exam questions

Exam Professional Cloud Network Engineer All Questions

View all questions & answers for the Professional Cloud Network Engineer exam

Exam Professional Cloud Network Engineer topic 1 question 103 discussion

Actual exam question from Google's Professional Cloud Network Engineer
Question #: 103
Topic #: 1
[All Professional Cloud Network Engineer Questions]

Your organization uses a hub-and-spoke architecture with critical Compute Engine instances in your Virtual Private Clouds (VPCs). You are responsible for the design of Cloud DNS in Google Cloud. You need to be able to resolve Cloud DNS private zones from your on-premises data center and enable on-premises name resolution from your hub-and-spoke VPC design. What should you do?

  • A. 1. Configure a private DNS zone in the hub VPC, and configure DNS forwarding to the on-premises server.
    2. Configure DNS peering from the spoke VPCs to the hub VPC.
  • B. 1. Configure a DNS policy in the hub VPC to allow inbound query forwarding from the spoke VPCs.
    2. Configure the spoke VPCs with a private zone, and set up DNS peering to the hub VPC.
  • C. 1. Configure a DNS policy in the spoke VPCs, and configure your on-premises DNS as an alternate DNS server.
    2. Configure the hub VPC with a private zone, and set up DNS peering to each of the spoke VPCs.
  • D. 1. Configure a DNS policy in the hub VPC, and configure the on-premises DNS as an alternate DNS server.
    2. Configure the spoke VPCs with a private zone, and set up DNS peering to the hub VPC.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
al_zo
Highly Voted 1 year, 11 months ago
Selected Answer: A
I go with A. In my opinion C and D are wrong (on-premises DNS as an alternate DNS server?) B is also wrong: configure a DNS policy in the HUB VPC to allow inbound query forwarding from the spoke VPC. This is not needed " DNS peering runs in parallel with VPC Network Peering connections to allow name resolution between environments." A is correct, although is missing second part of requirements in the question (resolution from on-prem to Google Cloud). https://cloud.google.com/dns/docs/best-practices#hybrid-architecture-using-hub-vpc-network-connected-to-spoke-vpc-networks
upvoted 17 times
...
ccieman2016
Highly Voted 1 year, 11 months ago
Selected Answer: B
C and D for me is wrong, no make sense DNS on premise like alternative. A is wrong, because inverted direction is necessary onpremise > cloud dns. B is next to solution, but one step is necessary to, and there isn't mention to DNS policy to allow DNS condicional forwarding from on premise. I'll go to B.
upvoted 5 times
AzureDP900
1 year, 10 months ago
I will go with B
upvoted 1 times
...
pfilourenco
1 year, 10 months ago
D is ok to forward DNS querys to on-prem. But will override any private zone configurations or default nameservers on a network. In this case B+D is the solution.
upvoted 1 times
...
...
saraali
Most Recent 2 months, 2 weeks ago
Selected Answer: A
Option A is the best solution because it centralizes DNS management in the hub VPC and uses DNS forwarding and peering to ensure seamless DNS resolution for both Cloud DNS and on-premises resources.
upvoted 1 times
...
zzaric
7 months, 3 weeks ago
Oh man so many wrong answers here :( - neither A and B are correct: A - Missing INBOUND POLICY --> on-prem to resolve GCP B - No forwarding to on-prem --> gcp can't resolve on-prem The only CORRECT answer is D: has INBOUND policy and Alternate DNS server --> that is forwarding to the on-prem if the on-prem can't be resolved by Cloud DNS
upvoted 2 times
Positron75
5 months, 3 weeks ago
After reading the documentation I agree with this. D is the option that best fits the hub-and-spoke reference design for hybrid DNS: https://cloud.google.com/dns/docs/best-practices#hybrid-architecture-using-hub-vpc-network-connected-to-spoke-vpc-networks
upvoted 1 times
Positron75
5 months, 2 weeks ago
Actually the more I look at it the less convinced I am. In the best practices section it mentions using a forwarding zone is preferred over an alternative DNS server setup except for very specific cases (which are not mentioned in the question), so it seems strange to me that the correct answer would include that. Overall it feels like no single answer is complete.
upvoted 1 times
...
...
...
desertlotus1211
8 months, 1 week ago
Answer is A: From the question - it's seems like the spoke private zones are already setup. So we just need to setup private zone in Hub, DNS peering to spokes, and forwarding to on-premise... If nothing has been done - this questions should have two choices: A&B
upvoted 2 times
...
crg63
1 year ago
Selected Answer: A
DNS policy in the HUB VPC to allow inbound query forwarding from the spoke VPC. This is not needed. so NOT B
upvoted 3 times
...
gcpengineer
1 year, 1 month ago
Selected Answer: A
A is the ans
upvoted 4 times
...
didek1986
1 year, 2 months ago
Selected Answer: B
https://cloud.google.com/architecture/deploy-hub-spoke-vpc-network-topology#vpn
upvoted 1 times
...
Komal697
1 year, 7 months ago
Selected Answer: B
In this option, a DNS policy is configured in the hub VPC to allow inbound query forwarding from the spoke VPCs. This allows the spoke VPCs to resolve private zones in the hub VPC. The spoke VPCs are then configured with a private zone and DNS peering is set up to the hub VPC. This enables name resolution from the on-premises data center to the spoke VPCs. Option A is incorrect because it only configures DNS forwarding from the hub VPC to the on-premises server and DNS peering from spoke VPCs to the hub VPC. It does not enable on-premises name resolution to the spoke VPCs.
upvoted 5 times
Komal697
1 year, 7 months ago
Option C is incorrect because it configures the on-premises DNS as an alternate DNS server in the spoke VPCs, which is not necessary. It also configures DNS policy in the spoke VPCs, which is not required to enable on-premises name resolution to the spoke VPCs. Option D is incorrect because it configures DNS policy in the hub VPC and DNS peering from spoke VPCs to the hub VPC. It does not enable on-premises name resolution to the spoke VPCs.
upvoted 1 times
...
...
pk349
1 year, 9 months ago
• B. 1. Configure a DNS policy in the hub VPC to allow inbound query forwarding from the spoke VPCs. PK: Just remember query forwarding ******* 2. Configure the spoke VPCs with a private zone, and set up DNS peering to the hub VPC.
upvoted 1 times
...
pfilourenco
1 year, 10 months ago
Selected Answer: B
B is the solution to received querys from on-prem, but still missing from cloud to on-prem... D is ok to forward DNS querys to on-prem. But will override any private zone configurations or default nameservers on a network. In this case B+D is the solution...
upvoted 3 times
...
playpacman
1 year, 11 months ago
B could be right but how does outgoing traffic from GC to on-orem work
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago