
Google Professional Cloud Network Engineer
Get started today
Ultimate access to all questions.
To investigate potential denial-of-service traffic targeting a VM in your default VPC, which Google Cloud service or method should you use to analyze the source of incoming traffic?
To investigate potential denial-of-service traffic targeting a VM in your default VPC, which Google Cloud service or method should you use to analyze the source of incoming traffic?
Explanation:
To analyze incoming traffic and identify the source IP addresses during a suspected denial-of-service attack, VPC Flow Logs are the correct tool as they capture network traffic metadata, including source and destination IPs. Data Access audit logs (options A and D) track configuration changes and API calls, not actual traffic data. Option B suggests using VPC Flow Logs for the subnet, which is correct, but the 'connection' field is not the exact field name—source IPs are in the 'src_ip' field. However, among the provided options, B is the closest valid choice. Option C incorrectly refers to 'src_location' (geographic data, not raw IPs) and has a typo in the VPC reference.