Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam Professional Cloud Architect All Questions

View all questions & answers for the Professional Cloud Architect exam

Exam Professional Cloud Architect topic 4 question 7 discussion

Actual exam question from Google's Professional Cloud Architect
Question #: 7
Topic #: 4
[All Professional Cloud Architect Questions]

For this question, refer to the EHR Healthcare case study. You are responsible for designing the Google Cloud network architecture for Google Kubernetes
Engine. You want to follow Google best practices. Considering the EHR Healthcare business and technical requirements, what should you do to reduce the attack surface?

  • A. Use a private cluster with a private endpoint with master authorized networks configured.
  • B. Use a public cluster with firewall rules and Virtual Private Cloud (VPC) routes.
  • C. Use a private cluster with a public endpoint with master authorized networks configured.
  • D. Use a public cluster with master authorized networks enabled and firewall rules.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
jask
Highly Voted 3 years, 2 months ago
It should be A. Public endpoint access disabled is the most secure option as it prevents all internet access to the control plane. This is a good choice if you have configured your on-premises network to connect to Google Cloud using Cloud Interconnect (EHR has enabled this) or Cloud VPN. If you disable public endpoint access, then you must configure authorized networks for the private endpoint. If you don't do this, you can only connect to the private endpoint from cluster nodes or VMs in the same subnet as the cluster. Public endpoint access enabled, authorized networks enabled: This is a good choice if you need to administer the cluster from source networks that are not connected to your cluster's VPC network using Cloud Interconnect or Cloud VPN (but EHR is already using interconnect) So answer C is wrong. Reference- https://cloud.google.com/kubernetes-engine/docs/concepts/private-cluster-concept
upvoted 69 times
turbo8p
2 years ago
Agreed with this answer but just one thing to point out. I can't find any info mention that "EHR is already using interconnect". So this should not be use as the main factor to make a decision.
upvoted 2 times
...
bogdant
2 years, 10 months ago
I agree with @Jask's answer above. According to the documentation, answer A is the most secure and in my opinion correct: "Public endpoint access disabled: This is the most secure option as it prevents all internet access to the control plane. This is a good choice if you have configured your on-premises network to connect to Google Cloud using Cloud Interconnect or Cloud VPN." I just don't understand why so many people voted C. Ref: https://cloud.google.com/kubernetes-engine/docs/concepts/private-cluster-concept#overview ,
upvoted 2 times
Begum
2 years, 1 month ago
Configure NAT as mater authorized networks
upvoted 1 times
...
...
BalaGCPArch
1 year, 12 months ago
"Customer-facing applications are web-based, and many have recently been containerized to run on a group of Kubernetes clusters" This statement in the case study tells it needs to be Public, So i assume the answer should be A
upvoted 3 times
...
...
victory108
Highly Voted 3 years, 3 months ago
A. Use a private cluster with a private endpoint with master authorized networks configured. --> Private clusters run nodes without external IP addresses, and optionally run their cluster control plane without a publicly-reachable endpoint. Additionally, private clusters do not allow Google Cloud IP addresses to access the control plane endpoint by default. Using private clusters with authorized networks makes your control plane reachable only by the allowed CIDRs, by nodes within your cluster's VPC, and by Google's internal production jobs that manage your control plane.
upvoted 8 times
...
192dcc7
Most Recent 2 months, 1 week ago
Selected Answer: A
They do not have Interconnect today. But considering high-performance network requirements it will be interconnect. if interconnect is there no reason to have public end point enabled for cluster management. Public end point is never enabled on on a cloud system (for almost any service) for any medium/large scale enterprise.
upvoted 1 times
...
someone2011
1 year, 2 months ago
A: https://cloud.google.com/kubernetes-engine/docs/concepts/private-cluster-concept Public endpoint access disabled: This is the most secure option as it prevents all internet access to the control plane. This is a good choice if you have configured your on-premises network to connect to Google Cloud using Cloud Interconnect or Cloud VPN. If you disable public endpoint access, then you must configure authorized networks for the private endpoint. If you don't do this, you can only connect to the private endpoint from cluster nodes or VMs in the same subnet as the cluster.
upvoted 1 times
...
BiddlyBdoyng
1 year, 5 months ago
A seems the most secure as it's the only option that makes access to the control plane private using authorized networks work to limit access even further. Although the nodes are private the pods can still be accessed via an externally exposed service "An external client with a source IP address on the internet can connect to an external Service of type LoadBalancer"
upvoted 1 times
...
JC0926
1 year, 7 months ago
Selected Answer: A
A. Use a private cluster with a private endpoint with master authorized networks configured. Using a private cluster with a private endpoint and master authorized networks configured is the best way to reduce the attack surface in Google Kubernetes Engine (GKE). A private cluster ensures that the nodes have private IP addresses, which are not accessible from the internet. The private endpoint allows access to the GKE API server only within the same VPC or through a secure connection (e.g., VPN or VPC peering). Configuring master authorized networks restricts access to the GKE control plane to specific CIDR blocks, further securing the environment and adhering to EHR Healthcare's business and technical requirements.
upvoted 4 times
...
rr4444
1 year, 8 months ago
Selected Answer: C
C is correct. A is wrong because, despite what everyone is thinking, because you cannot have a private endpoint for the control plane WITH authorised networks. It's a contradiction of ideas. The authorised networks are specifically to manage access to a public endpoint to only a set RFC1918 addresses, for example. Which, ironically, is covered by the link that everyone is pasting referring to answer A https://cloud.google.com/kubernetes-engine/docs/concepts/private-cluster-concept
upvoted 5 times
pigracer
1 year, 7 months ago
from the link: "If you disable public endpoint access, then you must configure authorized networks for the private endpoint. If you don't do this, you can only connect to the private endpoint from cluster nodes or VMs in the same subnet as the cluster. With this setting, authorized networks must be internal IP addresses." I combed through the documentation to see what you were saying but couldn't find it and only found this. So I think it's A
upvoted 7 times
...
...
Jeena345
1 year, 9 months ago
Selected Answer: A
Public endpoint access disabled is the most secure option as it prevents all internet access to the control plane. This is a good choice if you have configured your on-premises network to connect to Google Cloud using Cloud Interconnect (EHR has enabled this) or Cloud VPN. If you disable public endpoint access, then you must configure authorized networks for the private endpoint. If you don't do this, you can only connect to the private endpoint from cluster nodes or VMs in the same subnet as the cluster. Public endpoint access enabled, authorized networks enabled: This would be a good choice if you need to administer the cluster from source networks that are not connected to your cluster's VPC network (using Cloud Interconnect or Cloud VPN) but EHR is already using interconnect! Reference: https://cloud.google.com/kubernetes-engine/docs/concepts/private-cluster-concept
upvoted 2 times
...
RVivek
1 year, 9 months ago
Selected Answer: C
Private cluter will have only one end Private end point and It is not poosible to autherize any specific Master network
upvoted 1 times
...
tdotcat
1 year, 10 months ago
Selected Answer: A
A is good
upvoted 1 times
...
omermahgoub
1 year, 11 months ago
To reduce the attack surface and follow Google's best practices for network architecture in Google Kubernetes Engine, you should use a private cluster with a private endpoint and configure master authorized networks. Private clusters allow you to create clusters with nodes that are not reachable from the public internet. This reduces the attack surface by making it more difficult for an attacker to target the nodes. Additionally, by using a private endpoint and configuring master authorized networks, you can further restrict access to the cluster to only authorized users and networks. This helps to ensure that only authorized users and systems can access the cluster and helps to prevent unauthorized access.
upvoted 2 times
omermahgoub
1 year, 11 months ago
Using a public cluster with firewall rules and Virtual Private Cloud (VPC) routes may provide some level of security, but it does not provide the same level of protection as a private cluster. Similarly, using a private cluster with a public endpoint and master authorized networks can also provide some level of security, but it is not as secure as using a private cluster with a private endpoint and master authorized networks. In summary, to reduce the attack surface and follow best practices, it is recommended to use a private cluster with a private endpoint and configure master authorized networks.
upvoted 1 times
...
...
megumin
2 years ago
Selected Answer: A
A is ok
upvoted 1 times
...
Mahmoud_E
2 years, 1 month ago
Selected Answer: A
A is the best answer https://cloud.google.com/kubernetes-engine/docs/concepts/private-cluster-concept#overview
upvoted 1 times
...
abdelilahfa
2 years, 1 month ago
Selected Answer: C
Public endpoint access enabled, authorized networks enabled (recommended): This option provides restricted access to the control plane from source IP addresses that you define. This is a good choice if you don't have existing VPN infrastructure or have remote users or branch offices that connect over the public internet instead of the corporate VPN and Cloud Interconnect or Cloud VPN. https://cloud.google.com/kubernetes-engine/docs/how-to/hardening-your-cluster#restrict_network_access_to_the_control_plane_and_nodes
upvoted 3 times
...
jabrrJ68w02ond1
2 years, 2 months ago
Selected Answer: A
I'll go with A as it is the most secure option. C would be more cost-effective for when EHR has no plans for Cloud Interconnect / VPN (which they do!).
upvoted 1 times
...
RitwickKumar
2 years, 3 months ago
Selected Answer: A
Why would we need access to control plane from outside. It is better to keep everything private and expose the web/ui through an external ingress.
upvoted 3 times
...
cdcollector
2 years, 5 months ago
Putting a Autn Network on a private endpoint is moot Note: Authorized networks block untrusted IP addresses from outside Google Cloud. Addresses from inside Google Cloud (such as traffic from Compute Engine virtual machines (VMs), Cloud Functions and Cloud Run) can reach your control plane using HTTPS, provided that they have the necessary Kubernetes credentials.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...