Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam Professional Cloud Architect All Questions

View all questions & answers for the Professional Cloud Architect exam

Exam Professional Cloud Architect topic 1 question 130 discussion

Actual exam question from Google's Professional Cloud Architect
Question #: 130
Topic #: 1
[All Professional Cloud Architect Questions]

Your company has a networking team and a development team. The development team runs applications on Compute Engine instances that contain sensitive data. The development team requires administrative permissions for Compute Engine. Your company requires all network resources to be managed by the networking team. The development team does not want the networking team to have access to the sensitive data on the instances. What should you do?

  • A. 1. Create a project with a standalone VPC and assign the Network Admin role to the networking team. 2. Create a second project with a standalone VPC and assign the Compute Admin role to the development team. 3. Use Cloud VPN to join the two VPCs.
  • B. 1. Create a project with a standalone Virtual Private Cloud (VPC), assign the Network Admin role to the networking team, and assign the Compute Admin role to the development team.
  • C. 1. Create a project with a Shared VPC and assign the Network Admin role to the networking team. 2. Create a second project without a VPC, configure it as a Shared VPC service project, and assign the Compute Admin role to the development team.
  • D. 1. Create a project with a standalone VPC and assign the Network Admin role to the networking team. 2. Create a second project with a standalone VPC and assign the Compute Admin role to the development team. 3. Use VPC Peering to join the two VPCs.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Nalo1
Highly Voted 2 years, 11 months ago
Selected Answer: B
For the same project , same VPC, Network Admin role to the networking team, and Compute Admin role to the development team. What is the need for another project?
upvoted 55 times
TonyKGH
1 year, 5 months ago
For full separation of the teams you will need to use a shared VPC in this case. If you compare the two roles you will see that Compute Admin includes the permissions of the Network Admin so with option B you don't separate the teams as Compute Admin includes compute.network.* permissions (and others). https://cloud.google.com/iam/docs/understanding-roles
upvoted 13 times
leslie19671
1 year, 2 months ago
Complete separation was not required. However, the networking team shouldn't have access to the compute engine. For this, no need a full separation. Any better idea?
upvoted 2 times
...
hogtrough
10 months, 2 weeks ago
They're getting the Compute Admin permissions either way. The key words in the statement are actually "Create a second project without a VPC, configure it as a Shared VPC service project." Since the VPC being used doesn't exist in their project, they're unable to manage network changes.
upvoted 4 times
awsgcparch
4 months ago
love this explanation
upvoted 1 times
...
...
...
...
victory108
Highly Voted 3 years, 4 months ago
C. 1. Create a project with a Shared VPC and assign the Network Admin role to the networking team. 2. Create a second project without a VPC, configure it as a Shared VPC service project, and assign the Compute Admin role to the development team.
upvoted 30 times
Nick89GR
2 years, 7 months ago
I do not understand why do we need to have a shared VPC. With B the dev team will not be able to make any network change and the Network team will not be able to do any change on the CE. I would say B is the correct answer although C does not seem wrong
upvoted 18 times
medi01
1 year, 7 months ago
Because Compute Admin has compute.* permissions, which includes Network Admin's.
upvoted 6 times
...
sfsdeniso
2 years, 1 month ago
because dev team will have several projects - for dev, qa and prod per app they are developing so C is most scalable solution
upvoted 6 times
BeCalm
1 year, 8 months ago
How does 1 additional VPC solve what you're expressing -- that the dev team needs a dev and qa environment.
upvoted 1 times
...
...
...
...
pcamaster
Most Recent 1 month, 3 weeks ago
This is tricky. Both B & C could seem okay, but C is the right answer. The compute.networkAdmin role gives broad permissions on the project, which also affects compute instances. For instance, it gives "compute.instances.get" and "compute.instances.use" permissions. Even though this roles does not grant permissions to start/stop/create/delete instances, it still gives broad permissions on compute instances. This gets much clearer if we do the same analysis on the other role: compute.Admin. This role gives permissions on "compute.*", which also includes "compute.networks.*". That is exactly what we don't want to happen. If we spawn the VPC and the compute VMs in the same project, then compute admins will be able to mess around with the VPC. That is why we need to separate networks and compute within 2 projects, unless creating custom roles, etc. Shared VPC are aimed at that. Therefore, C is the right answer.
upvoted 1 times
...
Toothpick
3 months, 4 weeks ago
If it was compute instance admin instead of compute admin, then B would do it, But since They specifically mention Compute Admin, C is the only option. But that being said, there's nothing stopping the apps team from creating a vpc in the new project since they have all the required permissions for it, kind of an oversight
upvoted 2 times
...
yas_cloud
8 months, 3 weeks ago
While IAM roles can technically achieve some separation in option B, Shared VPC (option C) offers a more secure, well-defined, and recommended approach for this scenario. It reduces the risk of accidental access and promotes a cleaner separation of duties between the networking and development teams.
upvoted 2 times
...
Amrita2012
9 months, 1 week ago
Selected Answer: C
Shared ~VPC provide a feature to have segregation of such roles.
upvoted 2 times
...
Tirthankar17
9 months, 2 weeks ago
Selected Answer: C
The project I am part of follows exactly the same architecture as Option C.
upvoted 1 times
...
OrangeTiger
9 months, 3 weeks ago
Selected Answer: C
C is ok.
upvoted 1 times
...
spuyol
9 months, 3 weeks ago
No one is a valid answer (sorry for that) because all answers assign COMPUTE ADMIN to the developers. If Your company requires all network resources to be managed by the networking team you must NOT assigne COMPUTE ADMIN to the developers because you give them the power to managed the network. No matter the project they are assigned, they could do things forbidden for the requeriment.
upvoted 1 times
...
Wiss7
11 months, 2 weeks ago
Selected Answer: C
Not B because Compute Admin has networking roles.
upvoted 2 times
...
rsvd
1 year ago
Selected Answer: C
https://cloud.google.com/vpc/docs/shared-vpc When you use Shared VPC, you designate a project as a host project and attach one or more other service projects to it. The VPC networks in the host project are called Shared VPC networks. Eligible resources from service projects can use subnets in the Shared VPC network. Shared VPC lets organization administrators delegate administrative responsibilities, such as creating and managing instances, to Service Project Admins while maintaining centralized control over network resources like subnets, routes, and firewalls.
upvoted 5 times
...
arpana_naa
1 year, 1 month ago
Selected Answer: C
Two reasons for me to select C: 1. Compute admin has network admin roles included 2. If Dev team adds more projects for testing/staging later, they can be centrally handled by the host project and Google also recommends separation of duties
upvoted 4 times
...
AdityaGupta
1 year, 1 month ago
Selected Answer: C
Option B suggests creating a single project with a standalone VPC, and assigning both the Network Admin and Compute Admin roles to the respective teams. However, this solution does not enforce the required separation of duties between the networking and development teams. Option C suggests using a Shared VPC. A Shared VPC allows for separation of duties between teams while sharing network resources. The networking team can manage the Shared VPC, and the development team can create Compute Engine instances in the Shared VPC without the networking team having access to the sensitive data on the instances. The development team can be assigned the Compute Admin role for the Shared VPC service project, and the networking team can be assigned the Network Admin role for the Shared VPC host project.
upvoted 3 times
...
piiizu
1 year, 2 months ago
Can this be handled with IAM roles? Yes. Why go through extra effort, in the event you want to add a feature or couple other services, would you still continue tweaking?
upvoted 1 times
...
PKookNN
1 year, 3 months ago
Selected Answer: C
to prevent dev team from having network admin (same project will mean dev team with compute admin will also have network permission). That's my take on this one.
upvoted 2 times
...
capt2101akash
1 year, 4 months ago
Selected Answer: C
It talks about managing all network resources in a company. Google always recommends having a shared VPC to maintain network resources in an organization. The separation of roles adds to the favour of having a shared vpc.
upvoted 1 times
...
riyaztmd
1 year, 4 months ago
Selected Answer: B
C is not correct as it doesn't make sense to have 2 vpcs for managing roles
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...