When implementing Data Guard, BIG-IP ASM scans for suspicious patterns in? (Choose 2)
A. All client requests
B. All server responses
C. Specific client requests
D. Specific server responses
When implementing Data Guard, BIG-IP ASM scans for suspicious patterns in? (Choose 2)
A. All client requests
B. All server responses
C. Specific client requests
D. Specific server responses