Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

Professional-Cloud-Network-Engineer Practice Test


Page 9 out of 31 Pages

You recently deployed two network virtual appliances in us-central1. Your network
appliances provide connectivity to your on-premises network, 10.0.0.0/8. You need to
configure the routing for your Virtual Private Cloud (VPC). Your design must meet the
following requirements:
All access to your on-premises network must go through the network virtual appliances.
Allow on-premises access in the event of a single network virtual appliance failure.
Both network virtual appliances must be used simultaneously.
Which method should you use to accomplish this?


A.

Configure two routes for 10.0.0.0/8 with different priorities, each pointing to separate
network virtual appliances.


B.

Configure an internal HTTP(S) load balancer with the two network virtual appliances as
backends. Configure a route for 10.0.0.0/8 with the internal HTTP(S) load balancer as the next hop.


C.

Configure a network load balancer for the two network virtual appliances. Configure a
route for 10.0.0.0/8 with the network load balancer as the next hop.


D.

Configure an internal TCP/UDP load balancer with the two network virtual appliances as
backends. Configure a route for 10.0.0.0/8 with the internal load balancer as the next hop.





B.
  

Configure an internal HTTP(S) load balancer with the two network virtual appliances as
backends. Configure a route for 10.0.0.0/8 with the internal HTTP(S) load balancer as the next hop.



Your company is working with a partner to provide a solution for a customer. Both your
company and the partner organization are using GCP. There are applications in the
partner's network that need access to some resources in your company's VPC. There is no
CIDR overlap between the VPCs.
Which two solutions can you implement to achieve the desired results without
compromising the security? (Choose two.)


A.

VPC peering


B.

Shared VPC


C.

Cloud VPN


D.

Dedicated Interconnect


E.

Cloud NAT





A.
  

VPC peering



C.
  

Cloud VPN



Google Cloud VPC Network Peering allows internal IP address connectivity across two
Virtual Private Cloud (VPC) networks regardless of whether they belong to the same
project or the same organization.

You create multiple Compute Engine virtual machine instances to be used as TFTP
servers. Which type of load balancer should you use?


A.

HTTP(S) load balancer


B.

SSL proxy load balancer


C.

TCP proxy load balancer


D.

Network load balancer





D.
  

Network load balancer



"TFTP is a UDP-based protocol. Servers listen on port 69 for the initial client-to-server
packet to establish the TFTP session, then use a port above 1023 for all further packets
during that session. Clients use ports above 1023"
https://docstore.mik.ua/orelly/networking_2ndEd/fire/ch17_02.htm Besides, Google Cloud
external TCP/UDP Network Load Balancing (after this referred to as Network Load
Balancing) is a regional, non-proxied load balancer. Network Load Balancing distributes
traffic among virtual machine (VM) instances in the same region in a Virtual Private Cloud
(VPC) netw

You are creating a new application and require access to Cloud SQL from VPC instances
without public IP addresses.
Which two actions should you take? (Choose two.)


A.

Activate the Service Networking API in your project


B.

Activate the Cloud Datastore API in your project


C.

Create a private connection to a service producer


D.

Create a custom static route to allow the traffic to reach the Cloud SQL API.


E.

Enable Private Google Access





C.
  

Create a private connection to a service producer



E.
  

Enable Private Google Access



C: If you are using private IP for any of your Cloud SQL instances, you only need to configure private services access one time for every Google Cloud project that has or
needs to connect to a Cloud SQL instance. If your Google Cloud project has a Cloud SQL
instance, you can either configure it yourself or let Cloud SQL do it for you to use private
IP. Cloud SQL configures private services access for you when all the conditions below are
true: https://cloud.google.com/sql/docs/postgres/configure-private-servicesaccess#
before_you_begin
E: You can enable Private Google access on a subnet level and any VMs on that subnet
can access Google APIs by using their internal IP address.
https://cloud.google.com/vpc/docs/configure-private-google-access

You recently deployed your application in Google Cloud. You need to verify your Google
Cloud network configuration before deploying your on-premises workloads. You want to
confirm that your Google Cloud network configuration allows traffic to flow from your cloud
resources to your on- premises network. This validation should also analyze and diagnose
potential failure points in your Google Cloud network configurations without sending any
data plane test traffic. What should you do?


A.

Use Network Intelligence Center's Connectivity Tests.


B.

Enable Packet Mirroring on your application and send test traffic


C.

Use Network Intelligence Center's Network Topology visualizations


D.

Enable VPC Flow Logs and send test traffic





C.
  

Use Network Intelligence Center's Network Topology visualizations




Page 9 out of 31 Pages
Previous