
Ultimate access to all questions.
Your company provides a popular gaming service with instances using private IP addresses, and external access is routed through a global load balancer. You suspect a potential malicious actor but are unsure of the correct client IP address. How can you identify this actor while minimizing impact on legitimate users?
A
Create a Cloud Armor Policy rule that denies traffic and review necessary logs.
B
Create a Cloud Armor Policy rule that denies traffic, enable preview mode, and review necessary logs.
C
Create a VPC Firewall rule that denies traffic, enable logging and set enforcement to disabled, and review necessary logs.
D
Create a VPC Firewall rule that denies traffic, enable logging and set enforcement to enabled, and review necessary logs.