GCP Professional Cloud Security Engineer Practice Question
Your company hosts a public-facing application behind a global external HTTP(S) Load Balancer on Google Cloud. Security policy now mandates that any request coming from IP addresses that Google has flagged as participating in botnet, malware, or command-and-control activity must be blocked automatically, without your team having to curate IP deny lists. What is the most operationally efficient way to meet this requirement?
Turn on Cloud Armor Adaptive Protection for the backend service so that requests from malicious IP addresses are detected and blocked automatically.
Create a rate-limiting rule in Cloud Armor that throttles any source IP exceeding 100 requests per second, preventing attacks from malicious hosts.
Enable the Google-managed OWASP Top 10 preconfigured WAF rule group in the security policy; these rules automatically drop traffic from Google-identified malicious IP addresses.
Add a high-priority Cloud Armor security-policy rule whose CEL expression checks whether the client IP appears in threat_intelligence('iplist-known-malicious-ips') and sets the action to deny (for example, return 403).
Cloud Armor integrates with Google's Threat Intelligence (TI) feeds that are updated continuously with IPs observed conducting malicious activity (for example, botnets or C2 infrastructure). You can reference those feeds directly in custom security-policy rules by using a CEL expression that evaluates whether the client's IP address appears in the TI list and then denies the request. Because the list is maintained by Google, no manual updates are required.
Enabling only the OWASP preconfigured rules, turning on Adaptive Protection, or using rate-based rules does not automatically consult the TI feeds, so they would not guarantee blocking every request that originates from Google-identified malicious IP addresses.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Cloud Armor Threat Intelligence?
Open an interactive chat with Bash
How does a CEL expression block malicious IP addresses?
Open an interactive chat with Bash
What are OWASP preconfigured WAF rule groups and why are they insufficient here?
Open an interactive chat with Bash
What is Cloud Armor in Google Cloud?
Open an interactive chat with Bash
What is Google's Threat Intelligence (TI) feed?
Open an interactive chat with Bash
What are CEL expressions in Cloud Armor?
Open an interactive chat with Bash
GCP Professional Cloud Security Engineer
Securing communications and establishing boundary protection
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .