Ultimate access to all questions.
Your company has completed a migration to Google Cloud with a setup of three VPC networks: Sales, Finance, and Engineering. Each VPC hosts over 100 Compute Engine instances. Developers using instances in the Sales and Finance VPCs now require private connectivity between these networks. How can you enable secure and high-performance communication between the Sales and Finance VPCs without impacting security?
Explanation:
The question requires private connectivity between Sales and Finance VPCs without compromising performance or security. VPC Network Peering (Option C) is the correct solution because it allows private, low-latency communication between instances in different VPCs within Google Cloud. HA VPN (Option A) is designed for hybrid connectivity (e.g., on-premises to cloud) and introduces unnecessary overhead. External IPs (Option B) expose traffic to the public internet, compromising security. Cloud NAT (Option D) enables outbound internet access but does not facilitate inter-VPC communication. Peering ensures traffic stays within Google's network, maintaining security and performance.