You need to host an application on a Compute Engine instance in a project shared with other teams.
You want to prevent the other teams from accidentally causing downtime on that application.
Which feature should you use?
Click on the arrows to vote for the correct answer
A. B. C. D.D.
To host an application on a Compute Engine instance in a project shared with other teams and prevent accidental downtime, one of the following features can be used:
A. Use a Shielded VM: A shielded VM is a virtual machine that uses a set of security controls to protect the integrity of the virtual machine's boot and runtime components. Shielded VMs are designed to protect against rootkits, bootkits, and kernel exploits. By using Shielded VMs, the VMs are more secure, and it becomes more difficult for an attacker to modify the VM's boot process or kernel code, thereby protecting against accidental downtime.
B. Use a Preemptible VM: Preemptible VMs are a cost-effective option for running short-lived and batch jobs that are less critical in nature. Preemptible VMs can be terminated at any time by Google, and the maximum runtime of a preemptible instance is 24 hours. Hence, by using a preemptible VM for hosting the application, the chances of accidental downtime caused by other teams are minimized as the instance can be terminated at any time.
C. Use a sole-tenant node: A sole-tenant node is a physical Compute Engine server that is dedicated to a single organization, providing greater control over the underlying hardware. By using a sole-tenant node, the application can be hosted on a dedicated server, which reduces the chances of accidental downtime caused by other teams.
D. Enable deletion protection on the instance: By enabling deletion protection on the instance, accidental deletion of the instance can be prevented. However, this does not protect against accidental downtime caused by other teams.
Therefore, the most appropriate feature to use in this case would be A. Use a Shielded VM, as it provides enhanced security controls to protect against rootkits, bootkits, and kernel exploits. This reduces the chances of accidental downtime caused by other teams.