exam questions

Exam Professional Cloud Security Engineer All Questions

View all questions & answers for the Professional Cloud Security Engineer exam

Exam Professional Cloud Security Engineer topic 1 question 189 discussion

Actual exam question from Google's Professional Cloud Security Engineer
Question #: 189
Topic #: 1
[All Professional Cloud Security Engineer Questions]

Your application is deployed as a highly available, cross-region solution behind a global external HTTP(S) load balancer. You notice significant spikes in traffic from multiple IP addresses, but it is unknown whether the IPs are malicious. You are concerned about your application's availability. You want to limit traffic from these clients over a specified time interval.

What should you do?

  • A. Configure a throttle action by using Google Cloud Armor to limit the number of requests per client over a specified time interval.
  • B. Configure a rate_based_ban action by using Google Cloud Armor and set the ban_duration_sec parameter to the specified lime interval.
  • C. Configure a firewall rule in your VPC to throttle traffic from the identified IP addresses.
  • D. Configure a deny action by using Google Cloud Armor to deny the clients that issued too many requests over the specified time interval.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Xoxoo
7 months, 1 week ago
Selected Answer: A
To limit traffic from the identified IP addresses over a specified time interval, you should configure a throttle action by using Google Cloud Armor. This will limit the number of requests per client over a specified time interval, which can help prevent your application from being overwhelmed by traffic spikes. Option B is not recommended because it would ban the clients that issue too many requests over the specified time interval, which might not be desirable if the clients are legitimate. Option C is not recommended because it would throttle traffic from all IP addresses that match the firewall rule, which might not be desirable if some of the IP addresses are legitimate. Option D is not recommended because it would deny the clients that issue too many requests over the specified time interval, which might not be desirable if the clients are legitimate. Therefore, Option A is the most appropriate choice for limiting traffic from multiple IP addresses over a specified time interval.
upvoted 2 times
...
ArizonaClassics
8 months ago
When dealing with potential DDoS attacks or unexpected spikes in traffic, it's essential to handle the situation carefully to maintain the availability of your application. Here are the options you have: A. Configure a throttle action by using Google Cloud Armor: Google Cloud Armor allows you to define security policies that can throttle clients based on the number of incoming requests over a certain time period. This ensures that legitimate users are not completely blocked while also preventing any one client from overloading the system.
upvoted 1 times
...
cyberpunk21
8 months, 1 week ago
Selected Answer: A
All can be done but option A is correct cuz a sentence "number of requests per client."
upvoted 2 times
...
a190d62
8 months, 4 weeks ago
Selected Answer: A
A you want to limit, not ban traffic https://cloud.google.com/armor/docs/rate-limiting-overview#throttle-traffic
upvoted 4 times
...
K1SMM
8 months, 4 weeks ago
A https://cloud.google.com/blog/products/identity-security/announcing-new-cloud-armor-rate-limiting-adaptive-protection-and-bot-defense
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago