New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Google Professional Cloud Network Engineer Exam - Topic 2 Question 45 Discussion

Actual exam question for Google's Professional Cloud Network Engineer exam
Question #: 45
Topic #: 2
[All Professional Cloud Network Engineer Questions]

All the instances in your project are configured with the custom metadata enable-oslogin value set to FALSE and to block project-wide SSH keys. None of the instances are set with any SSH key, and no project-wide SSH keys have been configured. Firewall rules are set up to allow SSH sessions from any IP address range. You want to SSH into one instance.

What should you do?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Tamar
4 months ago
Why would you block project-wide SSH keys? That’s odd.
upvoted 0 times
...
Ardella
4 months ago
Option C seems like a hassle, just use gcloud!
upvoted 0 times
...
Yuki
4 months ago
Wait, can you really SSH without any keys? Sounds sketchy.
upvoted 0 times
...
Shanice
4 months ago
I think option A is the easiest way to SSH in!
upvoted 0 times
...
Lawana
5 months ago
You need to set enable-oslogin to TRUE first.
upvoted 0 times
...
Beckie
5 months ago
I remember that SSH keys need to be added somewhere, but I can't remember if it should be the instance or the project. I hope I chose the right answer!
upvoted 0 times
...
Gilma
5 months ago
I feel like using gcloud compute ssh might be the easiest option, but I’m not completely confident if it will work with the current settings.
upvoted 0 times
...
Daniel
5 months ago
I think we practiced a similar question where we had to generate SSH keys, but I can't recall if we needed to add them to the instance or the project.
upvoted 0 times
...
Katina
5 months ago
I remember something about enabling OS login, but I'm not sure if that's the right step here since it's currently set to FALSE.
upvoted 0 times
...
Mickie
5 months ago
Okay, let me think this through. The relational model is based on set theory, so option B seems correct. I'll double-check the other options to be sure.
upvoted 0 times
...
Pearly
5 months ago
This looks like a straightforward question about addressing a high-risk CVE. I'll carefully review the options and choose the one that is not a supported method.
upvoted 0 times
...

Save Cancel