Your company has a single Virtual Private Cloud (VPC) network deployed in Google Cloud with access from your on-premises network using Cloud Interconnect. You must configure access only to Google APIs and services that are supported by VPC Service Controls through hybrid connectivity with a service level agreement (SLA) in place. What should you do?
You created a new VPC network named Dev with a single subnet. You added a firewall rule for the network
Dev to allow HTTP traffic only and enabled logging. When you try to log in to an instance in the subnet via
Remote Desktop Protocol, the login fails. You look for the Firewall rules logs in Stackdriver Logging, but you
do not see any entries for blocked traffic. You want to see the logs for blocked traffic.
Your company's security team wants to limit the type of inbound traffic that can reach your web servers to protect against security threats. You need to configure the firewall rules on the web servers within your Virtual Private Cloud (VPC) to handle HTTP and HTTPS web traffic for TCP only What should you do?
You are configuring the firewall endpoints as part of the Cloud Next Generation Firewall (Cloud NGFW)
intrusion prevention service in Google Cloud. You have configured a threat prevention security profile, and
you now need to create an endpoint for traffic inspection. What should you do?
You have several VMs across multiple VPCs in your cloud environment that require access to internetendpoints. These VMs cannot have public IP addresses due to security policies, so you plan to use CloudNAT to provide outbound internet access. Within your VPCs, you have several subnets in each region. Youwant to ensure that only specific subnets have access to the internet through Cloud NAT. You want to avoidany unintentional configuration issues caused by other administrators and align to Google-recommendedpractices. What should you do?