Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam Professional Cloud Network Engineer topic 1 question 54 discussion

Actual exam question from Google's Professional Cloud Network Engineer
Question #: 54
Topic #: 1
[All Professional Cloud Network Engineer Questions]

Your company has just launched a new critical revenue-generating web application. You deployed the application for scalability using managed instance groups, autoscaling, and a network load balancer as frontend. One day, you notice severe bursty traffic that the caused autoscaling to reach the maximum number of instances, and users of your application cannot complete transactions. After an investigation, you think it as a DDOS attack. You want to quickly restore user access to your application and allow successful transactions while minimizing cost.
Which two steps should you take? (Choose two.)

  • A. Use Cloud Armor to blacklist the attacker's IP addresses.
  • B. Increase the maximum autoscaling backend to accommodate the severe bursty traffic.
  • C. Create a global HTTP(s) load balancer and move your application backend to this load balancer.
  • D. Shut down the entire application in GCP for a few hours. The attack will stop when the application is offline.
  • E. SSH into the backend compute engine instances, and view the auth logs and syslogs to further understand the nature of the attack.
Show Suggested Answer Hide Answer
Suggested Answer: BE 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Alex_74
Highly Voted 2 years, 8 months ago
A & C Cloud Armor is the solution to prevent and mitigate attack (DDOS SQL injection and so on), it's a revenue generating so have to be alive and protected. No Cloud Armor is not a firewall. Using the CA language you have tons of prebuild rules to evaluate and block the malicious traffic in automatic way. You can put the rule blocking a specific traffic but it's not there the value (you have the firewall for that). Than you need C cause Cloud Armor require an HTTP(s) load balancer (that can be used cause it's a web application)
upvoted 25 times
walkwolf3
2 years, 5 months ago
This would be a long term solution if DDOS is confirmed. The quickest solution is to recover the service, which is BE.
upvoted 2 times
...
Windy_Welly88
2 years, 5 months ago
I'd go A & C. These days you can get Cloud Armor for trial, and this product will mitigate current AND sustained DDOS attacks. Would you REALLY autoscale for a massive DDOS attack, do you think Google will let you do this for free? You wont need to spend time looking at logs and traffic as it will tell you straight away who the actors are.. And finally, since this is a critical revenue-earning application any downtime would be a significant cost. Only way to ensure uptime would be to use Cloud Armor.
upvoted 2 times
AzureDP900
1 year, 5 months ago
A, C make sense
upvoted 2 times
...
...
...
Hybrid_Cloud_boy
Highly Voted 3 years, 5 months ago
I think B,E are actually correct. A and C would increase cost to global LB, change app architecture, and could potential block legitimate traffic since you “think” it is a DDoS, but do i not know. I do not think google would recommend blocking traffic unless you KNOW. So a temp increase in auto scale, with further investigation is the best course of action. It may lead to some short-term cost increase, but ultimately less cost increase than moving to global LB premium tier with cloudarmor.
upvoted 14 times
GeorgS
1 year, 1 month ago
But E just says log in with SSH and look, to get get a better view. So with B and E you won't block anything, you will just increase your serverpool
upvoted 3 times
...
...
hamish88
Most Recent 2 weeks ago
A and C are the correct two steps we should take. These steps complete the purpose. The question is not asking for two separate approaches.
upvoted 1 times
...
Adjqwert
3 months ago
There is some amount of Cloud Armor integration supported with Network Passthrough Load Balancers: There is some amount of integration supported for Cloud Armor with Network Load Balancers: https://cloud.google.com/armor/docs/advanced-network-ddos
upvoted 1 times
...
gonlafer
3 months, 1 week ago
Selected Answer: AB
The objective is to quickly restore user access. So A & B. Later you can move to an HTTP LB which makes sense also.
upvoted 1 times
...
PhuocT
4 months, 1 week ago
Selected Answer: AC
AC is the best answer. you can only use Cloud Armor with HTTP LB, not network LB.
upvoted 1 times
...
Chavoz
4 months, 2 weeks ago
Selected Answer: AC
AC is the correct
upvoted 2 times
...
BenMS
4 months, 3 weeks ago
Selected Answer: AC
This is the textbook scenario for Cloud Armor + GCLB, so given that this is a Google exam, it seems pretty obvious to select AC. It's actually really simple to switch the BE from one LB to another and would not add huge cost.
upvoted 1 times
...
xhilmi
4 months, 4 weeks ago
Selected Answer: AB
A. Use Cloud Armor to blacklist the attacker's IP addresses. Cloud Armor is a security service on Google Cloud that allows you to defend your applications and services from Distributed Denial of Service (DDoS) attacks. By configuring blacklisting rules in Cloud Armor, you can block traffic from specific IP addresses or ranges associated with the attack, helping to mitigate the impact on your application. B. Increase the maximum autoscaling backend to accommodate the severe bursty traffic. By increasing the maximum number of instances in your autoscaling backend, you allow your infrastructure to dynamically scale up to handle the increased traffic during the DDoS attack. This helps ensure that your application can continue to serve legitimate user requests even under heavy load.
upvoted 1 times
...
CloudSISG2023
7 months, 3 weeks ago
Cloud Armor can only be integrated with HTTP(S) load balancer, it's not supported with NLB. Hence, A is not correct. I'd go with option B & E.
upvoted 3 times
...
sidharthwader
8 months ago
B is not a good solution if you increase the scaling it will just keep increasing during a DDOS attacker will you more of your resources and you will pay higher price for malicious attack
upvoted 1 times
DelonBH
5 months, 3 weeks ago
DDOS Attack is not confirmed.. "you think".
upvoted 1 times
...
...
didek1986
9 months, 1 week ago
Selected Answer: AB
C is wrony cause changes architecture
upvoted 2 times
...
study_aws1
9 months, 3 weeks ago
A & B - Option C) of HTTPS Load balancer is not a mandatory requirement. Google Cloud Armor also provides advanced network DDoS protection for external passthrough Network Load Balancers, protocol forwarding, and VMs with public IP addresses. https://cloud.google.com/armor/docs/security-policy-overview Standard network DDoS protection: basic always-on protection for network load balancers, protocol forwarding, or VMs with public IP addresses. This is covered under Google Cloud Armor Standard and does not require any additional subscriptions. Advanced network DDoS protection: additional protections for Managed Protection Plus subscribers who use network load balancers, protocol forwarding, or VMs with public IP addresses. https://cloud.google.com/armor/docs/advanced-network-ddos
upvoted 2 times
...
Hetavi
12 months ago
auto scaling is already taken care as mentioned in question. So correct answer is to use Armor and https global load balancer.
upvoted 1 times
...
somnathmaddi
1 year ago
Selected Answer: BE
BE Only
upvoted 2 times
...
Komal697
1 year, 1 month ago
Selected Answer: AB
Blacklisting the attacker's IP addresses with Cloud Armor will help to prevent further traffic from the same source, reducing the impact of the attack. Increasing the maximum autoscaling backend will ensure that the application can handle the severe bursty traffic and continue to serve legitimate requests, reducing the impact on users.
upvoted 2 times
desertlotus1211
1 year ago
Is the question implying the IP is known? It said think it's DDOS attack, which means they're not sure...
upvoted 1 times
...
Komal697
1 year, 1 month ago
C. Creating a global HTTP(s) load balancer and moving the application backend to this load balancer may help to distribute traffic across multiple regions and increase application availability, but it may not directly address the DDOS attack. D. Shutting down the entire application in GCP for a few hours is not a recommended approach as it will result in significant downtime and loss of revenue. E. SSHing into backend compute engine instances and viewing logs may provide insights into the attack but is unlikely to immediately restore access to the application.
upvoted 2 times
...
...
Ben756
1 year, 2 months ago
Selected Answer: AB
A. Use Cloud Armor to blacklist the attacker’s IP addresses. This way, you can block malicious traffic from reaching your application and reduce the load on your backend instances. C. Create a global HTTP(s) load balancer and move your application backend to this load balancer. This way, you can leverage Cloud Armor’s integration with HTTP(s) load balancers and benefit from its advanced DDoS defense features.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...