
Explanation:
The requirement is to create separate network administrative domains for three departments within a single project, allowing two to communicate while isolating the third, with minimal operational overhead.
Thus, using VPC peering (C) meets the requirements by balancing simplicity, isolation, and administrative separation.
Ultimate access to all questions.
Your organization is deploying a single Google Cloud project for three distinct departments. Two departments need network connectivity between each other, while the third must remain isolated. The design should establish separate network administrative domains while minimizing operational overhead.
How would you architect the network topology to meet these requirements?
A
Create a Shared VPC Host Project and the respective Service Projects for each of the 3 separate departments.
B
Create 3 separate VPCs, and use Cloud VPN to establish connectivity between the two appropriate VPCs.
C
Create 3 separate VPCs, and use VPC peering to establish connectivity between the two appropriate VPCs.
D
Create a single project, and deploy specific firewall rules. Use network tags to isolate access between the departments.
No comments yet.