Recall & Review
beginner
What is the target in a firewall rule?
The target specifies which resources (like virtual machines) the firewall rule applies to. It acts like choosing which doors the rule controls.
Click to reveal answer
beginner
What does the source mean in a firewall rule?
The source defines where the network traffic comes from, such as specific IP addresses or ranges. Think of it as the visitor's address trying to enter.
Click to reveal answer
beginner
Why is the protocol important in a firewall rule?
The protocol tells the firewall which type of network traffic to allow or block, like TCP or UDP. It's like choosing which kind of mail (letters, packages) to accept.
Click to reveal answer
intermediate
How do source and target work together in a firewall rule?
The source defines who is trying to connect, and the target defines who can be connected to. Together, they control who can talk to whom.
Click to reveal answer
intermediate
What happens if you don't specify a protocol in a GCP firewall rule?
If no protocol is specified, the rule won't know which traffic to allow or block, so it won't work properly. Always specify the protocol to make the rule effective.
Click to reveal answer
In a GCP firewall rule, what does the target specify?
✗ Incorrect
The target defines which resources, like virtual machines, the firewall rule applies to.
What does the source field in a firewall rule represent?
✗ Incorrect
The source specifies where the network traffic comes from, such as IP addresses or ranges.
Which protocol is NOT commonly specified in firewall rules?
✗ Incorrect
HTTP is an application protocol, not a network protocol like TCP, UDP, or ICMP used in firewall rules.
If a firewall rule has no target specified, what happens?
✗ Incorrect
Without a target, the rule applies to all resources in the network.
Why must you specify a protocol in a firewall rule?
✗ Incorrect
Specifying the protocol tells the firewall which traffic type to allow or block.
Explain the roles of target, source, and protocol in a GCP firewall rule.
Think about who is talking, who is listening, and what language they use.
You got /3 concepts.
Describe what happens if you omit the protocol in a firewall rule.
Imagine trying to filter mail without knowing if it's letters or packages.
You got /3 concepts.