After using WAF, if you find there are many user input data in the network traffic, you should apply:
A . Loose protection policy
B . Normal protection policy
C . Strict protection policy
D . Progression protection policy
Answer: C
After using WAF, if you find there are many user input data in the network traffic, you should apply:
A . Loose protection policy
B . Normal protection policy
C . Strict protection policy
D . Progression protection policy
Answer: C