Q: 3
You want to configure an SSH connection to a single Compute Engine instance for users in the dev1
group. This instance is the only resource in this particular Google Cloud Platform project that the
dev1 users should be able to connect to. What should you do?
Options
Discussion
A , that's the pattern shown in the official documentation and practice tests, especially for scoped SSH via IAM.
D, not A
Option D looks good to me since blocking project-wide keys and sharing one key with the dev1 group gets access limited to just that instance. Pretty sure that's valid unless central IAM control is strictly needed. Not 100% though.
Makes sense to pick A here.
Yeah, A is right here. OS Login with compute.osLogin role keeps things centralized and lets you control access just for that instance through IAM. It's pretty much the recommended way for this use case, unless I missed something.
C/D? I think D is pretty close since blocking project-wide keys and sharing one instance key keeps the access scoped to just that VM. Lots of people get tripped up by OS Login vs manual SSH key setup. Anyone agree?
A , saw this setup in official guide and some Google sample tests too.
Probably A since official docs and practice exams both highlight OS Login plus compute.osLogin role for tight access control. I'd check the Google guide section on IAM roles if you're not sure here. Anyone see it another way?
A tbh
A. Seen similar in practice dumps-official doc also points toward OS Login and per-instance IAM for this scenario. Worth reviewing the permissions section in the Google study guide if unsure.
Be respectful. No spam.