GCP Professional Cloud Security Engineer Practice Question
Your security team must prevent any Compute Engine VM in any Google Cloud project from initiating outbound connections to IP addresses that Google's threat-intelligence service classifies as botnet command-and-control. At the same time, development teams occasionally need to make temporary, tightly scoped exceptions for a few VMs, which they identify with a special network tag. You want a solution that applies automatically to every current and future VPC network in the organization and minimizes ongoing operational work. Which implementation best meets these requirements?
Configure a Cloud Armor security policy that blocks traffic from botnet-classified source IPs and attach it to a shared external HTTP(S) load balancer that all outbound traffic must traverse; allow exceptions by letting teams bypass the load balancer.
Manually add a black-hole static route for every botnet command-and-control subnet to each VPC. Instruct teams to delete the route when they need an exception for specific VMs.
Create an organization-level hierarchical firewall policy with a single egress deny rule for threatIntelligence:botnet-cnc at priority 100, and let project administrators create higher-priority allow rules in their own project-level firewall policies when they need exceptions.
Create a global network firewall policy at the organization node. Add an egress allow rule with a high precedence that matches only VMs tagged c2c-exempt, followed by a lower-precedence deny rule whose match condition is threatIntelligence:botnet-cnc. Attach the policy to all VPC networks in the organization so it is inherited by current and future projects.
A global network firewall policy attached at the organization level is evaluated before any VPC firewall rules, ensuring a single, centrally managed control point for all projects and VPCs. In that policy you create two egress rules:
An allow rule with a high precedence (low numeric priority) that matches traffic only from VMs bearing a designated exception network tag (for example, c2c-exempt).
A second rule with a lower precedence (higher numeric priority) whose match condition is threatIntelligence:botnet-cnc and whose action is deny.
Because rules are processed in order of ascending priority within the same policy, traffic from tagged VMs hits the allow rule first and is permitted, while all other traffic destined for known botnet C2 servers matches the subsequent deny rule and is blocked. Attaching the policy to the entire organization with an all-networks association makes it automatically effective for every existing and future VPC, eliminating the need to replicate rules in each project.
Placing the deny rule in an organization-level policy without a higher-priority allow rule (option B) would prevent lower-level policies from overriding it, so exceptions would be impossible. Implementing per-VPC routes (option C) would require continual manual updates and cannot rely on Google-managed threat-intelligence feeds. Cloud Armor (option D) protects only traffic that traverses HTTP(S) load balancers and cannot enforce egress controls for arbitrary VM traffic.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a global network firewall policy in Google Cloud?
Open an interactive chat with Bash
What does `threatIntelligence:botnet-cnc` mean in Google Firewall rules?
Open an interactive chat with Bash
How do network tags like `c2c-exempt` work in Google Cloud Firewall policies?
Open an interactive chat with Bash
What is a global network firewall policy in GCP?
Open an interactive chat with Bash
What does `threatIntelligence:botnet-cnc` mean in GCP?
Open an interactive chat with Bash
Why prioritize rules using precedence in firewall policies?
Open an interactive chat with Bash
GCP Professional Cloud Security Engineer
Securing communications and establishing boundary protection
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99 $11.99
$11.99/mo
Billed monthly, Cancel any time.
$19.99 after promotion ends
3 Month Pass
$44.99 $26.99
$8.99/mo
One time purchase of $26.99, Does not auto-renew.
$44.99 after promotion ends
Save $18!
MOST POPULAR
Annual Pass
$119.99 $71.99
$5.99/mo
One time purchase of $71.99, Does not auto-renew.
$119.99 after promotion ends
Save $48!
BEST DEAL
Lifetime Pass
$189.99 $113.99
One time purchase, Good for life.
Save $76!
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .