Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam Professional Cloud Network Engineer All Questions

View all questions & answers for the Professional Cloud Network Engineer exam

Exam Professional Cloud Network Engineer topic 1 question 54 discussion

Actual exam question from Google's Professional Cloud Network Engineer
Question #: 54
Topic #: 1
[All Professional Cloud Network Engineer Questions]

Your company has just launched a new critical revenue-generating web application. You deployed the application for scalability using managed instance groups, autoscaling, and a network load balancer as frontend. One day, you notice severe bursty traffic that the caused autoscaling to reach the maximum number of instances, and users of your application cannot complete transactions. After an investigation, you think it as a DDOS attack. You want to quickly restore user access to your application and allow successful transactions while minimizing cost.
Which two steps should you take? (Choose two.)

  • A. Use Cloud Armor to blacklist the attacker's IP addresses.
  • B. Increase the maximum autoscaling backend to accommodate the severe bursty traffic.
  • C. Create a global HTTP(s) load balancer and move your application backend to this load balancer.
  • D. Shut down the entire application in GCP for a few hours. The attack will stop when the application is offline.
  • E. SSH into the backend compute engine instances, and view the auth logs and syslogs to further understand the nature of the attack.
Show Suggested Answer Hide Answer
Suggested Answer: AB 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Alex_74
Highly Voted 3 years, 3 months ago
A & C Cloud Armor is the solution to prevent and mitigate attack (DDOS SQL injection and so on), it's a revenue generating so have to be alive and protected. No Cloud Armor is not a firewall. Using the CA language you have tons of prebuild rules to evaluate and block the malicious traffic in automatic way. You can put the rule blocking a specific traffic but it's not there the value (you have the firewall for that). Than you need C cause Cloud Armor require an HTTP(s) load balancer (that can be used cause it's a web application)
upvoted 25 times
walkwolf3
2 years, 11 months ago
This would be a long term solution if DDOS is confirmed. The quickest solution is to recover the service, which is BE.
upvoted 2 times
...
Windy_Welly88
2 years, 12 months ago
I'd go A & C. These days you can get Cloud Armor for trial, and this product will mitigate current AND sustained DDOS attacks. Would you REALLY autoscale for a massive DDOS attack, do you think Google will let you do this for free? You wont need to spend time looking at logs and traffic as it will tell you straight away who the actors are.. And finally, since this is a critical revenue-earning application any downtime would be a significant cost. Only way to ensure uptime would be to use Cloud Armor.
upvoted 2 times
AzureDP900
1 year, 12 months ago
A, C make sense
upvoted 2 times
...
...
...
Hybrid_Cloud_boy
Highly Voted 3 years, 11 months ago
I think B,E are actually correct. A and C would increase cost to global LB, change app architecture, and could potential block legitimate traffic since you “think” it is a DDoS, but do i not know. I do not think google would recommend blocking traffic unless you KNOW. So a temp increase in auto scale, with further investigation is the best course of action. It may lead to some short-term cost increase, but ultimately less cost increase than moving to global LB premium tier with cloudarmor.
upvoted 14 times
GeorgS
1 year, 8 months ago
But E just says log in with SSH and look, to get get a better view. So with B and E you won't block anything, you will just increase your serverpool
upvoted 3 times
...
...
nkastanas
Most Recent 4 months, 1 week ago
Selected Answer: AC
cant be B, you have to minimize the cost
upvoted 2 times
...
nkastanas
4 months, 3 weeks ago
Selected Answer: AC
B. Increase the maximum autoscaling backend to accommodate the severe bursty traffic: This approach might provide temporary relief but does not address the root cause (the DDoS attack). It could also significantly increase costs without solving the underlying issue.
upvoted 1 times
...
hamish88
6 months, 3 weeks ago
A and C are the correct two steps we should take. These steps complete the purpose. The question is not asking for two separate approaches.
upvoted 1 times
...
Adjqwert
9 months, 1 week ago
There is some amount of Cloud Armor integration supported with Network Passthrough Load Balancers: There is some amount of integration supported for Cloud Armor with Network Load Balancers: https://cloud.google.com/armor/docs/advanced-network-ddos
upvoted 1 times
...
gonlafer
9 months, 3 weeks ago
Selected Answer: AB
The objective is to quickly restore user access. So A & B. Later you can move to an HTTP LB which makes sense also.
upvoted 2 times
...
PhuocT
10 months, 3 weeks ago
Selected Answer: AC
AC is the best answer. you can only use Cloud Armor with HTTP LB, not network LB.
upvoted 1 times
...
Chavoz
11 months ago
Selected Answer: AC
AC is the correct
upvoted 2 times
...
BenMS
11 months ago
Selected Answer: AC
This is the textbook scenario for Cloud Armor + GCLB, so given that this is a Google exam, it seems pretty obvious to select AC. It's actually really simple to switch the BE from one LB to another and would not add huge cost.
upvoted 1 times
...
xhilmi
11 months, 1 week ago
Selected Answer: AB
A. Use Cloud Armor to blacklist the attacker's IP addresses. Cloud Armor is a security service on Google Cloud that allows you to defend your applications and services from Distributed Denial of Service (DDoS) attacks. By configuring blacklisting rules in Cloud Armor, you can block traffic from specific IP addresses or ranges associated with the attack, helping to mitigate the impact on your application. B. Increase the maximum autoscaling backend to accommodate the severe bursty traffic. By increasing the maximum number of instances in your autoscaling backend, you allow your infrastructure to dynamically scale up to handle the increased traffic during the DDoS attack. This helps ensure that your application can continue to serve legitimate user requests even under heavy load.
upvoted 1 times
...
CloudSISG2023
1 year, 1 month ago
Cloud Armor can only be integrated with HTTP(S) load balancer, it's not supported with NLB. Hence, A is not correct. I'd go with option B & E.
upvoted 3 times
...
sidharthwader
1 year, 2 months ago
B is not a good solution if you increase the scaling it will just keep increasing during a DDOS attacker will you more of your resources and you will pay higher price for malicious attack
upvoted 1 times
DelonBH
1 year ago
DDOS Attack is not confirmed.. "you think".
upvoted 1 times
...
...
didek1986
1 year, 3 months ago
Selected Answer: AB
C is wrony cause changes architecture
upvoted 2 times
...
study_aws1
1 year, 4 months ago
A & B - Option C) of HTTPS Load balancer is not a mandatory requirement. Google Cloud Armor also provides advanced network DDoS protection for external passthrough Network Load Balancers, protocol forwarding, and VMs with public IP addresses. https://cloud.google.com/armor/docs/security-policy-overview Standard network DDoS protection: basic always-on protection for network load balancers, protocol forwarding, or VMs with public IP addresses. This is covered under Google Cloud Armor Standard and does not require any additional subscriptions. Advanced network DDoS protection: additional protections for Managed Protection Plus subscribers who use network load balancers, protocol forwarding, or VMs with public IP addresses. https://cloud.google.com/armor/docs/advanced-network-ddos
upvoted 3 times
...
Hetavi
1 year, 6 months ago
auto scaling is already taken care as mentioned in question. So correct answer is to use Armor and https global load balancer.
upvoted 1 times
...
somnathmaddi
1 year, 6 months ago
Selected Answer: BE
BE Only
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...