
Explanation:
The question requires blocking all SMTP traffic except from the corporate network and allowing it only in specific VPCs. Hierarchical firewall policies are evaluated first, followed by VPC firewall rules. Option C configures an ingress hierarchical rule (priority 10000) allowing corporate SMTP with goto_next, enabling evaluation of subsequent rules. The next hierarchical rule (priority 10010) denies all SMTP. This ensures corporate traffic is evaluated by VPC rules, which explicitly allow SMTP in specific VPCs. The priority order (10010 evaluated first) blocks all traffic, but the goto_next action in the corporate rule allows VPC rules to override for permitted VPCs. This meets the requirement of blocking non-corporate SMTP and allowing it only in specified VPCs.
Ultimate access to all questions.
To meet your organization's requirements of blocking all SMTP traffic to your cloud environment except for traffic originating from your corporate network, while restricting SMTP access to only specific VPCs across Google Cloud projects, what configuration steps should you take in the security policy?
A
B
C
D
No comments yet.