GCDL Practice Question: A CISO is implementing a Zero Trust security…
This GCDL practice question tests your understanding of a ciso is implementing a zero trust security…. Read the scenario carefully and evaluate each option against the stated constraints before committing to an answer. After answering, compare your reasoning against the explanation and wrong-answer breakdown below. Once you have made your selection, read the full explanation to reinforce the concept and understand why each distractor is designed to mislead on exam day.
A CISO is implementing a Zero Trust security architecture for the company's Google Cloud environment. Under Zero Trust, which fundamental assumption about network traffic changes compared to traditional perimeter-based security?
Answer choices
Why each option matters
Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.
Distractor review
Zero Trust assumes all traffic is malicious and blocks all requests by default, requiring explicit allowlisting for each connection
Zero Trust doesn't block all traffic — it requires all traffic to be verified. 'Never trust, always verify' means authentication and authorization for every request, not blocking everything. Legitimate users and services can access what they need once verified.
Best answer
Zero Trust assumes no traffic is trusted by default regardless of network origin — every request must be explicitly authenticated and authorized based on identity, device posture, and context
This is the core Zero Trust principle: 'never trust, always verify.' A request from inside the VPC receives the same verification scrutiny as a request from the public internet. This model is more appropriate for cloud environments where the network perimeter no longer has clear meaning — employees, services, and attackers can all be inside the 'perimeter.'
Distractor review
Zero Trust eliminates the need for encryption since all traffic is assumed to be on secure internal networks
Zero Trust does not eliminate encryption — it typically requires it. Since Zero Trust assumes no network is trusted, encryption (TLS) is essential to prevent interception even on 'internal' networks.
Distractor review
Zero Trust assumes that internal network traffic is more secure than external traffic because it has passed through the corporate firewall
This describes the traditional perimeter security assumption that Zero Trust specifically rejects. Zero Trust does not differentiate trust based on network location.
Common exam trap
Common exam trap: NAT rules depend on direction and matching traffic
NAT is not only about the public address. The inside/outside interface roles and the ACL or rule that matches traffic are just as important.
Technical deep dive
How to think about this question
NAT questions usually test address translation, overload/PAT behaviour, static mappings and whether the right traffic is being translated. Read the interface direction and address terms carefully.
KKey Concepts to Remember
- Static NAT maps one inside address to one outside address.
- PAT allows many inside hosts to share one public address using ports.
- Inside local and inside global describe the private and translated addresses.
- NAT ACLs identify traffic for translation, not always security filtering.
TExam Day Tips
- Identify inside and outside interfaces first.
- Check whether the scenario needs static NAT, dynamic NAT or PAT.
- Do not confuse NAT matching ACLs with normal packet-filtering intent.
Key takeaway
NAT direction and interface roles matter as much as the IP address mapping. Inside/outside designation controls which traffic is translated.
Related practice questions
Related GCDL practice-question pages
Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.
More questions from this exam
Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.
Question 1
A traditional retailer currently maintains its own data centers, purchasing servers every 3–5 years and paying for facilities, power, and staff regardless of demand. When it migrates its workloads to the public cloud, which change in cost model does it experience?
Question 2
An e-commerce company plans its infrastructure for peak shopping events (e.g., Black Friday) which drive 50× normal traffic. On-premises, they must maintain 50× capacity year-round. In the cloud, they provision 50× capacity only during peak periods. Which cloud characteristic enables this cost optimization?
Question 3
Which term describes the process by which organizations integrate digital technology into all areas of their business, fundamentally changing how they operate and deliver value to customers?
Question 4
When a company moves from maintaining its own data center to using Google Cloud, which operational responsibility does Google assume that the company previously managed?
Question 5
A hospital runs a patient records system that must remain on-premises due to strict regulatory data residency requirements. However, they also want to use cloud-based AI for diagnostic imaging analysis. Which cloud deployment model best describes their architecture?
Question 6
What is virtualization in the context of cloud computing, and why is it fundamental to how cloud providers deliver services?
Practice this exam
Start a free GCDL practice session
Short sessions build daily habit. Longer sessions build exam-day stamina. Try a timed session to simulate real conditions.
FAQ
Questions learners often ask
What does this GCDL question test?
Static NAT maps one inside address to one outside address.
What is the correct answer to this question?
The correct answer is: Zero Trust assumes no traffic is trusted by default regardless of network origin — every request must be explicitly authenticated and authorized based on identity, device posture, and context — Traditional perimeter-based security assumes that traffic inside the corporate network is trusted; external traffic is untrusted. Zero Trust eliminates this assumption: no traffic is trusted by default, regardless of whether it originates from inside or outside the corporate network. Every request must be authenticated and authorized explicitly based on identity, device posture, and context — regardless of network location.
What should I do if I get this GCDL question wrong?
Review the four NAT address types (inside local, inside global, outside local, outside global), PAT port overload, and static vs dynamic NAT use cases. Then practise related GCDL NAT questions on configuration and troubleshooting.
About these practice questions
Courseiva creates original exam-style practice questions with explanations and wrong-answer analysis. It does not publish real exam questions, exam dumps, or protected exam content. Learn why practice questions differ from exam dumps →
Discussion
Sign in to join the discussion.
This GCDL practice question is part of Courseiva's free Google Cloud certification practice question bank. Courseiva provides original exam-style practice questions with explanations, topic-based practice, mock exams, readiness tracking, and study analytics to help learners prepare for the GCDL exam.