What should you do?

You want to deploy a VPN Gateway to connect your on-premises network to GCP. You are using a non BGP-capable on-premises VPN device. You want to minimize downtime and operational overhead when your network grows. The device supports only IKEv2, and you want to follow Google-recommended practices. What should you...

February 22, 2025 No Comments READ MORE +

How should you configure your firewall rules?

You created a new VPC for your development team. You want to allow access to the resources in this VPC via SSH only. How should you configure your firewall rules?A . Create two firewall rules: one to block all traffic with priority 0, and another to allow port 22 with...

February 22, 2025 No Comments READ MORE +

Which session affinity should you choose?

You have deployed a new internal application that provides HTTP and TFTP services to on-premises hosts. You want to be able to distribute traffic across multiple Compute Engine instances, but need to ensure that clients are sticky to a particular instance across both services. Which session affinity should you choose?A...

February 21, 2025 No Comments READ MORE +

What is the most likely cause of this problem?

Your on-premises data center has 2 routers connected to your Google Cloud environment through a VPN on each router. All applications are working correctly; however, all of the traffic is passing across a single VPN instead of being load-balanced across the 2 connections as desired. During troubleshooting you find: •...

February 20, 2025 No Comments READ MORE +

What should you do?

You have created a firewall with rules that only allow traffic over HTTP, HTTPS, and SSH ports. While testing, you specifically try to reach the server over multiple ports and protocols; however, you do not see any denied connections in the firewall logs. You want to resolve the issue. What...

February 13, 2025 No Comments READ MORE +

How should you set up permissions for the networking team?

Your company has a security team that manages firewalls and SSL certificates. It also has a networking team that manages the networking resources. The networking team needs to be able to read firewall rules, but should not be able to create, modify, or delete them. How should you set up...

February 11, 2025 No Comments READ MORE +

What should you do?

You need to give each member of your network operations team least-privilege access to create, modify, and delete Cloud Interconnect VLAN attachments. What should you do?A . Assign each user the editor role.B . Assign each user the compute.networkAdmin role.C . Give each user the following permissions only: compute.interconnectAttachments.create, compute.interconnectAttachments.get.D...

February 6, 2025 No Comments READ MORE +

In the GCP Console, what should you do?

One instance in your VPC is configured to run with a private IP address only. You want to ensure that even if this instance is deleted, its current private IP address will not be automatically assigned to a different instance. In the GCP Console, what should you do?A . Assign...

February 5, 2025 No Comments READ MORE +

What should you do?

Your company offers a popular gaming service. Your instances are deployed with private IP addresses, and external access is granted through a global load balancer. You believe you have identified a potential malicious actor, but aren't certain you have the correct client IP address. You want to identify this actor...

February 5, 2025 No Comments READ MORE +

What should you do?

Your company offers a popular gaming service. Your instances are deployed with private IP addresses, and external access is granted through a global load balancer. You have recently engaged a traffic-scrubbing service and want to restrict your origin to allow connections only from the traffic-scrubbing service. What should you do?A...

February 4, 2025 No Comments READ MORE +