Valid Associate-Cloud-Engineer Dumps shared by ExamDiscuss.com for Helping Passing Associate-Cloud-Engineer Exam! ExamDiscuss.com now offer the newest Associate-Cloud-Engineer exam dumps, the ExamDiscuss.com Associate-Cloud-Engineer exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com Associate-Cloud-Engineer dumps with Test Engine here:
You are hosting an application on bare-metal servers in your own data center. The application needs access to Cloud Storage. However, security policies prevent the servers hosting the application from having public IP addresses or access to the internet. You want to follow Google-recommended practices to provide the application with access to Cloud Storage. What should you do?
Correct Answer: D
Our requirement is to follow Google recommended practices to achieve the end result. Configuring Private Google Access for On-Premises Hosts is best achieved by VPN/Interconnect + Advertise Routes + Use restricted Google IP Range. * Using Cloud VPN or Interconnect, create a tunnel to a VPC in GCP * Using Cloud Router to create a custom route advertisement for 199.36.153.4/30. Announce that network to your on-premises network through the VPN tunnel. * In your on-premises network, configure your DNS server to resolve *.googleapis.com as a CNAME to restricted.googleapis.com is the right answer right, and it is what Google recommends. Ref: https://cloud.google.com/vpc/docs/configure-private-google-access-hybrid * You must configure routes so that Google API traffic is forwarded through your Cloud VPN or Cloud Interconnect connection, firewall rules on your on-premises firewall to allow the outgoing traffic, and DNS so that traffic to Google APIs resolves to the IP range youve added to your routes. * You can use Cloud Router Custom Route Advertisement to announce the Restricted Google APIs IP addresses through Cloud Router to your on-premises network. The Restricted Google APIs IP range is 199.36.153.4/30. While this is technically a public IP range, Google does not announce it publicly. This IP range is only accessible to hosts that can reach your Google Cloud projects through internal IP ranges, such as through a Cloud VPN or Cloud Interconnect connection. Without having a public IP address or access to the internet, the only way you could connect to cloud storage is if you have an internal route to it. * So Negotiate with the security team to be able to give public IP addresses to the servers is not right. Following Google recommended practices is synonymous with using Googles services (Not quite, but it is at least for the exam !!). * So In this VPC, create a Compute Engine instance and install the Squid proxy server on this instance is not right. * Migrating the VM to Compute Engine is a bit drastic when Google says it is perfectly fine to have Hybrid Connectivity architectures https://cloud.google.com/hybrid-connectivity. So, * Use Migrate for Compute Engine (formerly known as Velostrata) to migrate these servers to Compute Engine is not right.