Google Professional Cloud Network Engineer Exam Practice Questions (P. 2)
- Full Access (237 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #6
You are using a third-party next-generation firewall to inspect traffic. You created a custom route of 0.0.0.0/0 to route egress traffic to the firewall. You want to allow your VPC instances without public IP addresses to access the BigQuery and Cloud Pub/Sub APIs, without sending the traffic through the firewall.
Which two actions should you take? (Choose two.)
Which two actions should you take? (Choose two.)
- ATurn on Private Google Access at the subnet level.Most Voted
- BTurn on Private Google Access at the VPC level.
- CTurn on Private Services Access at the VPC level.
- DCreate a set of custom static routes to send traffic to the external IP addresses of Google APIs and services via the default internet gateway.Most Voted
- ECreate a set of custom static routes to send traffic to the internal IP addresses of Google APIs and services via the default internet gateway.
Correct Answer:
CE
Reference:
https://cloud.google.com/vpc/docs/private-access-options
CE
Reference:
https://cloud.google.com/vpc/docs/private-access-options
send
light_mode
delete
Question #7
All the instances in your project are configured with the custom metadata enable-oslogin value set to FALSE and to block project-wide SSH keys. None of the instances are set with any SSH key, and no project-wide SSH keys have been configured. Firewall rules are set up to allow SSH sessions from any IP address range. You want to SSH into one instance.
What should you do?
What should you do?
- AOpen the Cloud Shell SSH into the instance using gcloud compute ssh.Most Voted
- BSet the custom metadata enable-oslogin to TRUE, and SSH into the instance using a third-party tool like putty or ssh.
- CGenerate a new SSH key pair. Verify the format of the private key and add it to the instance. SSH into the instance using a third-party tool like putty or ssh.
- DGenerate a new SSH key pair. Verify the format of the public key and add it to the project. SSH into the instance using a third-party tool like putty or ssh.
Correct Answer:
B
Reference:
https://cloud.google.com/compute/docs/storing-retrieving-metadata
B
Reference:
https://cloud.google.com/compute/docs/storing-retrieving-metadata
send
light_mode
delete
Question #8
You work for a university that is migrating to GCP.
These are the cloud requirements:
"¢ On-premises connectivity with 10 Gbps
"¢ Lowest latency access to the cloud
"¢ Centralized Networking Administration Team
New departments are asking for on-premises connectivity to their projects. You want to deploy the most cost-efficient interconnect solution for connecting the campus to Google Cloud.
What should you do?
These are the cloud requirements:
"¢ On-premises connectivity with 10 Gbps
"¢ Lowest latency access to the cloud
"¢ Centralized Networking Administration Team
New departments are asking for on-premises connectivity to their projects. You want to deploy the most cost-efficient interconnect solution for connecting the campus to Google Cloud.
What should you do?
- AUse Shared VPC, and deploy the VLAN attachments and Interconnect in the host project.Most Voted
- BUse Shared VPC, and deploy the VLAN attachments in the service projects. Connect the VLAN attachment to the Shared VPC's host project.
- CUse standalone projects, and deploy the VLAN attachments in the individual projects. Connect the VLAN attachment to the standalone projects' Interconnects.
- DUse standalone projects and deploy the VLAN attachments and Interconnects in each of the individual projects.
Correct Answer:
A
A

Choosing option A, which involves using a Shared VPC and deploying VLAN attachments and Interconnect in the host project, suits the needs expressed in the scenario because it centralizes the management of network components, minimizing configurations across multiple projects. This approach not only ensures efficient use of resources by sharing the network services among various projects, it also helps maintain a higher control level for the centralized networking team, which is key for streamlined administration and connectivity maintenance. This setup aligns perfectly with achieving the necessary performance in a cost-effective manner while adhering to the university's requirements for cloud connectivity.
send
light_mode
delete
Question #9
You have deployed a new internal application that provides HTTP and TFTP services to on-premises hosts. You want to be able to distribute traffic across multiple
Compute Engine instances, but need to ensure that clients are sticky to a particular instance across both services.
Which session affinity should you choose?
Compute Engine instances, but need to ensure that clients are sticky to a particular instance across both services.
Which session affinity should you choose?
- ANone
- BClient IPMost Voted
- CClient IP and protocol
- DClient IP, port and protocol
Correct Answer:
B
B

Choosing Client IP for session affinity, as specified in choice B, is the correct approach when you want to distribute HTTP and TFTP traffic across multiple servers but maintain client stickiness to specific instances for both services. This method ensures that all requests from the same client IP address are directed to the same server, irrespective of the service (HTTP or TFTP) being used. It is crucial to note that session affinity based on protocol and port would not be effective for TFTP, as it uses UDP, which does not support session affinity.
send
light_mode
delete
Question #10
You created a new VPC network named Dev with a single subnet. You added a firewall rule for the network Dev to allow HTTP traffic only and enabled logging.
When you try to log in to an instance in the subnet via Remote Desktop Protocol, the login fails. You look for the Firewall rules logs in Stackdriver Logging, but you do not see any entries for blocked traffic. You want to see the logs for blocked traffic.
What should you do?
When you try to log in to an instance in the subnet via Remote Desktop Protocol, the login fails. You look for the Firewall rules logs in Stackdriver Logging, but you do not see any entries for blocked traffic. You want to see the logs for blocked traffic.
What should you do?
- ACheck the VPC flow logs for the instance.
- BTry connecting to the instance via SSH, and check the logs.
- CCreate a new firewall rule to allow traffic from port 22, and enable logs.
- DCreate a new firewall rule with priority 65500 to deny all traffic, and enable logs.Most Voted
Correct Answer:
A
A

To better understand and monitor the activity within your network, especially regarding blocked traffic, consider implementing a broad firewall rule that denies all traffic and has logging enabled. This approach ensures visibility into all denied attempts, helping you comprehensively oversee your network security and troubleshoot connectivity issues effectively. This can be crucial for diagnosing why certain connections, like your RDP attempts, fail without corresponding logs in existing settings.
send
light_mode
delete
All Pages