Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Google Cloud Certified - Professional Cloud Security Engineer Professional-Cloud-Security-Engineer Question # 92 Topic 10 Discussion

Google Cloud Certified - Professional Cloud Security Engineer Professional-Cloud-Security-Engineer Question # 92 Topic 10 Discussion

Professional-Cloud-Security-Engineer Exam Topic 10 Question 92 Discussion:
Question #: 92
Topic #: 10

You need to audit the network segmentation for your Google Cloud footprint. You currently operate Production and Non-Production infrastructure-as-a-service (IaaS) environments. All your VM instances are deployed without any service account customization.

After observing the traffic in your custom network, you notice that all instances can communicate freely – despite tag-based VPC firewall rules in place to segment traffic properly – with a priority of 1000. What are the most likely reasons for this behavior?


A.

All VM instances are missing the respective network tags.


B.

All VM instances are residing in the same network subnet.


C.

All VM instances are configured with the same network route.


D.

A VPC firewall rule is allowing traffic between source/targets based on the same service account with priority 999.


E.

A VPC firewall rule is allowing traffic between source/targets based on the same service account with priority 1001.


Get Premium Professional-Cloud-Security-Engineer Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.