Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam Professional Cloud Network Engineer All Questions

View all questions & answers for the Professional Cloud Network Engineer exam

Exam Professional Cloud Network Engineer topic 1 question 55 discussion

Actual exam question from Google's Professional Cloud Network Engineer
Question #: 55
Topic #: 1
[All Professional Cloud Network Engineer Questions]

You are creating a new application and require access to Cloud SQL from VPC instances without public IP addresses.
Which two actions should you take? (Choose two.)

  • A. Activate the Service Networking API in your project.
  • B. Activate the Cloud Datastore API in your project.
  • C. Create a private connection to a service producer.
  • D. Create a custom static route to allow the traffic to reach the Cloud SQL API.
  • E. Enable Private Google Access.
Show Suggested Answer Hide Answer
Suggested Answer: AC 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
mlyu
Highly Voted 4 years ago
Answer are A & C C is definitely correct. private services access require private connection In below links stated Service Networking API is required https://cloud.google.com/service-infrastructure/docs/enabling-private-services-access
upvoted 28 times
Alex_74
3 years, 3 months ago
A & C https://cloud.google.com/sql/docs/mysql/private-ip This page provides information about using private IP with Cloud SQL. For step-by-step instructions for configuring a Cloud SQL instance to use private IP, see Configuring private IP.
upvoted 7 times
...
...
ESP_SAP
Highly Voted 4 years ago
Correct Answer are (C) & (E): C: If you are using private IP for any of your Cloud SQL instances, you only need to configure private services access one time for every Google Cloud project that has or needs to connect to a Cloud SQL instance. If your Google Cloud project has a Cloud SQL instance, you can either configure it yourself or let Cloud SQL do it for you to use private IP. Cloud SQL configures private services access for you when all the conditions below are true: https://cloud.google.com/sql/docs/postgres/configure-private-services-access#before_you_begin E: You can enable Private Google access on a subnet level and any VMs on that subnet can access Google APIs by using their internal IP address. https://cloud.google.com/vpc/docs/configure-private-google-access
upvoted 17 times
VivekMishraV
3 years, 6 months ago
For Accessing K8S and Cloud SQL it is Google Private Service Access
upvoted 6 times
...
...
nkastanas
Most Recent 4 months, 2 weeks ago
Selected Answer: AC
It difficult to understand why. in my opinion should be OLNY E or A and C both. Enabling Private Google Access allows VM instances without public IPs to access Google APIs and services. While useful, it's not strictly necessary for Cloud SQL private connectivity if you already have the Service Networking API and private connection configured. However, enabling this can provide additional benefits for accessing other Google services.
upvoted 1 times
...
desertlotus1211
9 months, 1 week ago
Answers are A&E:
upvoted 1 times
...
gonlafer
9 months, 3 weeks ago
Selected Answer: CE
C&E Private google access is a valid option for connecting from GCEs with no public ip
upvoted 1 times
...
bus_karan19
1 year, 1 month ago
Selected Answer: AC
A & C. E is not a correct option because PGA is required only if you want to connect to Google API's (restricted or private).
upvoted 1 times
...
i_0_i
1 year, 3 months ago
Answer should be A&C. There are different ways to consume and provide APIs and services in GCP: https://cloud.google.com/vpc/docs/private-access-options#connect-google-apis --- Private service connect --- Private Google access --- Private services access Among all the given options, only A/C(Private services access) and E(Private Google access) are reasonable. As the answers have to be two, so they can only be A and C. Also, Private Google access is enabled on subnet level, not on VPC level. *For Private services access, its deployment involves the allocation of a specific internal CIDR in the local VPC and creation of a private connection between local VPC and service provider's VPC. This private connection is created using Service Networking API. https://cloud.google.com/vpc/docs/private-services-access *For Private Google access, it applies for accessing the external ip of Google APIs and services from instances with only internal ip addresses https://cloud.google.com/vpc/docs/private-google-access
upvoted 2 times
...
gcpengineer
1 year, 3 months ago
Selected Answer: AC
AC is ans
upvoted 1 times
...
didek1986
1 year, 3 months ago
Selected Answer: AC
should be A,C
upvoted 1 times
...
hyosung
1 year, 4 months ago
Selected Answer: AC
I think the answer is A and C To use private service access, enabling Service Networking API is required on the project as per https://cloud.google.com/service-infrastructure/docs/enabling-private-services-access and it's required to create a private connection after enabling above API. https://cloud.google.com/sql/docs/mysql/private-ip#application_environment_requirements
upvoted 2 times
...
PranavP96
1 year, 7 months ago
Please refer https://cloud.google.com/sql/docs/mysql/private-ip#requirements_for_private_ip It clearly says creating Configuring a Cloud SQL instance and acces is privately we need private services access and Service Networking API must be enabled hence A and C is correct a service
upvoted 1 times
...
Komal697
1 year, 8 months ago
Selected Answer: AE
To access Cloud SQL from VPC instances without public IP addresses, you need to enable Private Google Access on the subnet where the instances are located. Private Google Access allows VMs without public IP addresses to reach Google APIs and services such as Cloud SQL using internal IP addresses. In addition, you need to activate the Service Networking API in your project. This enables you to create a private connection to Cloud SQL using VPC Service Controls. With VPC Service Controls, you can create a private connection between your VPC network and Cloud SQL without requiring an external IP address.
upvoted 2 times
Komal697
1 year, 8 months ago
Option B is incorrect because Cloud Datastore is a NoSQL document database that is not related to Cloud SQL. Option C is incorrect because creating a private connection to a service producer is not necessary to access Cloud SQL from VPC instances without public IP addresses. Option D is also incorrect because creating a custom static route is not necessary to access Cloud SQL from VPC instances without public IP addresses.
upvoted 1 times
desertlotus1211
1 year, 6 months ago
You need to read about service producer network with private access. https://cloud.google.com/vpc/docs/private-services-access#:~:text=Service%20producer%20network,-On%20the%20service&text=The%20service%20producer's%20network%20is,resources%20in%20your%20VPC%20network.
upvoted 1 times
gcpengineer
1 year, 3 months ago
its meant to custom services not google provided services
upvoted 2 times
...
...
...
...
fad3r
1 year, 8 months ago
It's A&C here is the link that shows that: https://cloud.google.com/sql/docs/mysql/configure-private-ip You must enable the Service Networking API for your project. Private services access When you create a new VPC network in your project, you need to configure private services access to allocate an IP address range and create a private service connection. This allows resources in the VPC network to connect to Cloud SQL instances.
upvoted 2 times
...
pk349
1 year, 10 months ago
C is definitely correct. private services access require private connection In below links stated Service Networking API is required Service Networking enables you to offer your managed services on internal IP addresses to service consumers. Service consumers use private services access to privately connect to your service.
upvoted 1 times
...
orwell
2 years, 1 month ago
The question is not mentioning the need of connecting to CloudSQL by its private ip, enabling Network Services API is mandatory for enabling Private Google Access, A&E are the ones.
upvoted 2 times
orwell
2 years, 1 month ago
BUT private service access appears to be the recommended practice, leaving it to A&C
upvoted 1 times
...
...
desertlotus1211
2 years, 2 months ago
Answer is A&E: https://cloud.google.com/service-infrastructure/docs/service-networking/getting-started
upvoted 1 times
desertlotus1211
1 year, 3 months ago
Sorry it's A&C
upvoted 1 times
...
...
[Removed]
2 years, 8 months ago
Between A&C and C&E is confused. Based on the quesiton said ," access to Cloud SQL from VPC with no public IP", it should be means: VM which only with internal IP need access to Cloud SQL Based on the PGA overview, example and its supported services, E is a suitable option at least. https://cloud.google.com/vpc/docs/private-google-access https://cloud.google.com/vpc/docs/private-google-access#example https://cloud.google.com/vpc/docs/private-services-access#private-services-supported-services And about option A, I only found following description: "Service Networking enables you to offer your managed services on internal IP addresses to service consumers" Base on my understanding, it seems to describe the part of services (Cloud SQL) has an internal IP. It was different with this question mentioned. I think C & E is better.
upvoted 1 times
[Removed]
2 years, 8 months ago
Sorry for my mistake, Change my answer to A & C. Because: Private Google Access enabled allows VM instances which only have internal IP addresses (no external IP addresses) to reach the external IP addresses of Google APIs and services. AND https://cloud.google.com/sql/docs/mysql/private-ip
upvoted 3 times
kapara
2 years, 5 months ago
C&E are the correct answers A has nothing to do with this. Network Service API -"Provides automatic management of network configurations necessary for certain services." C - https://cloud.google.com/vpc/docs/private-services-access#service_producer_network E - Configuring a Cloud SQL instance to use private IP requires private services access. Private services access lets you create private connections between your VPC network and the underlying Google service producer's VPC network - https://cloud.google.com/sql/docs/mysql/private-ip#allocated_ip_address_ranges And regarding the Cloud SQL your understanding is wrong, nothing is specified for the Cloud SQL the only thing that is mentioned in the question is that the VM's has no public IP address as infrared from the question: "VPC instances without public IP addresses"
upvoted 1 times
AMohanty
2 years, 2 months ago
Option C is valid for Service Producers. Questions doesn't say about external Service Producers so we assume its by Google. We don't need to create a private connection for connecting to Google SQL. So I will go with A and E.
upvoted 2 times
...
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...