Home/Exams/Google Compute Engine
Real Exam ScenarioGoogle Compute Engine

An enterprise wants to minimize the security risk of 'Credential Theft' for their VM instances. They want to avoid using traditional long-lived SSH keys. What is the Google-recommended approach?