Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Google Professional Cloud Network Engineer Exam - Topic 1 Question 76 Discussion

Actual exam question for Google's Professional Cloud Network Engineer exam
Question #: 76
Topic #: 1
[All Professional Cloud Network Engineer Questions]

You suspect that one of the virtual machines (VMs) in your default Virtual Private Cloud (VPC) is under a denial-of-service attack. You need to analyze the incoming traffic for the VM to understand where the traffic is coming from. What should you do?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Margret
4 months ago
I agree with B, it's straightforward and effective!
upvoted 0 times
...
Rosann
4 months ago
Wait, can you really get source IPs from the subnetworks.get field? Sounds off.
upvoted 0 times
...
Lyda
4 months ago
A seems like a waste of time, just use Flow Logs.
upvoted 0 times
...
Kallie
4 months ago
I think C is better, the src_location field is more specific.
upvoted 0 times
...
Mozell
4 months ago
Definitely go with B, VPC Flow Logs are the way to go!
upvoted 0 times
...
Lorean
5 months ago
I’m a bit confused about the fields mentioned in the options. I thought the src_location field was relevant, but I can't remember if that's in Flow Logs or something else.
upvoted 0 times
...
Enola
5 months ago
I feel like Data Access audit logs might not give us the traffic details we need. I lean towards VPC Flow Logs, but I can't recall the exact field name.
upvoted 0 times
...
Ira
5 months ago
I remember practicing a similar question, and I think option B is correct since it mentions analyzing the source IP addresses.
upvoted 0 times
...
Vi
5 months ago
I think we should look at VPC Flow Logs, but I'm not sure if it's for the subnet or the entire VPC.
upvoted 0 times
...
Tamesha
5 months ago
I'm a little confused by the different logging options presented here. Data Access audit logs, VPC Flow Logs... which one is the best choice for this scenario? I think I'll need to review the differences between these logging mechanisms before I can confidently select the right answer.
upvoted 0 times
...
Vivan
5 months ago
Okay, I've got this. The key here is to enable the right logging mechanism to get the source IP addresses. Option B seems like the way to go - enabling VPC Flow Logs for the subnet and analyzing the connection field. That should give me the information I need to identify the source of the attack.
upvoted 0 times
...
Sharmaine
5 months ago
Hmm, I'm a bit unsure about this one. I'm trying to decide between options B and C. I know VPC Flow Logs are important for analyzing network traffic, but I'm not sure if I should enable them for the entire VPC or just the specific subnet. I'll need to double-check the details on those two options.
upvoted 0 times
...
Launa
5 months ago
This looks like a straightforward question about analyzing network traffic for a potential DDoS attack. I think I'll go with option B - enabling VPC Flow Logs for the subnet and analyzing the logs to get the source IP addresses.
upvoted 0 times
...
Candida
5 months ago
Form Recognizer seems a bit off-target for this question. I don't think that would be the right service to use for a multi-channel conversational AI solution.
upvoted 0 times
...
Carin
6 months ago
I'm pretty confident in my understanding of XML data binding. I think Option C is the best description of how the tools work.
upvoted 0 times
...
Tamesha
6 months ago
Hmm, I'm a bit unsure about the differences between the vCore-based and DTU-based service tiers. I'll need to review the Azure SQL Database documentation to understand the tradeoffs.
upvoted 0 times
...
Josphine
6 months ago
This question seems straightforward. Home healthcare is used both before and after a hospital stay, so I'll go with option A.
upvoted 0 times
...
Steffanie
2 years ago
I think we should go with option A. Enabling Data Access audit logs of the VPC seems like the most comprehensive approach.
upvoted 0 times
...
James
2 years ago
I'm not sure. Maybe enabling Data Access audit logs of the VPC could also help us pinpoint the source of the attack.
upvoted 0 times
...
Leigha
2 years ago
I agree with Lamar. VPC Flow Logs for the subnet will provide the source IP addresses we need to track the traffic.
upvoted 0 times
...
Lamar
2 years ago
I think enabling VPC Flow Logs for the subnet is the way to go. It will help us analyze the incoming traffic.
upvoted 0 times
...
Art
2 years ago
I'm with you, Earleen. This is gonna be a breeze. Just remember, no matter what, don't panic and keep calm. Panicking is for the weak!
upvoted 0 times
...
Earleen
2 years ago
Alright, I think we've got it figured out. I'm going to go with option B - VPC Flow Logs for the subnet. Can't wait to ace this exam!
upvoted 0 times
...
Kristeen
2 years ago
I don't think options A or D are correct. Auditing the Data Access logs seems like overkill, and the 'networks.get' and 'subnetworks.get' fields don't sound right to me.
upvoted 0 times
Leota
2 years ago
Analyzing the connection field is key to identifying the source of the traffic.
upvoted 0 times
...
Alethea
2 years ago
B) Enable VPC Flow Logs for the subnet. Analyze the logs and get the source IP addresses from the connection field.
upvoted 0 times
...
Raina
2 years ago
The src_location field can help pinpoint the origin of the traffic.
upvoted 0 times
...
Brinda
2 years ago
C) Enable VPC Flow Logs for the VPC. Analyze the logs and get the source IP addresses from the src_location field.
upvoted 0 times
...
Candida
2 years ago
Flow logs can provide valuable information about incoming traffic.
upvoted 0 times
...
Charlie
2 years ago
B) Enable VPC Flow Logs for the subnet. Analyze the logs and get the source IP addresses from the connection field.
upvoted 0 times
...
...

Save Cancel