This is a dedicated watch page for a single video.
You intend to utilize a Google Cloud Armor policy to thwart common attacks like cross-site scripting (XSS) and SQL injection (SQLi) from reaching your web application's backend. What are two requirements for employing Google Cloud Armor security policies? (Choose two.)