Medium1 markMultiple Choice

GCP PCA · Question 45 · Domain 3: Designing for Security and Compliance

You are configuring Cloud Armor to protect a web application. Which TWO types of rules can you implement? (Select TWO)

Answer options:

A.

IP allowlist/denylist rules.

B.

Preconfigured WAF rules for SQL injection and Cross-Site Scripting (XSS).

C.

IAM identity-based access rules.

D.

VPC Peering routing rules.

E.

Data Loss Prevention (DLP) redaction rules.

How to approach this question

Identify Cloud Armor capabilities.

Full Answer

IP allowlist/denylist rules. Preconfigured WAF rules for SQL injection and Cross-Site Scripting (XSS).
Cloud Armor operates at the edge, providing IP-based access control and Layer 7 Web Application Firewall (WAF) rules to protect against common attacks like SQLi and XSS.

Common mistakes

Confusing Cloud Armor with IAP (identity) or DLP (data redaction).

Practice the full GCP Professional Cloud Architect Practice Exam 2

50 questions · hints · full answers · grading

More questions from this exam