
Google Associate Cloud Engineer
Get started today
Ultimate access to all questions.
Your company is piloting a project to outsource the management of their Linux Compute Engine VMs to a third-party service provider. This provider does not use Google Accounts but requires SSH access to perform their tasks. What is the most secure method to enable their access?
Your company is piloting a project to outsource the management of their Linux Compute Engine VMs to a third-party service provider. This provider does not use Google Accounts but requires SSH access to perform their tasks. What is the most secure method to enable their access?
Explanation:
Option B is correct because it allows the third-party service provider to securely access the VMs using SSH keys, ensuring that only authorized users with the corresponding private key can gain access. This method does not require Google Accounts and is a common practice for granting SSH access to external parties. Options A, C, and D are incorrect because they either do not directly enable SSH access (A and C) or may expose the VMs to unauthorized access (D). Links: Adding SSH Keys, Managing User Access.