New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Google Professional Cloud Security Engineer Exam - Topic 1 Question 86 Discussion

Actual exam question for Google's Professional Cloud Security Engineer exam
Question #: 86
Topic #: 1
[All Professional Cloud Security Engineer Questions]

Your application is deployed as a highly available cross-region solution behind a global external HTTP(S) load balancer. You notice significant spikes in traffic from multiple IP addresses but it is unknown whether the IPs are malicious. You are concerned about your application's availability. You want to limit traffic from these clients over a specified time interval.

What should you do?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Thurman
3 months ago
Wait, can we really just ban IPs like that? Seems risky!
upvoted 0 times
...
Bernardo
3 months ago
D isn't really a great fit for this scenario.
upvoted 0 times
...
Queenie
4 months ago
C sounds interesting, but does it really help with malicious traffic?
upvoted 0 times
...
Adell
4 months ago
I think B could work too, but it might be too harsh.
upvoted 0 times
...
Dannette
4 months ago
A is the best option for rate limiting!
upvoted 0 times
...
Dante
4 months ago
I wonder if option D would actually work here. I thought firewall rules were more about blocking than throttling, but maybe I’m mixing things up.
upvoted 0 times
...
Clorinda
5 months ago
I feel like throttling is a good idea, but I can't recall if option C is the best choice. We practiced similar questions, but the details are a bit fuzzy.
upvoted 0 times
...
Lemuel
5 months ago
I'm not entirely sure, but I remember something about deny actions in Google Cloud Armor. Could option B be effective for this scenario?
upvoted 0 times
...
Franchesca
5 months ago
I think option A sounds familiar because we discussed rate limiting in our last study session. It seems like the right approach for managing spikes in traffic.
upvoted 0 times
...
Ruth
5 months ago
I'm leaning towards the throttle action in Cloud Armor. That way we can limit the requests per client without completely denying them access. Seems like a more balanced approach.
upvoted 0 times
...
Veronique
5 months ago
Okay, I've got this. The rate_based_ban action in Cloud Armor seems like the perfect solution. We can set the ban duration to the specified time interval and that should help protect our application's availability.
upvoted 0 times
...
Abel
5 months ago
Hmm, I'm a bit confused. Do we need to completely deny the clients or just throttle their requests? I'm not sure which option is best here.
upvoted 0 times
...
Leigha
5 months ago
This looks like a classic cloud security scenario. I think the key is to use Google Cloud Armor to limit the traffic from the suspicious IPs.
upvoted 0 times
...
Valentin
5 months ago
Ugh, I'm a bit confused by this question. I'll have to make sure I understand the distinction before answering.
upvoted 0 times
...
Veronika
1 year ago
Aw man, I bet those traffic spikes are just my grandma trying to check her Facebook. She's got mad love for those cat videos, you know?
upvoted 0 times
Ayesha
1 year ago
D) Maybe we should also configure a firewall rule in your VPC to throttle traffic from the identified IP addresses.
upvoted 0 times
...
Louvenia
1 year ago
C) I agree, let's configure a throttle action by using Google Cloud Armor to limit the number of requests per client over a specified time interval.
upvoted 0 times
...
Mitsue
1 year ago
B) Nah, I think we should configure a deny action by using Google Cloud Armor to deny the clients that issued too many requests over the specified time interval.
upvoted 0 times
...
Helene
1 year ago
A) Configure a rate_based_ban action by using Google Cloud Armor and set the ban_duration_sec parameter to the specified time interval.
upvoted 0 times
...
...
Darell
1 year ago
I personally think option C is the way to go. Throttling the number of requests per client seems like a good approach to me.
upvoted 0 times
...
Alexia
1 year ago
I'm not sure about option A. I think option B might be a better choice to deny clients with too many requests.
upvoted 0 times
...
Georgeanna
1 year ago
Option D, really? Throttling at the firewall level? What is this, the Stone Age? Come on, Cloud Armor is where it's at, folks.
upvoted 0 times
...
Lonna
1 year ago
I agree with Polly. Option A seems like the most effective way to handle the situation.
upvoted 0 times
...
Thomasena
1 year ago
I'd go with Option A. Banning those IPs for a specific time interval is a solid security measure. Gotta keep those bad actors at bay!
upvoted 0 times
Nilsa
1 year ago
Definitely, we can't risk our application's availability. Option A is the way to go.
upvoted 0 times
...
Verda
1 year ago
I agree, we need to make sure our application stays available and secure.
upvoted 0 times
...
Malinda
1 year ago
Option A sounds like the best choice. Banning those IPs will definitely help protect our application.
upvoted 0 times
...
...
Emilio
1 year ago
Option C seems like the way to go - throttling is a smart way to limit those pesky client requests without outright denying them. Gotta keep that availability high, you know?
upvoted 0 times
Margery
1 year ago
Yeah, throttling can help maintain a balance between allowing traffic and protecting the application from potential threats. It's a smart choice.
upvoted 0 times
...
Laura
1 year ago
Throttling definitely seems like a more balanced approach to manage the traffic and ensure the application's availability.
upvoted 0 times
...
Roslyn
1 year ago
I agree, throttling sounds like a good solution to handle the spikes in traffic without completely blocking the clients.
upvoted 0 times
...
Gracia
1 year ago
Option C seems like the way to go - throttling is a smart way to limit those pesky client requests without outright denying them. Gotta keep that availability high, you know?
upvoted 0 times
...
...
Polly
2 years ago
I think option A is the best choice. It allows us to set a ban duration and protect our application.
upvoted 0 times
...

Save Cancel