Question 59 of 300
mediummultiple choiceObjective-mapped

ACE Practice Question: A GKE cluster hosts both a public-facing web…

This ACE practice question tests your understanding of a gke cluster hosts both a public-facing web…. Match the stated requirement to the specific cloud service, access model, or configuration option — many options are valid in isolation but not for this scenario. After answering, compare your reasoning against the explanation and wrong-answer breakdown below. Once you have made your selection, read the full explanation to reinforce the concept and understand why each distractor is designed to mislead on exam day.

A GKE cluster hosts both a public-facing web application and an internal data processing service. The data processing service should only accept traffic from the web application Pods, not from the internet. Which Kubernetes feature enforces this policy?

Question 1mediummultiple choice
Full question →

A GKE cluster hosts both a public-facing web application and an internal data processing service. The data processing service should only accept traffic from the web application Pods, not from the internet. Which Kubernetes feature enforces this policy?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

A VPC firewall rule blocking external traffic to the data service's Node IPs

VPC firewall rules operate at the VM/node level, not the Pod level — they can't distinguish between Pods on the same node or enforce service-to-service policies within the cluster.

B

Distractor review

IAP (Identity-Aware Proxy) configured on the data service

IAP enforces identity-based access for external users — it's not designed for Pod-to-Pod traffic policy within a GKE cluster.

C

Best answer

Kubernetes NetworkPolicy restricting ingress to the data service to only Pods with the web app label

NetworkPolicies provide Pod-level firewall rules based on Pod label selectors. A policy on the data service allowing only ingress from the web app's Pod labels enforces the required isolation.

D

Distractor review

Using a private ClusterIP Service for the data service — it's automatically private

ClusterIP Services are cluster-internal but accessible by any Pod in the cluster, not just the web application. NetworkPolicy is needed for Pod-to-Pod isolation.

Common exam trap

Common exam trap: ACLs stop at the first match

ACLs are processed top to bottom. The first matching entry wins, and an implicit deny usually exists at the end.

Technical deep dive

How to think about this question

ACL questions test precision: source, destination, protocol, port and direction. A generally correct ACL can still fail if it is applied on the wrong interface or in the wrong direction.

KKey Concepts to Remember

  • Standard ACLs match source addresses.
  • Extended ACLs can match source, destination, protocol and ports.
  • The first matching ACL entry is used.
  • There is usually an implicit deny at the end.

TExam Day Tips

  • Check inbound versus outbound direction.
  • Read the ACL from top to bottom.
  • Look for a broader permit or deny above the intended line.

Key takeaway

ACLs process entries top to bottom and stop at the first match. Entry order and interface direction matter as much as the permit or deny statement.

Related practice questions

Related ACE practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

Practice this exam

Start a free ACE practice session

Short sessions build daily habit. Longer sessions build exam-day stamina. Try a timed session to simulate real conditions.

FAQ

Questions learners often ask

What does this ACE question test?

Standard ACLs match source addresses.

What is the correct answer to this question?

The correct answer is: Kubernetes NetworkPolicy restricting ingress to the data service to only Pods with the web app label — Kubernetes NetworkPolicies define ingress and egress rules for Pod communication. A NetworkPolicy on the data processing service's Pods can restrict ingress to only traffic from Pods with specific labels (the web application Pods), denying all other sources including external traffic.

What should I do if I get this ACE question wrong?

Review ACL processing order, placement rules (standard near destination, extended near source), and inbound vs outbound direction. Study wildcard masks and implicit deny. Then practise related ACE ACL questions on filtering logic and placement.

About these practice questions

Courseiva creates original exam-style practice questions with explanations and wrong-answer analysis. It does not publish real exam questions, exam dumps, or protected exam content. Learn why practice questions differ from exam dumps →

How Courseiva writes practice questions · Editorial policy

Discussion

Loading comments…

Sign in to join the discussion.

This ACE practice question is part of Courseiva's free Google Cloud certification practice question bank. Courseiva provides original exam-style practice questions with explanations, topic-based practice, mock exams, readiness tracking, and study analytics to help learners prepare for the ACE exam.