Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam Professional Cloud Architect All Questions

View all questions & answers for the Professional Cloud Architect exam

Exam Professional Cloud Architect topic 1 question 133 discussion

Actual exam question from Google's Professional Cloud Architect
Question #: 133
Topic #: 1
[All Professional Cloud Architect Questions]

You have deployed several instances on Compute Engine. As a security requirement, instances cannot have a public IP address. There is no VPN connection between Google Cloud and your office, and you need to connect via SSH into a specific machine without violating the security requirements. What should you do?

  • A. Configure Cloud NAT on the subnet where the instance is hosted. Create an SSH connection to the Cloud NAT IP address to reach the instance.
  • B. Add all instances to an unmanaged instance group. Configure TCP Proxy Load Balancing with the instance group as a backend. Connect to the instance using the TCP Proxy IP.
  • C. Configure Identity-Aware Proxy (IAP) for the instance and ensure that you have the role of IAP-secured Tunnel User. Use the gcloud command line tool to ssh into the instance.
  • D. Create a bastion host in the network to SSH into the bastion host from your office location. From the bastion host, SSH into the desired instance.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
TotoroChina
Highly Voted 3 years, 4 months ago
Answer is C. https://cloud.google.com/iap/docs/using-tcp-forwarding#tunneling_with_ssh
upvoted 59 times
ShadowLord
2 years, 3 months ago
https://cloud.google.com/iap/docs/using-tcp-forwarding#tunneling_with_ssh "IAP TCP forwarding allows you to establish an encrypted tunnel over which you can forward SSH, RDP, and other traffic to VM instances" But Options C says ,,,,, SSH from IAP .. which is not true.
upvoted 2 times
...
meh009
3 years, 1 month ago
100% Agree. I use IAP all the time which allows me to reduce exposure to VM from public internet. Ans is C
upvoted 11 times
mikesp
3 years, 1 month ago
Agee too. Bastion host violates security requirements due to it has public IP :)
upvoted 12 times
...
...
...
ank82
Highly Voted 3 years, 4 months ago
And D seems correct, bastion host is specifically used for this purpose, using option C user can connect through cloud only. By using a bastion host, you can connect to an VM that does not have an external IP address. This approach allows you to connect to a development environment or manage the database instance for your external application, for example, without configuring additional firewall rules. https://cloud.google.com/solutions/connecting-securely
upvoted 16 times
eascen
3 years, 1 month ago
Except the policy is no machines can have public IP's, how do you connect to the bastion?
upvoted 6 times
elainexs
2 years, 5 months ago
It's never mentioned that there's no public IP in all GCP services, it just said instances no public IP, which is very normal. that's why bastion inward, and NAT outward.
upvoted 2 times
...
...
learner311
2 years, 7 months ago
C. no network connection between office and cloud. Can't use bastion. What C fails to say or specify is if you are either using cloud shell gcloud or you downloaded the sdk on local. Dumb question without clarification. Assuming silly test writers conflate gcloud always being used in cloud shell. So you are in cloud shell, you have internal access since the shell resides inside the VPC network with all perms.
upvoted 2 times
orest
2 years, 4 months ago
" There is no VPN connection between Google Cloud and your office". If there would be no network connection betweek office and the cloud you could not use any of google services
upvoted 1 times
ShadowLord
2 years, 3 months ago
But you can always SSH to bastion host from internet .. as ports are open usually https://cloud.google.com/iap/docs/using-tcp-forwarding#tunneling_with_ssh "IAP TCP forwarding allows you to establish an encrypted tunnel over which you can forward SSH, RDP, and other traffic to VM instances". it is Traffic forwarding ... But Options C says ,,,,, SSH from IAP .. which is not true.
upvoted 1 times
turbo8p
2 years ago
If you're looking for word precision then: Option C says "Use the gcloud command line tool to ssh into the instance. Most Voted" So I think C is still correct.
upvoted 1 times
...
...
...
...
[Removed]
1 year, 3 months ago
Question states: "As a security requirement, instances cannot have a public IP address" If you install a Public IP on the GCE Bastion host you violate the security requirement. If you install a Private IP on the GCE bastion host you need a private route (e.g. VPN) or NAT to it. The question scenario seems specific to point to the IAP SSH tunnel feature.
upvoted 1 times
...
...
3fd692e
Most Recent 1 month, 3 weeks ago
Selected Answer: C
C is the answer. D also works as a solution but it's not using GCP native features when available. Since it's a test about GCP, always go with the answer that uses GCP services.
upvoted 1 times
...
Gino17m
7 months ago
According to https://cloud.google.com/solutions/connecting-securely : "Using SSH with IAP's TCP forwarding feature wraps an SSH connection inside HTTPS. IAP's TCP forwarding feature then sends it to the remote VM." So is it ssh or http connection ? Very tricky question.....
upvoted 1 times
...
a53fd2c
7 months, 2 weeks ago
https://cloud.google.com/iap/docs/tutorial-gce Answer is D. For C to be corrected it should mention the IAP-secured Web App User role. No the one listed on the question which is wrong
upvoted 1 times
...
a53fd2c
7 months, 2 weeks ago
Answer is D. Wrong user mentioned on C Step 6: Test IAP To test that IAP is working correctly, follow the steps below: In your web browser, navigate to your domain. If you see "Unauthorized request", try again in a few minutes. When you see a Google sign-in screen, sign in using the Google Account you gave access to in the previous step. You should see a message like "Hi, [email protected]. I am my-managed-instance-group-29z6." Try refreshing the page. Your browser should show the names of the 3 machines in your managed instance group. This is the load balancer distributing traffic across the VMs in the group.
upvoted 1 times
ccpmad
5 months, 2 weeks ago
you are wrong, study first IAP. It is C.
upvoted 1 times
...
...
mesodan
8 months, 3 weeks ago
Selected Answer: C
C is correct: IAP offers a secure and controlled way to access internal instances without assigning them public IP addresses. It uses IAM permissions to restrict access only to authorized users and provides a temporary connection tunnel for SSH access using the gcloud command-line tool.
upvoted 1 times
...
hzaoui
10 months ago
Selected Answer: C
C is the best answer
upvoted 1 times
...
convers39
10 months, 2 weeks ago
Selected Answer: C
For D, Create a bastion host in the network to SSH into the bastion host from your office location. From the bastion host, SSH into the desired instance. How could you SSH into the bastion host? All VMs do not have public IP
upvoted 1 times
...
Wiss7
11 months, 2 weeks ago
Selected Answer: C
C is ok
upvoted 1 times
...
thewalker
1 year ago
Selected Answer: C
As per the documentation, https://cloud.google.com/iap/docs/tcp-forwarding-overview/ The option is C
upvoted 1 times
...
smlabonia
1 year, 2 months ago
Selected Answer: C
C is the correct answer in this case. Question quote "There is no VPN connection between Google Cloud and your office" Answer D "...from your office location..." The only way to achieve this with Bastion Host is giving it a Public IP. At least in this case.
upvoted 1 times
...
BiddlyBdoyng
1 year, 5 months ago
I think it's Bastion host. In my org (large bluechip) all connections are via bastion host to provide a single point of audit and control.
upvoted 2 times
kapa900
1 year, 5 months ago
Instances cannot have public IP bastian host will still need IP
upvoted 3 times
...
...
Atanu
1 year, 5 months ago
Selected Answer: D
Bastion host service is specifically designed for this purpose. No need to do over-engineering too much here.
upvoted 2 times
...
mraza
1 year, 6 months ago
Selected Answer: D
As per ChatGPT: Since instances cannot have a public IP address, the best option is to use a bastion host to access the instance securely. Therefore, option D is the correct choice. Here's what you would do: Create a new instance that will serve as a bastion host. Assign it a static IP address. Configure the firewall rules for the bastion host to allow incoming SSH traffic from your office location. Connect to the bastion host via SSH from your office location. Once connected to the bastion host, use SSH to connect to the desired instance on the same network. This way, you can securely access the instance without violating the security requirements.
upvoted 1 times
...
jlambdan
1 year, 7 months ago
Selected Answer: C
https://cloud.google.com/iap/docs/using-tcp-forwarding
upvoted 1 times
...
VarunGo
1 year, 8 months ago
Selected Answer: C
As per chatGPT answer is C. Identity-Aware Proxy (IAP) is a Google Cloud service that provides secure access to VM instances without exposing them to the internet. It allows you to establish a secure SSH connection to a VM instance via the Google Cloud Console or the gcloud command-line tool, using OAuth 2.0-based authentication and authorization. With IAP, you can set up secure, encrypted tunnels to your VM instances, without the need for a VPN or an external bastion host. By configuring IAP for the instance and ensuring that you have the IAP-secured Tunnel User role, you can securely access the instance using the gcloud command-line tool to SSH into the instance, without violating the security requirements.
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...