Topic 1 Question 112
Your company has defined a resource hierarchy that includes a parent folder with subfolders for each department. Each department defines their respective project and VPC in the assigned folder and has the appropriate permissions to create Google Cloud firewall rules. The VPCs should not allow traffic to flow between them. You need to block all traffic from any source, including other VPCs, and delegate only the intra-VPC firewall rules to the respective departments. What should you do?
Create a VPC firewall rule in each VPC to block traffic from any source, with priority 0.
Create a VPC firewall rule in each VPC to block traffic from any source, with priority 1000.
Create two hierarchical firewall policies per department's folder with two rules in each: a high-priority rule that matches traffic from the private CIDRs assigned to the respective VPC and sets the action to allow, and another lower-priority rule that blocks traffic from any other source.
Create two hierarchical firewall policies per department's folder with two rules in each: a high-priority rule that matches traffic from the private CIDRs assigned to the respective VPC and sets the action to goto_next, and another lower-priority rule that blocks traffic from any other source.
ユーザの投票
コメント(11)
Reading it twice, I guess D is correct as "delegate only the intra-VPC firewall rules to the respective departments" matches the "goto_next" parameter and departments are in charge of the flow of traffic within the own VPC
👍 5playpacman2022/12/04- 正解だと思う選択肢: D
goto_next is better option.
👍 5redgoose68102022/12/07 - 正解だと思う選択肢: D
Correct answer - D
Hierarchical firewall policy rules have a new goto_next action that you can use to delegate connection evaluation to lower levels of the hierarchy.
👍 4pfilourenco2022/12/10
シャッフルモード