Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam Professional Cloud Developer All Questions

View all questions & answers for the Professional Cloud Developer exam

Exam Professional Cloud Developer topic 1 question 131 discussion

Actual exam question from Google's Professional Cloud Developer
Question #: 131
Topic #: 1
[All Professional Cloud Developer Questions]

Your security team is auditing all deployed applications running in Google Kubernetes Engine. After completing the audit, your team discovers that some of the applications send traffic within the cluster in clear text. You need to ensure that all application traffic is encrypted as quickly as possible while minimizing changes to your applications and maintaining support from Google. What should you do?

  • A. Use Network Policies to block traffic between applications.
  • B. Install Istio, enable proxy injection on your application namespace, and then enable mTLS.
  • C. Define Trusted Network ranges within the application, and configure the applications to allow traffic only from those networks.
  • D. Use an automated process to request SSL Certificates for your applications from Let's Encrypt and add them to your applications.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
scaenruy
Highly Voted 2 years, 10 months ago
I vote B https://cloud.google.com/istio/docs/istio-on-gke/installing (deprecated)
upvoted 8 times
Blueocean
2 years, 10 months ago
https://cloud.google.com/service-mesh/docs/by-example/mtls option B
upvoted 6 times
...
...
thewalker
Most Recent 4 months ago
Selected Answer: B
Istio and mTLS: Istio is a service mesh that provides a powerful way to manage and secure traffic between applications in a Kubernetes cluster. Enabling mTLS (mutual TLS) with Istio ensures that all communication between services is encrypted and authenticated. Benefits of using Istio and mTLS: Minimal Application Changes: Istio works transparently with your applications. You don't need to modify your application code to enable encryption. Centralized Management: Istio provides a single point of control for managing security policies across your cluster. Google Support: Istio is a Google-supported project, so you can rely on Google's expertise and documentation. Comprehensive Security: mTLS provides both encryption and authentication, ensuring that only authorized services can communicate with each other.
upvoted 1 times
thewalker
4 months ago
Why the other options are less suitable: A. Network Policies: While Network Policies can restrict traffic, they don't inherently encrypt it. They are more about controlling which pods can communicate with others, not about securing the communication itself. C. Trusted Network Ranges: This approach focuses on network-level security but doesn't address the core issue of application-to-application communication. It also requires changes to your applications to configure them to trust specific networks. D. Let's Encrypt: Let's Encrypt is great for securing public-facing applications, but it's not designed for internal service-to-service communication within a Kubernetes cluster. It would require significant changes to your applications and infrastructure.
upvoted 1 times
...
...
Xoxoo
11 months ago
Selected Answer: B
Answer: B Istio enhances the security of microservices by providing features such as mutual TLS (Transport Layer Security) authentication between services, access controls, and encryption of communication channels.
upvoted 2 times
...
__rajan__
1 year, 2 months ago
Selected Answer: B
Istio is a service mesh that can be used to encrypt traffic between applications in a GKE cluster. It does this by injecting a sidecar proxy into each pod. The sidecar proxy intercepts all traffic to and from the pod and encrypts it using mTLS (mutual TLS).
upvoted 2 times
...
purushi
1 year, 3 months ago
Selected Answer: B
Istio is suitable for providing cutting edge concerns to the services running in the GKE cluster. Istio provides security, fault tolerance and resiliency out of the box.
upvoted 1 times
...
omermahgoub
1 year, 10 months ago
Selected Answer: B
B. Install Istio, enable proxy injection on your application namespace, and then enable mTLS. Istio is a service mesh that runs within your Kubernetes cluster and provides a set of features, such as traffic management, service discovery, and automatic encryption of traffic between services using mutual Transport Layer Security (mTLS). By installing Istio and enabling proxy injection on your application namespace, you can quickly and easily enable mTLS for all traffic within the cluster without making changes to your applications. Once the proxy injection is enabled, Istio automatically adds the necessary sidecar proxies to each pod in the namespace and configures them to encrypt traffic.
upvoted 1 times
omermahgoub
1 year, 10 months ago
C. Define Trusted Network ranges within the application, and configure the applications to allow traffic only from those networks. It does not provide any encryption for the traffic, it only allows traffic from specific IP ranges.
upvoted 1 times
...
omermahgoub
1 year, 10 months ago
D. Use an automated process to request SSL Certificates for your applications from Let's Encrypt and add them to your applications. It can encrypt the traffic between the client and the application but it doesn't cover the traffic inside the cluster.
upvoted 1 times
...
omermahgoub
1 year, 10 months ago
A. Use Network Policies to block traffic between applications network policies are used to control traffic between pods in the cluster, it can help to secure the communication but it doesn't provide any encryption
upvoted 1 times
...
...
zellck
1 year, 11 months ago
Selected Answer: B
B is the answer. https://cloud.google.com/istio/docs/istio-on-gke/overview Istio gives you the following benefits: - Secure service-to-service communication in a cluster with strong identity-based authentication and authorization.
upvoted 1 times
...
tomato123
2 years, 3 months ago
Selected Answer: B
B is correct
upvoted 3 times
...
jdx000
2 years, 4 months ago
Selected Answer: B
B should work. It's the only answer with a solution without blocking or restricting the cluster traffic
upvoted 2 times
...
szl0144
2 years, 6 months ago
B is correct
upvoted 2 times
...
yogi_508
2 years, 7 months ago
will go with D. A,C are no where in context( traffic should be encrypted) if there is Anthos Service Mesh instead of Istio in B then it is definitely B.
upvoted 1 times
...
htakami
2 years, 8 months ago
This question/answers are outdated... Google stop supporting Istio implementations and suggest to migrate to ASM. Option B seems more reasonable, but depends on the date it was written.
upvoted 2 times
...
ParagSanyashiv
2 years, 10 months ago
The question is not about blocking the traffic. D is the correct answer.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...