exam questions

Exam Professional Cloud Network Engineer All Questions

View all questions & answers for the Professional Cloud Network Engineer exam

Exam Professional Cloud Network Engineer topic 1 question 10 discussion

Actual exam question from Google's Professional Cloud Network Engineer
Question #: 10
Topic #: 1
[All Professional Cloud Network Engineer Questions]

You created a new VPC network named Dev with a single subnet. You added a firewall rule for the network Dev to allow HTTP traffic only and enabled logging.
When you try to log in to an instance in the subnet via Remote Desktop Protocol, the login fails. You look for the Firewall rules logs in Stackdriver Logging, but you do not see any entries for blocked traffic. You want to see the logs for blocked traffic.
What should you do?

  • A. Check the VPC flow logs for the instance.
  • B. Try connecting to the instance via SSH, and check the logs.
  • C. Create a new firewall rule to allow traffic from port 22, and enable logs.
  • D. Create a new firewall rule with priority 65500 to deny all traffic, and enable logs.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
elguije
Highly Voted 4 years, 4 months ago
I think correct answer should be D. https://cloud.google.com/blog/products/identity-security/google-cloud-firewall-rules-logging-how-and-why-you-should-use-it "Since we have implicit ingress and the denial rule is not being logged, we create a “deny all” rule with priority 65534 to capture anything that gets denied" https://cloud.google.com/vpc/docs/firewall-rules-logging
upvoted 26 times
AzureDP900
1 year, 11 months ago
D. Create a new firewall rule with priority 65500 to deny all traffic, and enable logs.
upvoted 2 times
...
...
saraali
Most Recent 2 months, 2 weeks ago
Selected Answer: D
The correct answer is D. Create a new firewall rule with priority 65500 to deny all traffic, and enable logs. To see logs for blocked traffic, you need to enable logging for traffic explicitly denied by firewall rules. In this case, the existing rule allows only HTTP traffic, and since RDP is not allowed, it is being denied. However, without a specific deny rule with logging enabled, you won't see logs for the blocked traffic.
upvoted 1 times
...
xhilmi
10 months, 3 weeks ago
Selected Answer: D
Choose option D. When you create a new firewall rule with priority 65500 and set it to deny all traffic, and then enable logging, you effectively create a "catch-all" rule that logs all denied traffic. This can be useful for troubleshooting and identifying traffic that is being blocked by the firewall. Here's the breakdown: Priority 65500: Firewall rules are processed in ascending order of priority. By setting the priority to 65500, this rule becomes one of the last rules to be evaluated, effectively serving as a catch-all rule after other rules have been checked. Deny All Traffic: This rule denies all traffic, including HTTP traffic, RDP traffic, and any other traffic. It acts as a safety net to catch and log any unexpected or unwanted traffic. Enable Logs: Enabling logging for this rule allows you to see entries in the firewall logs for any traffic that matches this rule.
upvoted 2 times
...
Mo7y
1 year, 4 months ago
Selected Answer: D
Answer is D, it's the only way to capture anything that would have otherwise been denied by the default deny all implicit rule
upvoted 2 times
...
Ben756
1 year, 7 months ago
Selected Answer: A
A is correct. Option B is not relevant as Remote Desktop Protocol uses port 3389, not port 22, which is used by SSH. Option C is not necessary as it would allow traffic on port 22 for SSH, but it does not address the issue with Remote Desktop Protocol. Option D is not a good solution because it would block all traffic, including legitimate traffic, and make it difficult to troubleshoot the issue.
upvoted 1 times
kapara
1 year, 2 months ago
I will not discuss all the answers except D. If the number is low, the priority is higher. Therefore, 65500 is considered very high, and it's likely that this will block nothing.
upvoted 1 times
...
...
pk349
1 year, 9 months ago
D: • VPC Flow Logs interacts with firewall rules in the following ways: • Egress packets are sampled before egress firewall rules. Even if an egress firewall rule denies outbound packets, those packets can be sampled by VPC Flow Logs. • Ingress packets are sampled after ingress firewall rules. If an ingress firewall rule denies inbound packets, those packets are not sampled by VPC Flow Logs.
upvoted 1 times
...
spoxman
1 year, 11 months ago
Selected Answer: D
D is correct because the default deny-all rule does not have logging enabled
upvoted 1 times
...
anfemu
2 years, 2 months ago
Selected Answer: C
Firewall rule create on port 80 (http) He can't ingress to port 22 Create a new firewall rule on port 22 and check the logs. Answer is C. Option D is enable by default. Google create a two firewall rules when a project is created. One firewall rule for deny ingress traffic and another firewall rule for allow egress traffic.
upvoted 1 times
GeorgS
1 year, 7 months ago
It's about logging. Logging is not enabled for the Deny Any Policies and can't be enabled.
upvoted 1 times
...
...
VDHdu59
2 years, 2 months ago
Selected Answer: D
D to see the blocked traffic, as asked...
upvoted 2 times
...
GCP72
2 years, 2 months ago
Selected Answer: D
D is correct answer
upvoted 2 times
...
Scott_Hsieh
2 years, 3 months ago
Selected Answer: D
Answer is D
upvoted 2 times
...
svsilence
2 years, 3 months ago
answer is D. implicit deny cant show logs you have to add new log with deny.
upvoted 2 times
...
kumarp6
2 years, 9 months ago
Answer is D
upvoted 4 times
...
desertlotus1211
2 years, 10 months ago
Asnwer is D: Implicit FW rule [ingress or egress] are NOT logged...
upvoted 1 times
...
Arad
2 years, 11 months ago
D is correct.
upvoted 1 times
...
jeeet_
3 years, 4 months ago
Initially I chose A. (Wrong). Correct is D. https://cloud.google.com/vpc/docs/flow-logs Ingress packets are sampled after ingress firewall rules. If an ingress firewall rule denies inbound packets, those packets are not sampled by VPC Flow Logs. --> it says, if an ingress firewall rule denies something, that won't be logged in VPC flow logs. That makes Option A out and wrong. for sake of explaination--> Egress packets are sampled before egress firewall rules. Even if an egress firewall rule denies outbound packets, those packets can be sampled by VPC Flow Logs. which means--> creating Option B and C -> makes no sense, as question talks about RDP. Option D -> by default without explanation is the answer. as you cannot monitor implied deny rules, you create a custom one to monitor. makes more sense.
upvoted 3 times
...
qch2012
3 years, 7 months ago
D is incorrect because of the priority setting 65500, the implicit deny has lowest priority 65535, if you create a deny all rule in 65500, it would have impact on other rules with priority between 65500 - 65534. A is correct in this case . For ingress traffic, VPC flow logs works after firewall rule , since firewall rule only allow HTTP traffic, it means the rest blocked traffic will be sampled by VPC flow log
upvoted 1 times
sc00by
3 years, 6 months ago
you cannot inspect traffic with VPC flow because: Ingress packets are sampled after ingress firewall rules. If an ingress firewall rule denies inbound packets, those packets are not sampled by VPC Flow Logs.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago