GCP Professional Cloud Architect Practice Question
Your company operates several hundred Compute Engine VMs inside a custom VPC network that uses the 10.10.0.0/16 CIDR and has no external IP addresses or Cloud NAT gateway. Security policy requires that traffic from these VMs to a new Cloud SQL for PostgreSQL instance must stay on Google's private backbone and use only RFC 1918 addresses. The network team also wants to avoid maintaining custom static routes if additional subnets are added to the VPC in the future. Which design meets all requirements?
Establish Cloud VPN tunnels from each Compute Engine VM to the regional Cloud SQL endpoint and block all other internet-bound traffic with firewall rules.
Reserve an unused /24 prefix in the VPC, create a private services access connection, and provision the Cloud SQL instance with a private IP in that range so that Google automatically peers the VPCs and advertises routes.
Create VPC Network Peering between the production VPC and the default VPC in the same project, then manually add custom static routes for each new subnet to reach Cloud SQL's public IP.
Enable Cloud NAT for the VPC and create the Cloud SQL instance with a public IP; restrict outbound firewall rules to allow only the Cloud SQL address.
Private services access (PSA) lets a consumer VPC reach Google-managed services such as Cloud SQL by establishing VPC Network Peering to a producer VPC that Google controls. You first reserve an unused internal address range (typically a /24) in the consumer VPC, then create a private service connection that uses that range. When you create the Cloud SQL instance with a private IP, it receives an address from the reserved range, and Google automatically exchanges routes across the peering relationship so every existing or future subnet in the VPC can reach the service without manual route updates. Cloud NAT and VPN rely on public endpoints, while ordinary VPC peering with another customer VPC does not connect to Google-managed services. Therefore, configuring private services access is the only option that satisfies the private-IP, backbone-only traffic, and zero-maintenance routing requirements.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Private Services Access (PSA) in GCP?
Open an interactive chat with Bash
How does VPC Network Peering work in GCP?
Open an interactive chat with Bash
Can Cloud NAT be used for private connections in GCP?
Open an interactive chat with Bash
What is Private Services Access (PSA)?
Open an interactive chat with Bash
Why is RFC 1918 important in this setup?
Open an interactive chat with Bash
How does VPC Network Peering work in GCP?
Open an interactive chat with Bash
GCP Professional Cloud Architect
Managing and provisioning a solution infrastructure
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .