A customer needs to prevent attackers from hijacking their domain/IP and redirecting users to a malicious site through a man-in-
Which solution should this customer use?
A company is running workloads in a dedicated server room. They must only be accessed from within the private company
network. You need to connect to these workloads from Compute Engine instances within a Google Cloud Platform project.
Which two approaches can you take to meet the requirements? (Choose two.)
A customer implements Cloud Identity-Aware Proxy for their ERP system hosted on Compute Engine. Their security team
wants to add a security layer so that the ERP systems only accept traffic from Cloud Identity-Aware Proxy.