You are a security architect at your organization and have noticed an increase in cyberattacks on your
applications, including Cross-Site Scripting (XSS) and SQL Injection. To mitigate these threats, you decide to
use OCI Web Application Firewall (WAF).
Which type of OCI WAF rule should you configure to protect against these attacks?
"Your company is in the process of migrating its sensitive data to Oracle Cloud Infrastructure (OCI) and is
prioritizing the strongest possible security measures. Encryption is a key part of this strategy, but you are
particularly concerned about the physical security of the hardware where your encryption keys will be stored.
Which characteristic of OCI Key Management Service (KMS) helps ensure the physical security of your
encryption keys?