exam questions

Exam Professional Cloud Security Engineer All Questions

View all questions & answers for the Professional Cloud Security Engineer exam

Exam Professional Cloud Security Engineer topic 1 question 58 discussion

Actual exam question from Google's Professional Cloud Security Engineer
Question #: 58
Topic #: 1
[All Professional Cloud Security Engineer Questions]

Which two security characteristics are related to the use of VPC peering to connect two VPC networks? (Choose two.)

  • A. Central management of routes, firewalls, and VPNs for peered networks
  • B. Non-transitive peered networks; where only directly peered networks can communicate
  • C. Ability to peer networks that belong to different Google Cloud organizations
  • D. Firewall rules that can be created with a tag from one peered network to another peered network
  • E. Ability to share specific subnets across peered networks
Show Suggested Answer Hide Answer
Suggested Answer: BC 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
DebasishLowes
Highly Voted 3 years, 7 months ago
Ans : BC
upvoted 17 times
...
mlyu
Highly Voted 4 years, 2 months ago
Ans should be BC https://cloud.google.com/vpc/docs/vpc-peering#key_properties
upvoted 5 times
ownez
4 years, 2 months ago
Correct. B: "Only directly peered networks can communicate. Transitive peering is not supported." C: " You can make services available privately across different VPC networks within and across organizations."
upvoted 3 times
Mihai89
3 years, 11 months ago
Agree with BC
upvoted 1 times
...
...
MohitA
4 years, 2 months ago
agree BC
upvoted 1 times
...
...
YourFriendlyNeighborhoodSpider
Most Recent 1 month, 2 weeks ago
Selected Answer: BD
C. Ability to peer networks that belong to different Google Cloud organizations This statement is not correct. VPC peering can only be established between VPCs that belong to the same Google Cloud organization, or within separate projects of the same organization, but not across different organizations without specific configurations.
upvoted 1 times
...
okhascorpio
8 months, 2 weeks ago
Selected Answer: BD
https://cloud.google.com/firewall/docs/tags-firewalls-overview
upvoted 1 times
...
okhascorpio
8 months, 2 weeks ago
Selected Answer: BD
B and D as the question specifically ask for security capabilities. C is not a security capability while D is.
upvoted 3 times
JohnDohertyDoe
4 months, 2 weeks ago
Tags do not work across peered networks. https://cloud.google.com/vpc/docs/vpc-peering#tags-service-accounts
upvoted 1 times
...
...
mackarel22
1 year, 8 months ago
Selected Answer: BC
https://cloud.google.com/vpc/docs/vpc-peering#specifications Transitive peering is not supported. So BC
upvoted 2 times
...
Meyucho
1 year, 10 months ago
Selected Answer: CE
Although B is correct, going into detail I think that non-transitivity is just true for networks joined by peering but If there is a third network connected by VPN or Interconnect there is transitivity, so I discard B and stay with C and E
upvoted 1 times
...
AzureDP900
1 year, 12 months ago
BC is right
upvoted 2 times
...
AwesomeGCP
2 years ago
Selected Answer: BC
B. Non-transitive peered networks; where only directly peered networks can communicate C. Ability to peer networks that belong to different Google Cloud Platform organizations
upvoted 3 times
...
zellck
2 years, 1 month ago
Selected Answer: BC
BC is the answer.
upvoted 2 times
...
Medofree
2 years, 6 months ago
D is false because : "You cannot use a tag or service account from one peered network in the other peered network."
upvoted 1 times
...
dtmtor
3 years, 7 months ago
Answer is BC
upvoted 3 times
...
Aniyadu
3 years, 10 months ago
B&C is the right answer
upvoted 2 times
...
FatCharlie
3 years, 11 months ago
The answers marked in the question seem to be referring to _shared_ VPC capabilities.
upvoted 1 times
...
[Removed]
4 years ago
Ans - BC
upvoted 2 times
...
CHECK666
4 years, 1 month ago
BC is the answer.
upvoted 2 times
...
cipher90
4 years, 2 months ago
AD is correct "Security Characteristics"
upvoted 1 times
mte_tech34
4 years, 1 month ago
No it's not. "You cannot use a tag or service account from one peered network in the other peered network." -> https://cloud.google.com/vpc/docs/vpc-peering
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago