exam questions

Exam Professional Cloud Security Engineer All Questions

View all questions & answers for the Professional Cloud Security Engineer exam

Exam Professional Cloud Security Engineer topic 1 question 111 discussion

Actual exam question from Google's Professional Cloud Security Engineer
Question #: 111
Topic #: 1
[All Professional Cloud Security Engineer Questions]

Your company requires the security and network engineering teams to identify all network anomalies within and across VPCs, internal traffic from VMs to VMs, traffic between end locations on the internet and VMs, and traffic between VMs to Google Cloud services in production. Which method should you use?

  • A. Define an organization policy constraint.
  • B. Configure packet mirroring policies.
  • C. Enable VPC Flow Logs on the subnet.
  • D. Monitor and analyze Cloud Audit Logs.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Tabayashi
Highly Voted 2 years, 6 months ago
I think the answer is (C). VPC Flow Logs samples each VM's TCP, UDP, ICMP, ESP, and GRE flows. Both inbound and outbound flows are sampled. These flows can be between the VM and another VM, a host in your on-premises data center, a Google service, or a host on the internet. https://cloud.google.com/vpc/docs/flow-logs
upvoted 13 times
...
hybridpro
Highly Voted 2 years, 4 months ago
B should be the answer. For detecting network anomalies, you need to have payload and header data as well to be effective. Besides C is saying to enable VPC flow logs on a subnet which won't serve our purpose either.
upvoted 8 times
...
dija123
Most Recent 7 months, 3 weeks ago
Selected Answer: B
Backet mirroring policies allow you to mirror all traffic passing through a specific network interface or VPC route to a designated destination (e.g., another VM, a Cloud Storage bucket). This captured traffic can then be analyzed by security and network engineers using tools like Suricata or Security Command Center for advanced anomaly detection. This approach provides the necessary level of detail and flexibility for identifying anomalies across all the mentioned traffic types
upvoted 1 times
...
b6f53d8
9 months, 3 weeks ago
C is only for subnet, and we need control in many VPCs, so I prefer B
upvoted 1 times
...
[Removed]
10 months, 2 weeks ago
Selected Answer: C
C - we need more than just the VMs here.
upvoted 1 times
...
sebG35
10 months, 4 weeks ago
The answer is C. The needs is identify all network anomalies within and across VPCs, internal traffic from VMs to VMs ... B- Does not meet all needs. It is limited to the VM and don't cover the needs : across VPCs https://cloud.google.com/vpc/docs/packet-mirroring?hl=en C- Cover all needs https://cloud.google.com/vpc/docs/flow-logs?hl=en
upvoted 1 times
...
[Removed]
1 year, 3 months ago
Selected Answer: B
"B" When there's a need for broad and deep network analysis, only packet mirroring can achieve this. Here's the specific use case that matches the quest. https://cloud.google.com/vpc/docs/packet-mirroring#enterprise_security
upvoted 3 times
...
tifo16
1 year, 10 months ago
https://cloud.google.com/vpc/docs/packet-mirroring#enterprise_security Security and network engineering teams must ensure that they are catching all anomalies and threats that might indicate security breaches and intrusions. They mirror all traffic so that they can complete a comprehensive inspection of suspicious flows. Because attacks can span multiple packets, security teams must be able to get all packets for each flow.
upvoted 3 times
tifo16
1 year, 10 months ago
Should be B
upvoted 2 times
...
...
Rightsaidfred
1 year, 11 months ago
As it is a close tie and ambiguity between B&C, I would say it is C - VPC Flow Logs in this instance, as Question 121 is focusing more on Packet Mirroring with the IDS Use Case.
upvoted 2 times
[Removed]
1 year, 3 months ago
C is limited to subnet level which is not enough to address all the needs in the question.
upvoted 1 times
...
...
marmar11111
1 year, 11 months ago
Selected Answer: B
Should be B
upvoted 3 times
...
hcnh
1 year, 11 months ago
Selected Answer: C
C is the answer as B has the limitation against question The mirroring happens on the virtual machine (VM) instances, not on the network. Consequently, Packet Mirroring consumes additional bandwidth on the VMs.
upvoted 3 times
...
AwesomeGCP
2 years ago
Selected Answer: B
B. Configure packet mirroring policies.
upvoted 5 times
...
zellck
2 years, 1 month ago
Selected Answer: B
B is the answer. https://cloud.google.com/vpc/docs/packet-mirroring#enterprise_security Security and network engineering teams must ensure that they are catching all anomalies and threats that might indicate security breaches and intrusions. They mirror all traffic so that they can complete a comprehensive inspection of suspicious flows.
upvoted 3 times
AzureDP900
1 year, 12 months ago
Agree with B
upvoted 2 times
...
...
GHOST1985
2 years, 1 month ago
Selected Answer: B
100% Answer B: Anomalies means packet miroiring https://cloud.google.com/vpc/docs/packet-mirroring#enterprise_security "Packet Mirroring is useful when you need to monitor and analyze your security status. It exports all traffic, not only the traffic between sampling periods. For example, you can use security software that analyzes mirrored traffic to detect all threats or anomalies. Additionally, you can inspect the full traffic flow to detect application performance issues. For more information, see the example use cases." https://cloud.google.com/vpc/docs/packet-mirroring
upvoted 2 times
...
tangac
2 years, 1 month ago
Selected Answer: C
First you can use VPC flow log at a subnet level : https://cloud.google.com/vpc/docs/using-flow-logs Then VPC Flow Log main feature is to collect logs that can be used for network monitoring, forensics, real-time security analysis, and expense optimization.
upvoted 1 times
...
jvkubjg
2 years, 2 months ago
Selected Answer: B
Anomalies -> Packet Mirroring
upvoted 1 times
...
mikesp
2 years, 4 months ago
Selected Answer: C
VPC Flow Logs also helps you perform network forensics when investigating suspicious behavior such as traffic from access from abnormal sources or unexpected volumes of data migration
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago