Challenge - 5 Problems
SSH Access Mastery
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate2:00remaining
Understanding SSH Key Metadata in GCP
In Google Cloud Platform, when you add an SSH public key to a VM instance's metadata, what does this metadata entry control?
Attempts:
2 left
💡 Hint
Think about what SSH keys do in general for secure access.
✗ Incorrect
Adding an SSH public key to the VM's metadata authorizes the corresponding private key holder to connect via SSH. It does not install software or restrict access to console users only.
❓ Configuration
intermediate2:00remaining
Configuring SSH Access via Project-wide Metadata
You want to allow a new user to SSH into all VM instances in your GCP project without adding keys to each VM individually. Where should you add the user's SSH public key?
Attempts:
2 left
💡 Hint
Think about how project-wide metadata affects all instances.
✗ Incorrect
Project-wide metadata applies to all VM instances in the project, so adding SSH keys there grants access to all VMs without per-instance configuration.
❓ security
advanced2:30remaining
Preventing Unauthorized SSH Access via Metadata
Which of the following practices best prevents unauthorized SSH access to your GCP VM instances when using SSH keys in metadata?
Attempts:
2 left
💡 Hint
Think about key management and minimizing access.
✗ Incorrect
Rotating keys and removing unused keys reduces risk of compromised keys being used. Disabling SSH or allowing all IPs is not practical or secure.
❓ service_behavior
advanced2:00remaining
Effect of Removing SSH Keys from Metadata
If you remove a user's SSH public key from the project-wide metadata, what happens when that user tries to SSH into a VM instance that does not have their key in its local metadata?
Attempts:
2 left
💡 Hint
Consider how SSH key authorization works with metadata.
✗ Incorrect
Removing the key from project-wide metadata revokes access unless the key exists in local metadata. Keys are not cached permanently on VMs.
❓ Architecture
expert3:00remaining
Designing Secure SSH Access with Metadata and OS Login
You want to enforce centralized SSH access control using Google Cloud OS Login instead of managing SSH keys in metadata. Which statement correctly describes the behavior when OS Login is enabled on VM instances?
Attempts:
2 left
💡 Hint
Think about how OS Login integrates with IAM and metadata.
✗ Incorrect
When OS Login is enabled, SSH key management moves to IAM roles and user accounts, ignoring SSH keys in metadata for access control.