GCP Professional Cloud Security Engineer Practice Question

Your security team must inspect all outbound HTTPS traffic from production VMs for malware before it leaves the VPC. Using Google Cloud NGFW, you must (a) transparently decrypt, inspect, and re-encrypt TLS sessions with no VM changes, (b) block malicious flows, and (c) avoid hair-pin latency by keeping inspection distributed in-line rather than routing to a centralized appliance. Which configuration meets these requirements?

  • Create a network firewall policy that enables a TLS inspection policy and applies an Intrusion Prevention Service (IPS) rule set to egress traffic from the production subnet, then attach the policy to the VPC network.

  • Add a high-priority egress firewall rule that ALLOWs tcp:443 from the production subnet to 0.0.0.0/0 and rely on Cloud Armor for inspection.

  • Deploy a proxy VM with a third-party NGFW image and route the production subnet's default route to the proxy's internal IP address.

  • Enable VPC Flow Logs at the subnet level and configure log-based alerting to flag any egress connection that matches known malware IPs.

GCP Professional Cloud Security Engineer
Securing communications and establishing boundary protection
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot