You plan to use a Google Cloud Armor policy to prevent common attacks such as cross-site scripting (XSS) and SQL injection (SQLi) from reaching your web application's backend. What are two requirements for using Google Cloud Armor security policies? (Choose two.)
i_am_robot
8 months, 2 weeks agoLaithTech
8 months, 2 weeks agonah99
5 months agoBettoxicity
1 year agoaygitci
1 year, 6 months agoXoxoo
1 year, 7 months ago[Removed]
1 year, 9 months agogcpengineer
1 year, 11 months agogcpengineer
1 year, 11 months agoAzureDP900
2 years, 5 months agosoltium
2 years, 6 months agoAwesomeGCP
2 years, 6 months agoJeanphi72
2 years, 8 months agopiyush_1982
2 years, 8 months agozellck
2 years, 6 months agoTNT87
2 years ago[Removed]
1 year, 9 months agonacying
2 years, 10 months agocloudprincipal
2 years, 10 months agoszl0144
2 years, 11 months agoExamQnA
2 years, 11 months ago