B Create 3 separate VPCs and use Cloud VPN to establish connectivity between

B create 3 separate vpcs and use cloud vpn to

This preview shows page 4 - 5 out of 5 pages.

B. Create 3 separate VPCs, and use Cloud VPN to establish connectivity between the two appropriate VPCs. C. Create 3 separate VPCs, and use VPC peering to establish connectivity between the two appropriate VPCs. D. Create a single project, and deploy specific firewall rules. Use network tags to isolate access between the departments. Answer: A Use Shared VPC to connect to a common VPC network. Resources in those projects can communicate with each other securely and efficiently across project boundaries using internal IPs. You can manage shared network resources, such as subnets, routes, and firewalls, from a central host project, enabling you to apply and enforce consistent network policies across the projects. With Shared VPC and IAM controls, you can separate network administration from project administration. This separation helps you implement the principle of least privilege. For example, a centralized network team can administer the network without having any permissions into the participating projects. Similarly, the project admins can manage their project resources without any permissions to manipulate the shared network. Reference: Question: 70 You need to restrict access to your Google Cloud load-balanced application so that only specific IP addresses can connect. What should you do? A. Create a secure perimeter using the Access Context Manager feature of VPC Service Controls and restrict access to the source IP range of the allowed clients and Google health check IP ranges. B. Create a secure perimeter using VPC Service Controls, and mark the load balancer as a service restricted to the source IP range of the allowed clients and Google health check IP ranges. C. Tag the backend instances "application," and create a firewall rule with target tag "application" and the source IP range of the allowed clients and Google health check IP ranges. D. Label the backend instances "application," and create a firewall rule with the target label "application" and the source IP range of the allowed clients and Google health check IP ranges. Answer: C Reference:
Image of page 4
For More exams visit http s ://killexams.com /vendors-exam-list Kill your exam at First Attempt .... Guaranteed!
Image of page 5

You've reached the end of your free preview.

Want to read all 5 pages?

  • Fall '20

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture