Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam Professional Cloud Database Engineer All Questions

View all questions & answers for the Professional Cloud Database Engineer exam

Exam Professional Cloud Database Engineer topic 1 question 1 discussion

Actual exam question from Google's Professional Cloud Database Engineer
Question #: 1
Topic #: 1
[All Professional Cloud Database Engineer Questions]

You are developing a new application on a VM that is on your corporate network. The application will use Java Database Connectivity (JDBC) to connect to Cloud SQL for PostgreSQL. Your Cloud SQL instance is configured with IP address 192.168.3.48, and SSL is disabled. You want to ensure that your application can access your database instance without requiring configuration changes to your database. What should you do?

  • A. Define a connection string using your Google username and password to point to the external (public) IP address of your Cloud SQL instance.
  • B. Define a connection string using a database username and password to point to the internal (private) IP address of your Cloud SQL instance.
  • C. Define a connection string using Cloud SQL Auth proxy configured with a service account to point to the internal (private) IP address of your Cloud SQL instance.
  • D. Define a connection string using Cloud SQL Auth proxy configured with a service account to point to the external (public) IP address of your Cloud SQL instance.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Hilab
Highly Voted 1 year, 9 months ago
Option B is the best choice. By using the internal (private) IP address of the Cloud SQL instance, the traffic will stay within the corporate network and will not traverse the public internet. This will help to ensure that the traffic is secure and cannot be intercepted by unauthorized parties. Additionally, using the internal IP address does not require any additional configuration changes to the database instance. Option A is not recommended as it requires exposing the database instance's external (public) IP address, which can be less secure and may require additional firewall rules. Option C is a valid option if SSL is enabled on the Cloud SQL instance, but since SSL is disabled in this scenario, this option is not suitable. Option D is not recommended as it requires exposing the database instance's external (public) IP address, which can be less secure and may require additional firewall rules.
upvoted 7 times
BenMS
1 year, 8 months ago
The Cloud SQL Proxy wraps your connection in an SSL/TLS layer, resolving the concern about compatibility: https://cloud.google.com/sql/docs/postgres/connect-auth-proxy
upvoted 1 times
...
mennahibi
1 year ago
B can be the correct answer, bt the most secure and best solution is C, because the Auth Proxy will enable ssl for you without enabling it on the Cloud SQL instance.
upvoted 1 times
...
...
dynamic_dba
Highly Voted 1 year, 8 months ago
C. The IP address given is a private IP address and not routable via the internet. Therefore any answer which references a public IP is wrong by definition (A, D). That leaves B and C. B cannot be correct because the app is on a corporate network and thus not on a Google VPC network. Good security practices dictate using Cloud SQL Auth Proxy and a service account which access the Cloud SQL instance via its private IP address.
upvoted 5 times
...
CloudKida
Most Recent 1 month, 3 weeks ago
Selected Answer: C
The Cloud SQL connectors are libraries that provide encryption and IAM-based authorization when connecting to a Cloud SQL instance. They can't provide a network path to a Cloud SQL instance if one is not already present. Other ways to connect to a Cloud SQL instance include using a database client or the Cloud SQL Auth proxy.
upvoted 4 times
...
hanayome
6 months, 2 weeks ago
Selected Answer: C
because the most secure way is using Cloud SQL Proxy
upvoted 1 times
...
Witcher_PL
1 year ago
Selected Answer: C
C is the valid
upvoted 3 times
...
goodsport
1 year, 2 months ago
Vote for C
upvoted 2 times
...
Nirca
1 year, 8 months ago
Selected Answer: C
Service account is a must.
upvoted 1 times
...
__pacman__
1 year, 9 months ago
Vote for C
upvoted 2 times
...
ssaporylo
1 year, 10 months ago
Vote for C
upvoted 4 times
...
chelbsik
1 year, 11 months ago
Selected Answer: C
Vote for C
upvoted 3 times
...
pk349
1 year, 11 months ago
C: Define a connection string using Cloud SQL Auth proxy *** configured with a service account to point to the internal (private) IP address of your Cloud SQL instance.
upvoted 3 times
...
pk349
1 year, 11 months ago
Selected Answer: D
Database Migration Service Simplify migrations to the cloud. Available now for MySQL and PostgreSQL, with SQL Server and Oracle migrations in preview. • Migrate to Cloud SQL and AlloyDB for PostgreSQL from on-premises, Google Cloud, or other clouds • Replicate data continuously for minimal downtime migrations • Serverless and easy to set up
upvoted 2 times
...
GCP72
1 year, 11 months ago
Selected Answer: C
C is the correct answer
upvoted 2 times
...
Kloudgeek
1 year, 11 months ago
C is correct answer. First of all SSL is disabled and it is not secure to get it exposed to Internet. https://cloud.google.com/sql/docs/postgres/connect-overview#authentication_options
upvoted 4 times
...
juancambb
1 year, 11 months ago
Selected Answer: C
C is correct, must be private ip because the ip starts with 192... and cloud sql require a proxy to connect because exist on a tenant project
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...