BlackFriday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Google Exam Professional Cloud Network Engineer Topic 2 Question 90 Discussion

Actual exam question for Google's Professional Cloud Network Engineer exam
Question #: 90
Topic #: 2
[All Professional Cloud Network Engineer Questions]

You suspect that one of the virtual machines (VMs) in your default Virtual Private Cloud (VPC) is under a denial-of-service attack. You need to analyze the incoming traffic for the VM to understand where the traffic is coming from. What should you do?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Paris
1 months ago
I'm going with B as well. Can't wait to see what kind of shenanigans the hackers are up to this time.
upvoted 0 times
Roslyn
1 days ago
Definitely. Once we have the source IP addresses, we can take appropriate action to protect the VM.
upvoted 0 times
...
Malika
12 days ago
I agree. It's important to quickly identify the source of the attack to mitigate any potential damage.
upvoted 0 times
...
Katie
13 days ago
Yeah, analyzing the VPC Flow Logs for the subnet should give us a good idea of where the traffic is coming from.
upvoted 0 times
...
Yuki
22 days ago
I'm going with B as well. Can't wait to see what kind of shenanigans the hackers are up to this time.
upvoted 0 times
...
...
Roxane
1 months ago
I agree, option B is the way to go. These VPC Flow Logs better not be like the 'logs' I keep for my favorite TV shows.
upvoted 0 times
Vanda
21 days ago
I hope these logs are more useful than the ones you keep for your TV shows!
upvoted 0 times
...
Kenneth
27 days ago
Yeah, VPC Flow Logs for the subnet will help us analyze the incoming traffic.
upvoted 0 times
...
Yoko
27 days ago
I think option B is the best choice.
upvoted 0 times
...
...
Tamesha
2 months ago
Definitely B. Analyzing the VPC Flow Logs is the best approach to find the source of the DDoS attack.
upvoted 0 times
Roy
15 days ago
Let's enable VPC Flow Logs and get to the bottom of this.
upvoted 0 times
...
Corazon
20 days ago
It's important to act quickly to mitigate the denial-of-service attack.
upvoted 0 times
...
Bernardo
29 days ago
Once we analyze the logs, we can easily identify the source IP addresses.
upvoted 0 times
...
Lynelle
1 months ago
I agree, enabling VPC Flow Logs for the subnet is the way to go.
upvoted 0 times
...
...
Johnetta
2 months ago
I believe enabling VPC Flow Logs for the subnet is the best option as it specifically focuses on the incoming traffic for the VM.
upvoted 0 times
...
Helene
2 months ago
Hmm, I would go with option B. VPC Flow Logs seem like the way to go to analyze the incoming traffic and get the source IP addresses.
upvoted 0 times
Laurene
1 months ago
Yes, VPC Flow Logs for the subnet will provide the necessary information to identify the source IP addresses.
upvoted 0 times
...
Alton
1 months ago
I agree, option B with VPC Flow Logs is the best choice for analyzing incoming traffic.
upvoted 0 times
...
...
Micaela
2 months ago
But wouldn't enabling Data Access audit logs of the VPC also provide us with the source IP addresses?
upvoted 0 times
...
Katlyn
2 months ago
I agree with Twanna, analyzing the logs from the connection field will help us identify the source IP addresses.
upvoted 0 times
...
Twanna
3 months ago
I think we should enable VPC Flow Logs for the subnet.
upvoted 0 times
...

Save Cancel