New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Google Professional Cloud Developer Exam - Topic 6 Question 44 Discussion

Actual exam question for Google's Professional Cloud Developer exam
Question #: 44
Topic #: 6
[All Professional Cloud Developer Questions]

You have deployed an HTTP(s) Load Balancer with the gcloud commands shown below.

Health checks to port 80 on the Compute Engine virtual machine instance are failing and no traffic is sent to your instances. You want to resolve the problem.

Which commands should you run?

Show Suggested Answer Hide Answer

Contribute your Thoughts:

0/2000 characters
Meghan
4 months ago
I thought EGRESS rules were for outgoing traffic, not incoming?
upvoted 0 times
...
Bernardine
4 months ago
Adding tags is good, but it won't fix the health check issue.
upvoted 0 times
...
Alayna
4 months ago
Wait, why are we using source-ranges? Isn't that a bit restrictive?
upvoted 0 times
...
Junita
4 months ago
Definitely go with option C! That's the right move.
upvoted 0 times
...
Tawanna
5 months ago
You need to allow traffic on port 80 for health checks.
upvoted 0 times
...
Alaine
5 months ago
I practiced a question similar to this, and I think option C sounds right for allowing traffic from the load balancer.
upvoted 0 times
...
Desmond
5 months ago
I think adding tags to the instance might help, but I feel like it’s more about the firewall settings.
upvoted 0 times
...
Ruthann
5 months ago
I remember something about health checks needing the right firewall rules, but I'm not sure which command to use.
upvoted 0 times
...
Nickie
5 months ago
I'm confused about the difference between ingress and egress rules here; I hope I remember it correctly during the exam.
upvoted 0 times
...
Elliot
5 months ago
This seems like a straightforward question. I'll start by considering the options provided and thinking about which ones would be the most effective for monitoring HTTP session count.
upvoted 0 times
...
Jerry
5 months ago
Hmm, I'm a bit unsure about this one. I know Active Directory is used for managing users and computers, but I'm not sure if it's the only option that provides centralized management. I'll have to think this through carefully.
upvoted 0 times
...
Arminda
5 months ago
Okay, I think I got this. To create a digital signature, you need to encrypt the authentication sequence with your private key. That way, when the recipient decrypts it with your public key, they can verify that the message came from you. Option D is the way to go.
upvoted 0 times
...

Save Cancel