0
0
GCPcloud~5 mins

Firewall rule components (target, source, protocol) in GCP - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is the target in a firewall rule?
The target specifies which resources (like virtual machines) the firewall rule applies to. It acts like choosing which doors the rule controls.
Click to reveal answer
beginner
What does the source mean in a firewall rule?
The source defines where the network traffic comes from, such as specific IP addresses or ranges. Think of it as the visitor's address trying to enter.
Click to reveal answer
beginner
Why is the protocol important in a firewall rule?
The protocol tells the firewall which type of network traffic to allow or block, like TCP or UDP. It's like choosing which kind of mail (letters, packages) to accept.
Click to reveal answer
intermediate
How do source and target work together in a firewall rule?
The source defines who is trying to connect, and the target defines who can be connected to. Together, they control who can talk to whom.
Click to reveal answer
intermediate
What happens if you don't specify a protocol in a GCP firewall rule?
If no protocol is specified, the rule won't know which traffic to allow or block, so it won't work properly. Always specify the protocol to make the rule effective.
Click to reveal answer
In a GCP firewall rule, what does the target specify?
AThe resources the rule applies to
BThe firewall's priority
CThe network protocol used
DThe source IP addresses allowed
What does the source field in a firewall rule represent?
AThe destination IP addresses
BThe protocol type
CThe firewall rule name
DWhere the traffic originates from
Which protocol is NOT commonly specified in firewall rules?
ATCP
BUDP
CHTTP
DICMP
If a firewall rule has no target specified, what happens?
AIt applies to all resources
BIt applies to no resources
CIt blocks all traffic
DIt only allows traffic from the source
Why must you specify a protocol in a firewall rule?
ATo set the firewall's priority
BTo identify the traffic type to allow or block
CTo define the source IP
DTo name the firewall rule
Explain the roles of target, source, and protocol in a GCP firewall rule.
Think about who is talking, who is listening, and what language they use.
You got /3 concepts.
    Describe what happens if you omit the protocol in a firewall rule.
    Imagine trying to filter mail without knowing if it's letters or packages.
    You got /3 concepts.