
Answer-first summary for fast verification
Answer: Configure packet mirroring policies.
The question requires identifying all network anomalies across various traffic types including VM-to-VM, internet-to-VM, and VM-to-Google services traffic within and across VPCs. Packet mirroring (B) is the optimal choice because it captures complete packet data including headers and payloads, enabling comprehensive anomaly detection using security tools like IDS/IPS. VPC Flow Logs (C) only provide metadata about network flows without packet contents, limiting their effectiveness for detailed anomaly analysis. Organization policy constraints (A) are for governance, not monitoring, and Cloud Audit Logs (D) track API calls, not network traffic. The community discussion shows strong support for B (68% vs 32% for C), with key insights that packet mirroring provides the necessary detail for security analysis while VPC Flow Logs are insufficient for comprehensive anomaly detection.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
Your company requires the security and network engineering teams to identify all network anomalies, including internal VM-to-VM traffic, traffic between the internet and VMs, and traffic from VMs to Google Cloud services across production VPCs. Which method should you use?
A
Define an organization policy constraint.
B
Configure packet mirroring policies.
C
Enable VPC Flow Logs on the subnet.
D
Monitor and analyze Cloud Audit Logs.
No comments yet.