Topic 1 Question 224
You have numerous private virtual machines on Google Cloud. You occasionally need to manage the servers through Secure Socket Shell (SSH) from a remote location. You want to configure remote access to the servers in a manner that optimizes security and cost efficiency.
What should you do?
Create a site-to-site VPN from your corporate network to Google Cloud.
Configure server instances with public IP addresses. Create a firewall rule to only allow traffic from your corporate IPs.
Create a firewall rule to allow access from the Identity-Aware Proxy (IAP) IP range. Grant the role of an IAP-secured Tunnel User to the administrators.
Create a jump host instance with public IP. Manage the instances by connecting through the jump host.
ユーザの投票
コメント(6)
- 正解だと思う選択肢: C
C - correct. With TCP forwarding, IAP can protect SSH and RDP access to your VMs hosted on Google Cloud. Your VM instances don't even need public IP addresses. https://cloud.google.com/iap#section-2
👍 3alkaloid2023/08/04 - 正解だと思う選択肢: C
Typical use case for IAP
👍 2anshad6662023/08/25 C. Create a firewall rule to allow access from the Identity-Aware Proxy (IAP) IP range. Grant the role of an IAP-secured Tunnel User to the administrators. This is a good option for organizations that want to use IAP to secure their remote access. IAP is a Google-managed service that provides a secure way to access Google Cloud resources from the internet. D. Create a jump host instance with public IP. Manage the instances by connecting through the jump host. This is a good option for organizations that want to have a secure way to manage their VMs without exposing them to the public internet. The jump host is a server that is exposed to the public internet and has access to the VMs. Administrators can connect to the jump host and then use it to manage the VMs. In this case, the best option is to create a jump host instance with public IP. This will allow administrators to manage the VMs securely without exposing them to the public internet. The jump host can be configured with a firewall rule to only allow traffic from trusted IP addresses. This will help to protect the VMs from unauthorized access.
👍 1Mithung302023/08/04
シャッフルモード