You are designing a packet mirroring policy as pan of your network security architecture for your gaming
workload. Your Infrastructure is located in the us-west2 region and deployed across several zones: us-west2-
a. us-west2-b. and us-west2-c The Infrastructure Is running a web-based application on TCP ports 80 and 443
with other game servers that utilize the UDP protocol. You need to deploy packet mirroring policies and
collector instances to monitor web application traffic while minimizing inter-zonal network egress costs.
Following Google-recommended practices, how should you deploy the packet mirroring policies and collector
instances?
You are designing a packet mirroring policy as pan of your network security architecture for your gaming
workload. Your Infrastructure is located in the us-west2 region and deployed across several zones: us-west2-
a. us-west2-b. and us-west2-c The Infrastructure Is running a web-based application on TCP ports 80 and 443
with other game servers that utilize the UDP protocol. You need to deploy packet mirroring policies and
collector instances to monitor web application traffic while minimizing inter-zonal network egress costs.
Following Google-recommended practices, how should you deploy the packet mirroring policies and collector
instances?
You have several VMs across multiple VPCs in your cloud environment that require access to internetendpoints. These VMs cannot have public IP addresses due to security policies, so you plan to use CloudNAT to provide outbound internet access. Within your VPCs, you have several subnets in each region. Youwant to ensure that only specific subnets have access to the internet through Cloud NAT. You want to avoidany unintentional configuration issues caused by other administrators and align to Google-recommendedpractices. What should you do?
You created a new VPC network named Dev with a single subnet. You added a firewall rule for the network
Dev to allow HTTP traffic only and enabled logging. When you try to log in to an instance in the subnet via
Remote Desktop Protocol, the login fails. You look for the Firewall rules logs in Stackdriver Logging, but you
do not see any entries for blocked traffic. You want to see the logs for blocked traffic.
Your organization recently re-architected your cloud environment to use Network Connectivity Center.
However, an error occurred when you tried to add a new VPC named vpc-dev as a spoke. The error indicated
that there was an issue with an existing spoke and the IP space of a VPC named vpc-pre-prod. You must
complete the migration quickly and efficiently. What should you do?