0
0
GCPcloud~20 mins

Cloud Armor for DDoS and WAF in GCP - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Cloud Armor Mastery
Get all challenges correct to earn this badge!
Test your skills under time pressure!
service_behavior
intermediate
2:00remaining
How does Cloud Armor respond to a detected DDoS attack?

When Google Cloud Armor detects a DDoS attack on your service, what is its primary behavior?

AIt applies configured security policies to filter and block malicious traffic while allowing legitimate requests.
BIt redirects all traffic to a backup server outside Google Cloud.
CIt automatically blocks all incoming traffic to the service until the attack stops.
DIt shuts down the service to prevent damage and notifies the administrator.
Attempts:
2 left
💡 Hint

Think about how a protective filter works rather than stopping everything.

🧠 Conceptual
intermediate
2:00remaining
What is the role of WAF rules in Cloud Armor?

Which best describes the purpose of Web Application Firewall (WAF) rules in Cloud Armor?

AThey monitor server CPU usage and send alerts.
BThey define patterns to detect and block common web attacks like SQL injection and cross-site scripting.
CThey automatically scale the backend servers during high traffic.
DThey encrypt all incoming traffic to the application.
Attempts:
2 left
💡 Hint

WAF rules look for harmful patterns in web requests.

Architecture
advanced
2:30remaining
Which architecture best integrates Cloud Armor for protecting a global web application?

You have a global web application hosted on Google Cloud with multiple backend regions. Which architecture best uses Cloud Armor to protect it?

AApply Cloud Armor policies on the global HTTP(S) Load Balancer to filter traffic before it reaches backends.
BDeploy Cloud Armor policies on each backend VM instance individually.
CUse Cloud Armor only on the primary region's load balancer and rely on firewall rules elsewhere.
DConfigure Cloud Armor on the Cloud CDN to cache and block malicious content.
Attempts:
2 left
💡 Hint

Think about where traffic first enters your system globally.

security
advanced
2:30remaining
What happens if a Cloud Armor security policy has conflicting rules for the same IP address?

If a Cloud Armor security policy contains two rules that both match the same IP address but have different actions (one ALLOW, one DENY), what is the effective action?

AThe DENY action always overrides ALLOW regardless of rule order.
BThe ALLOW action always overrides DENY regardless of rule order.
CCloud Armor throws an error and blocks all traffic from that IP.
DThe first matching rule in priority order is applied, so the action of that rule is enforced.
Attempts:
2 left
💡 Hint

Consider how rule priority affects decision making.

Best Practice
expert
3:00remaining
Which practice ensures minimal false positives when using Cloud Armor WAF rules?

To reduce false positives while using Cloud Armor's WAF rules on a critical web application, which practice is best?

AOnly use IP-based allowlists and blocklists without WAF rules.
BEnable all predefined WAF rules at once without customization to maximize protection.
CStart with a monitoring mode to log matches, then gradually enable blocking after tuning rules based on logs.
DDisable logging to improve performance and avoid alert fatigue.
Attempts:
2 left
💡 Hint

Think about how to safely test rules before blocking traffic.