exam questions

Exam Professional Cloud Architect All Questions

View all questions & answers for the Professional Cloud Architect exam

Exam Professional Cloud Architect topic 1 question 130 discussion

Actual exam question from Google's Professional Cloud Architect
Question #: 130
Topic #: 1
[All Professional Cloud Architect Questions]

Your company has a networking team and a development team. The development team runs applications on Compute Engine instances that contain sensitive data. The development team requires administrative permissions for Compute Engine. Your company requires all network resources to be managed by the networking team. The development team does not want the networking team to have access to the sensitive data on the instances. What should you do?

  • A. 1. Create a project with a standalone VPC and assign the Network Admin role to the networking team. 2. Create a second project with a standalone VPC and assign the Compute Admin role to the development team. 3. Use Cloud VPN to join the two VPCs.
  • B. 1. Create a project with a standalone Virtual Private Cloud (VPC), assign the Network Admin role to the networking team, and assign the Compute Admin role to the development team.
  • C. 1. Create a project with a Shared VPC and assign the Network Admin role to the networking team. 2. Create a second project without a VPC, configure it as a Shared VPC service project, and assign the Compute Admin role to the development team.
  • D. 1. Create a project with a standalone VPC and assign the Network Admin role to the networking team. 2. Create a second project with a standalone VPC and assign the Compute Admin role to the development team. 3. Use VPC Peering to join the two VPCs.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Nalo1
Highly Voted 3 years, 4 months ago
Selected Answer: B
For the same project , same VPC, Network Admin role to the networking team, and Compute Admin role to the development team. What is the need for another project?
upvoted 56 times
TonyKGH
1 year, 9 months ago
For full separation of the teams you will need to use a shared VPC in this case. If you compare the two roles you will see that Compute Admin includes the permissions of the Network Admin so with option B you don't separate the teams as Compute Admin includes compute.network.* permissions (and others). https://cloud.google.com/iam/docs/understanding-roles
upvoted 13 times
leslie19671
1 year, 6 months ago
Complete separation was not required. However, the networking team shouldn't have access to the compute engine. For this, no need a full separation. Any better idea?
upvoted 2 times
...
hogtrough
1 year, 3 months ago
They're getting the Compute Admin permissions either way. The key words in the statement are actually "Create a second project without a VPC, configure it as a Shared VPC service project." Since the VPC being used doesn't exist in their project, they're unable to manage network changes.
upvoted 6 times
awsgcparch
8 months, 3 weeks ago
love this explanation
upvoted 1 times
...
...
...
...
victory108
Highly Voted 3 years, 9 months ago
C. 1. Create a project with a Shared VPC and assign the Network Admin role to the networking team. 2. Create a second project without a VPC, configure it as a Shared VPC service project, and assign the Compute Admin role to the development team.
upvoted 31 times
Nick89GR
3 years ago
I do not understand why do we need to have a shared VPC. With B the dev team will not be able to make any network change and the Network team will not be able to do any change on the CE. I would say B is the correct answer although C does not seem wrong
upvoted 18 times
medi01
1 year, 12 months ago
Because Compute Admin has compute.* permissions, which includes Network Admin's.
upvoted 6 times
...
sfsdeniso
2 years, 5 months ago
because dev team will have several projects - for dev, qa and prod per app they are developing so C is most scalable solution
upvoted 6 times
BeCalm
2 years, 1 month ago
How does 1 additional VPC solve what you're expressing -- that the dev team needs a dev and qa environment.
upvoted 1 times
...
...
...
...
francisco94
Most Recent 4 days, 9 hours ago
Selected Answer: B
Solution B: No need for another project
upvoted 1 times
...
Mikeliz
1 month, 2 weeks ago
Selected Answer: C
A shared VPC is a better option in this case. https://cloud.google.com/vpc/docs/shared-vpc
upvoted 1 times
...
igrek
2 months ago
Selected Answer: B
Compute Network Admin (roles/compute.networkAdmin) Permissions to create, modify, and delete networking resources, except for firewall rules and SSL certificates. The network admin role allows read-only access to firewall rules, SSL certificates, and instances (to view their ephemeral IP addresses). The network admin role does not allow a user to create, start, stop, or delete instances.
upvoted 1 times
...
guilhermisPT
2 months, 1 week ago
Selected Answer: C
We should use Option C, because following the documentation Network admin has a lot of compute instance permissions. So option C for sure
upvoted 1 times
...
plumbig11
3 months, 2 weeks ago
Selected Answer: C
The key here is shared VPC service.
upvoted 1 times
...
pcamaster
6 months, 3 weeks ago
This is tricky. Both B & C could seem okay, but C is the right answer. The compute.networkAdmin role gives broad permissions on the project, which also affects compute instances. For instance, it gives "compute.instances.get" and "compute.instances.use" permissions. Even though this roles does not grant permissions to start/stop/create/delete instances, it still gives broad permissions on compute instances. This gets much clearer if we do the same analysis on the other role: compute.Admin. This role gives permissions on "compute.*", which also includes "compute.networks.*". That is exactly what we don't want to happen. If we spawn the VPC and the compute VMs in the same project, then compute admins will be able to mess around with the VPC. That is why we need to separate networks and compute within 2 projects, unless creating custom roles, etc. Shared VPC are aimed at that. Therefore, C is the right answer.
upvoted 2 times
...
Toothpick
8 months, 3 weeks ago
If it was compute instance admin instead of compute admin, then B would do it, But since They specifically mention Compute Admin, C is the only option. But that being said, there's nothing stopping the apps team from creating a vpc in the new project since they have all the required permissions for it, kind of an oversight
upvoted 2 times
...
yas_cloud
1 year, 1 month ago
While IAM roles can technically achieve some separation in option B, Shared VPC (option C) offers a more secure, well-defined, and recommended approach for this scenario. It reduces the risk of accidental access and promotes a cleaner separation of duties between the networking and development teams.
upvoted 2 times
...
Amrita2012
1 year, 2 months ago
Selected Answer: C
Shared ~VPC provide a feature to have segregation of such roles.
upvoted 2 times
...
Tirthankar17
1 year, 2 months ago
Selected Answer: C
The project I am part of follows exactly the same architecture as Option C.
upvoted 1 times
...
OrangeTiger
1 year, 2 months ago
Selected Answer: C
C is ok.
upvoted 1 times
...
spuyol
1 year, 2 months ago
No one is a valid answer (sorry for that) because all answers assign COMPUTE ADMIN to the developers. If Your company requires all network resources to be managed by the networking team you must NOT assigne COMPUTE ADMIN to the developers because you give them the power to managed the network. No matter the project they are assigned, they could do things forbidden for the requeriment.
upvoted 1 times
...
Wiss7
1 year, 4 months ago
Selected Answer: C
Not B because Compute Admin has networking roles.
upvoted 2 times
...
rsvd
1 year, 5 months ago
Selected Answer: C
https://cloud.google.com/vpc/docs/shared-vpc When you use Shared VPC, you designate a project as a host project and attach one or more other service projects to it. The VPC networks in the host project are called Shared VPC networks. Eligible resources from service projects can use subnets in the Shared VPC network. Shared VPC lets organization administrators delegate administrative responsibilities, such as creating and managing instances, to Service Project Admins while maintaining centralized control over network resources like subnets, routes, and firewalls.
upvoted 5 times
...
arpana_naa
1 year, 5 months ago
Selected Answer: C
Two reasons for me to select C: 1. Compute admin has network admin roles included 2. If Dev team adds more projects for testing/staging later, they can be centrally handled by the host project and Google also recommends separation of duties
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago