New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Google Professional Cloud DevOps Engineer Exam - Topic 10 Question 51 Discussion

Actual exam question for Google's Professional Cloud DevOps Engineer exam
Question #: 51
Topic #: 10
[All Professional Cloud DevOps Engineer Questions]

You are running a real-time gaming application on Compute Engine that has a production and testing environment. Each environment has their own Virtual Private Cloud (VPC) network. The application frontend and backend servers are located on different subnets in the environment's VPC. You suspect there is a malicious process communicating intermittently in your production frontend servers. You want to ensure that network traffic is captured for analysis. What should you do?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Karan
4 months ago
Is it really necessary to enable logs on both environments? Seems excessive.
upvoted 0 times
...
My
4 months ago
Definitely need to capture everything, so D makes sense.
upvoted 0 times
...
Samuel
4 months ago
Surprised that people are considering 0.5, why not just go for 1.0?
upvoted 0 times
...
Joye
4 months ago
I disagree, D seems safer with the testing phase included.
upvoted 0 times
...
Johnathon
4 months ago
I think option B is the best for full visibility.
upvoted 0 times
...
Lura
5 months ago
I lean towards option D since capturing all traffic with a scale of 1.0 seems crucial for identifying malicious processes, but I worry about the overhead it might cause.
upvoted 0 times
...
Lashon
5 months ago
I think enabling Flow Logs on both testing and production makes sense, but I can't recall if we should go with a scale of 1.0 or 0.5 for better visibility.
upvoted 0 times
...
Audria
5 months ago
I remember we discussed VPC Flow Logs in class, but I'm not sure if a sample volume scale of 0.5 is enough for capturing all the traffic we need.
upvoted 0 times
...
Aleisha
5 months ago
I feel like we practiced a similar question where the focus was on testing before production. Maybe option C is safer, but I'm unsure about the scale.
upvoted 0 times
...
Vicki
5 months ago
Okay, let's see - read and write traffic, storage capacity, and index traffic. I think I've got a good handle on this.
upvoted 0 times
...
Carma
5 months ago
Hmm, I'm not sure about this one. VPN, IDS, and SIEM all seem like they could be relevant for managing security, but I'm not confident which one would be the most beneficial in this specific scenario. I'll have to think it through carefully.
upvoted 0 times
...

Save Cancel