You plan to use a Google Cloud Armor policy to prevent common attacks such as cross-site scripting (XSS) and SQL injection (SQLi) from reaching your web application's backend. What are two requirements for using Google Cloud Armor security policies? (Choose two.)
i_am_robot
11 months, 3 weeks agoLaithTech
11 months, 4 weeks agonah99
8 months, 2 weeks agoBettoxicity
1 year, 4 months agoaygitci
1 year, 9 months agoXoxoo
1 year, 10 months ago[Removed]
2 years agogcpengineer
2 years, 2 months agogcpengineer
2 years, 2 months agoAzureDP900
2 years, 9 months agosoltium
2 years, 9 months agoAwesomeGCP
2 years, 9 months agoJeanphi72
2 years, 11 months agopiyush_1982
3 years agozellck
2 years, 10 months agoTNT87
2 years, 3 months ago[Removed]
2 years agonacying
3 years, 1 month agocloudprincipal
3 years, 2 months agoszl0144
3 years, 2 months agoExamQnA
3 years, 2 months ago