Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Google Exam Professional Cloud Network Engineer Topic 2 Question 90 Discussion

Actual exam question for Google's Professional Cloud Network Engineer exam
Question #: 90
Topic #: 2
[All Professional Cloud Network Engineer Questions]

You suspect that one of the virtual machines (VMs) in your default Virtual Private Cloud (VPC) is under a denial-of-service attack. You need to analyze the incoming traffic for the VM to understand where the traffic is coming from. What should you do?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Paris
2 months ago
I'm going with B as well. Can't wait to see what kind of shenanigans the hackers are up to this time.
upvoted 0 times
Roslyn
1 months ago
Definitely. Once we have the source IP addresses, we can take appropriate action to protect the VM.
upvoted 0 times
...
Malika
1 months ago
I agree. It's important to quickly identify the source of the attack to mitigate any potential damage.
upvoted 0 times
...
Katie
1 months ago
Yeah, analyzing the VPC Flow Logs for the subnet should give us a good idea of where the traffic is coming from.
upvoted 0 times
...
Yuki
2 months ago
I'm going with B as well. Can't wait to see what kind of shenanigans the hackers are up to this time.
upvoted 0 times
...
...
Roxane
2 months ago
I agree, option B is the way to go. These VPC Flow Logs better not be like the 'logs' I keep for my favorite TV shows.
upvoted 0 times
Vanda
2 months ago
I hope these logs are more useful than the ones you keep for your TV shows!
upvoted 0 times
...
Kenneth
2 months ago
Yeah, VPC Flow Logs for the subnet will help us analyze the incoming traffic.
upvoted 0 times
...
Yoko
2 months ago
I think option B is the best choice.
upvoted 0 times
...
...
Tamesha
3 months ago
Definitely B. Analyzing the VPC Flow Logs is the best approach to find the source of the DDoS attack.
upvoted 0 times
Roy
2 months ago
Let's enable VPC Flow Logs and get to the bottom of this.
upvoted 0 times
...
Corazon
2 months ago
It's important to act quickly to mitigate the denial-of-service attack.
upvoted 0 times
...
Bernardo
2 months ago
Once we analyze the logs, we can easily identify the source IP addresses.
upvoted 0 times
...
Lynelle
2 months ago
I agree, enabling VPC Flow Logs for the subnet is the way to go.
upvoted 0 times
...
...
Johnetta
3 months ago
I believe enabling VPC Flow Logs for the subnet is the best option as it specifically focuses on the incoming traffic for the VM.
upvoted 0 times
...
Helene
3 months ago
Hmm, I would go with option B. VPC Flow Logs seem like the way to go to analyze the incoming traffic and get the source IP addresses.
upvoted 0 times
Laurene
2 months ago
Yes, VPC Flow Logs for the subnet will provide the necessary information to identify the source IP addresses.
upvoted 0 times
...
Alton
2 months ago
I agree, option B with VPC Flow Logs is the best choice for analyzing incoming traffic.
upvoted 0 times
...
...
Micaela
3 months ago
But wouldn't enabling Data Access audit logs of the VPC also provide us with the source IP addresses?
upvoted 0 times
...
Katlyn
3 months ago
I agree with Twanna, analyzing the logs from the connection field will help us identify the source IP addresses.
upvoted 0 times
...
Twanna
4 months ago
I think we should enable VPC Flow Logs for the subnet.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77