
GCP
230+ Soal Latihan Gratis dengan Jawaban Terverifikasi AI
Didukung AI
Setiap jawaban Google Professional Cloud Network Engineer diverifikasi silang oleh 3 model AI terkemuka untuk memastikan akurasi maksimum. Dapatkan penjelasan detail per opsi dan analisis soal mendalam.
Your company operates a single Google Cloud project with three VPC networks (prod, stage, dev) across two regions; you must ensure that API calls to Cloud Bigtable and Artifact Registry are allowed only when requests originate from your corporate egress NAT public IP ranges 203.0.113.0/24 and 198.51.100.0/24, and on-prem systems access Google APIs over the public internet via those NATs; what should you do?
Ingin berlatih semua soal di mana saja?
Unduh Cloud Pass gratis — termasuk tes latihan, pelacakan progres & lainnya.
Masa belajar: 1 month
I really appreciated the detailed explanations. This app strengthened my fundamentals more than any video course.
Masa belajar: 1 month
문제를 다 풀긴했는데 정답률이 65%가 나와서 1번 더 리셋해서 문제 풀었어요. 문제와 정답을 외우기보다 실제 개념 학습에 초점을 맞춰서 그런지 공부량이 많았고, 실제 시험에서 비슷한 유형도 나왔지만 처음보는 시나리오가 나왔는데도 잘 풀 수 있었어요. 수험생분들도 잘 준비해서 꼭 합격하시길!!
Masa belajar: 1 month
I was surprised how similar the question style was to the actual PCNE exam. Practicing with this app made complex topics like VPC peering and NAT configuration much easier. Passed and I’m really satisfied.
Masa belajar: 2 weeks
I spent two weeks solving about 30 questions a day, and Cloud Pass helped me reinforce my weak spots in hybrid networking and load balancing strategies. This app is a must-have for anyone preparing for PCNE.
Masa belajar: 1 month
Good questions and similar to the real exam questions. The app is very helpful tool
Unduh Cloud Pass dan akses semua soal latihan Google Professional Cloud Network Engineer secara gratis.
Dapatkan aplikasi gratis
Your team manages a VPC named Studio that was created in auto mode for a global video-rendering platform; auto-mode VPCs reserve 10.128.0.0/9 for their subnets across regions. You must create a new VPC named Archive in the same project and connect it to Studio using VPC Network Peering so that internal RFC1918 traffic routes privately end-to-end without NAT; the two VPCs must have non-overlapping IP ranges now and as they scale. How should you configure the Archive VPC?
You are a network engineer at a global streaming company migrating core APIs to Google Cloud. These are the connectivity requirements:
Your company operates a globally available ticketing API for live events that is fronted by a global external HTTP(S) load balancer, and during flash sales traffic spikes to 250,000 requests per minute from more than 40 countries while your security team detects application-layer patterns such as SQL injection, cross-site scripting, and anomalous headers. You must protect the service against these application-level attacks at the edge without changing application code and attach the control to the existing load balancer backend; what should you do?
Your hardware startup distributes a critical smart door lock firmware globally via Cloud CDN in front of an external HTTP(S) load balancer with a Cloud Storage backend bucket. During a staggered rollout, you discover that the wrong firmware build (2.4.1-debug) was uploaded and has been cached worldwide; the object is served with Cache-Control: max-age=86400, and tens of thousands of devices have already pulled it. Your communications team has instructed customers to re-download the corrected firmware using the same URL (https://updates.example.com/locks/fw.bin). You must ensure that all subsequent downloads fetch the corrected firmware immediately from the same URL across all edge locations. What should you do?
In your Google Cloud organization, there are two folders: Analytics and Compliance; you need a scalable, consistent, and low-cost way to enforce the following across all VMs in every project under those folders: • For Analytics projects, TCP port 9000 must always be open for ingress from any source (0.0.0.0/0). • For Compliance projects, all ingress traffic to TCP port 9000 must be denied. What should you do?
Your company operates a low-latency RTMP streaming service behind a regional external passthrough Network Load Balancer with backends in two managed instance groups located in us-central1 and europe-west1. For licensing reasons, only client networks 203.0.113.0/24 and 198.51.100.64/26 must be able to reach TCP port 1935 of the service from the internet, and all other client IPs must be blocked, while Google Cloud health checks must continue to work (130.211.0.0/22 and 35.191.0.0/16). What should you do?
A global retail company operates a single Shared VPC (prod-hub) in Google Cloud and connects two on-premises data centers via dual 10-Gbps Dedicated Interconnect attachments terminated in us-east4 for private reachability. Compliance requires that all on-premises access to Cloud Storage must traverse the Interconnect links, but requests to all other Google APIs and services (for example, Pub/Sub and BigQuery) must continue to egress over the public internet through the existing NAT; what should you do?
You work for a global retail conglomerate migrating to Google Cloud. Cloud requirements: • Two on-premises data centers located in Japan (Tokyo) and Germany (Frankfurt) with Dedicated Interconnects connected to Cloud regions asia-northeast1 (primary HQ) and europe-west3 (backup), each link provisioned at 10 Gbps. • Multiple regional branch offices across LATAM and Middle East/Africa. • Regional data processing must occur in europe-west3 and asia-southeast1. • A centralized Network Operations team manages Shared VPC across projects. Your security and compliance team mandates a virtual inline security appliance to perform L7 URL filtering for north–south traffic, and you plan to place the appliance in asia-northeast1. What should you do?
Your company operates a third-party edge firewall at a remote warehouse that only supports IKEv1 and does not support BGP. You must establish connectivity from the warehouse network to workloads running in Google Cloud using a policy-based VPN. The on-premises warehouse uses 10.30.20.0/24, 10.30.21.0/24, and 10.30.22.0/24. Your Google Cloud VPC uses 172.25.40.0/24, 172.25.41.0/24, and 172.25.42.0/24. You have already created a Cloud VPN gateway in Google Cloud and need to define the traffic selectors (LOCAL_TS and REMOTE_TS) on the legacy firewall to bring the tunnel up. What should you configure?
Your retail company has set up a single IPSec Cloud VPN tunnel from its Google Cloud VPC to a logistics partner’s on-premises device; the VPN Tunnel Status shows Established, but the Cloud Router’s BGP Session Status shows BGP not configured. The partner provided these BGP parameters: • Partner BGP address: 169.254.22.1/30 • Partner ASN: 65044 • Google Cloud BGP address: 169.254.22.2 • Google Cloud ASN: 65001 • MD5 Authentication: Disabled You have already associated the Cloud Router with the Cloud VPN tunnel. Based on the partner’s settings, how should you configure the local BGP session on Google Cloud?
Your security team now requires capturing packet payloads for all egress traffic originating from Compute Engine instances in region europe-west4 within VPC prod-vpc, limited to subnets app-euw4 (10.70.0.0/20) and jobs-euw4 (10.70.16.0/20). You have deployed an IDS virtual appliance as a regional managed instance group with 3 VMs (ids-mig) in europe-west4. You must integrate the IDS so it receives mirrored packets for egress traffic only and production routing remains unchanged. What should you do?
Your company runs two microservices in a regional GKE cluster (name: prod-net, region: us-central1) exposed through a single external HTTP(S) Load Balancer configured by a Kubernetes Ingress; requests to shop.acmepuzzles.com/orders and shop.acmepuzzles.com/insights load correctly, but going to https://shop.acmepuzzles.com/ returns an HTTP 404 from the load balancer, and you must fix this without changing DNS or creating a new load balancer; what should you do?
You are implementing a transit-hub network on Google Cloud for a media company with multiple regional spoke VPCs; the hub hosts a pair of third-party firewalls in high availability behind a regional internal passthrough Network Load Balancer with VIP 172.31.10.8, all spokes are already peered to the hub, and the requirement is that every spoke must use the hub firewalls for all internet egress (0.0.0.0/0) while only the firewall instances in the hub are allowed to use the default internet gateway in the hub; what should you configure to meet these requirements and maintain high availability?
Your company is deploying a new 20-Gbps Dedicated Interconnect with two VLAN attachments in us-east4 and BGP peering to on-premises ASN 65010; three departments (R&D, HR, and Finance) each use separate service projects attached to a single Shared VPC host project that owns the central VPC, and you need all departments to exchange routes with on-premises over this Interconnect—where should you create the Cloud Router instance?
Your organization operates 4 VPC networks across 3 Google Cloud projects under a single folder. The Compliance team owns all firewall rules and SSL certificates for audit purposes, while the Platform Networking team administers VPCs, subnets, routes, and peering. The networking team must be able to view firewall rules across all projects for troubleshooting (read/list only), but must not be able to create, modify, or delete any firewall rules. You plan to grant access at the folder level so it inherits to all current and future projects. What IAM permissions or roles should you assign to the Platform Networking team to meet these requirements while adhering to least privilege?
Your media startup is launching a stateless HTTPS landing site in europe-west1 and asia-southeast1. The site runs on Compute Engine instances in two regional managed instance groups (one per region) with autoscaling and autohealing; no database or session persistence is required. You need a single global endpoint (site.example.com) that minimizes latency for EMEA and APAC users and can withstand a full regional outage, following Google-recommended practices. What should you do?
Your media analytics team runs workers in a VPC-native GKE Standard cluster in us-east1 where nodes currently have external IPs; the cluster uses the default ip-masq-agent settings (SNAT enabled). A partner exposes an API only to traffic originating from your Cloud NAT public addresses, and the partner's allowlist covers 203.51.64.0/19; you must ensure all pod egress to 203.51.64.0/19 uses Cloud NAT rather than the nodes' external IPs. You will configure Cloud NAT on the cluster subnet; what change should you make on the cluster to ensure traffic to 203.51.64.0/19 is NATed by Cloud NAT?
You are deploying a new VPC in europe-west1 to host internal microservices that must bind to two distinct private IP ranges. Your application VMs will reside in a subnet using 10.20.0.0/24, but a legacy client integration requires the same VMs to also listen on IPs from 192.168.70.0/24 for inbound connections. Without adding a second NIC or introducing new gateways, you need the instances to have addresses in both ranges; what should you do?
You are deploying an internal-only metrics ingestion HTTP endpoint on a Compute Engine VM named collector-01 in zone us-central1-b within the project analytics-prd, the VM has no external IP and must be reachable only by multiple client VMs in the same VPC network, and you need a simple, built-in way for those clients to obtain the service’s IP address without creating public DNS records or exposing the service; what should you do?
Foundational