
Explanation:
Option A is incorrect because routes are designed for network traffic forwarding between networks, not for managing access to specific ports on a VM. Option B is incorrect as merely tagging a VM does not automatically implement the necessary firewall rules to control traffic. Option C is correct because it involves both tagging the VM and creating a specific firewall rule to allow incoming (ingress) traffic on UDP port 636, ensuring clients can access the LDAP server. Option D is incorrect since it focuses on outgoing (egress) traffic, which does not address the requirement for clients to access the server. For more information, refer to Google Cloud's documentation on firewalls, ingress and egress rules, and routes.
Ultimate access to all questions.
No comments yet.
Your company is in the process of migrating Active Directory to Google Cloud Platform (GCP). As part of this migration, you've set up an LDAP server on a Compute Engine instance, accessible via TLS on port 636 over UDP. What steps should you take to ensure clients can successfully access this server?
A
Create a route named 'allow-udp-636' with the next hop set to the VM instance hosting the LDAP server.
B
Apply a network tag 'allow-udp-636' to the VM running the LDAP server.
C
D