GCP Professional Cloud Security Engineer Practice Question

Your security team found that on-premises servers connected to your Google Cloud VPC over HA VPN can reach public Google services such as YouTube, even though the only business requirement is to download build artifacts from Cloud Storage. The subnet used by the Cloud VPN tunnel already has Private Google Access for on-premises hosts enabled, and a custom route (199.36.153.4/30) plus a private DNS zone mapping *.googleapis.com to private.googleapis.com is in place. You must block access to Google services that are not protected by VPC Service Controls, while still allowing private access to Cloud Storage, with minimal configuration changes. What should you do?

  • Change the private DNS record to resolve *.googleapis.com to restricted.googleapis.com and update the Cloud VPN custom route to advertise 199.36.153.8/30 instead of 199.36.153.4/30.

  • Attach a global external HTTP(S) load balancer with Cloud Armor to the subnet and block requests to unwanted Google services with WAF rules.

  • Create a Private Service Connect endpoint for Cloud Storage in the VPC, then disable Private Google Access on the subnet.

  • Replace Private Google Access with a Cloud NAT gateway and restrict egress to Cloud Storage's public IP ranges by firewall rules.

GCP Professional Cloud Security Engineer
Securing communications and establishing boundary protection
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot