A, which involves using a Shared VPC and deploying VLAN attachments and Interconnect in the host project, suits the needs expressed in the scenario because it centralizes the management of network components, minimizing configurations across multiple projects. This approach not only ensures efficient use of resources by sharing the network services among various projects, it also helps maintain a higher control level for the centralized networking team, which is key for streamlined administration and connectivity maintenance. This setup aligns perfectly with achieving the necessary performance in a cost-effective manner while adhering to the university's requirements for cloud connectivity.
send
light_mode
delete
Question #9
You have deployed a new internal application that provides HTTP and TFTP services to on-premises hosts. You want to be able to distribute traffic across multiple
Compute Engine instances, but need to ensure that clients are sticky to a particular instance across both services.
Which session affinity should you choose?
Compute Engine instances, but need to ensure that clients are sticky to a particular instance across both services.
Which session affinity should you choose?
- ANone
- BClient IPMost Voted
- CClient IP and protocol
- DClient IP, port and protocol
Correct Answer:
B
B
GPT-4o - Answer
Choosing Client IP for session affinity, as specified in choice B, is the correct approach when you want to distribute HTTP and TFTP traffic across multiple servers but maintain client stickiness to specific instances for both services. This method ensures that all requests from the same client IP address are directed to the same server, irrespective of the service (HTTP or TFTP) being used. It is crucial to note that session affinity based on protocol and port would not be effective for TFTP, as it uses UDP, which does not support session affinity.
send
light_mode
delete
Question #10
You created a new VPC network named Dev with a single subnet. You added a firewall rule for the network Dev to allow HTTP traffic only and enabled logging.
When you try to log in to an instance in the subnet via Remote Desktop Protocol, the login fails. You look for the Firewall rules logs in Stackdriver Logging, but you do not see any entries for blocked traffic. You want to see the logs for blocked traffic.
What should you do?
When you try to log in to an instance in the subnet via Remote Desktop Protocol, the login fails. You look for the Firewall rules logs in Stackdriver Logging, but you do not see any entries for blocked traffic. You want to see the logs for blocked traffic.
What should you do?
- ACheck the VPC flow logs for the instance.
- BTry connecting to the instance via SSH, and check the logs.
- CCreate a new firewall rule to allow traffic from port 22, and enable logs.
- DCreate a new firewall rule with priority 65500 to deny all traffic, and enable logs.Most Voted
Correct Answer:
D
GPT-4o - Answer
To better understand and monitor the activity within your network, especially regarding blocked traffic, consider implementing a broad firewall rule that denies all traffic and has logging enabled. This approach ensures visibility into all denied attempts, helping you comprehensively oversee your network security and troubleshoot connectivity issues effectively. This can be crucial for diagnosing why certain connections, like your RDP attempts, fail without corresponding logs in existing settings.
send
light_mode
delete
All Pages
