The correct answer is **C**.
To allow an external consultant to access a Linux-based Compute Engine instance, you should:
- Instruct the external consultant to generate an **SSH key pair**. This will result in a public key and a private key.
- Request the **public key** from the consultant. The public key can be shared without compromising security.
- Add the public key to the instance yourself. This will allow the consultant to authenticate with the Compute Engine instance.
- Have the consultant access the instance through SSH with their **private key**. The private key should be kept secret and not shared.
The other options (A, B, and D) are not correct because they either require the consultant to have a Google account, expose the instance to the public internet, or involve sharing the private key, which is a security risk.