security-engineer video for you intend to utilize a Google Cloud Armor policy to thwart common attacks like cross-site scripting (XSS) and SQL injection (SQLi)
You intend to utilize a Google Cloud Armor policy to thwart common attacks like cross-site scripting (XSS) and SQL injection (SQLi) from reaching your web application's backend. What are two requirements for employing Google Cloud Armor security policies? (Choose two.)