Cloud Armor works by inspecting incoming requests at the load balancer. It uses rules to detect bad traffic such as IP blocks, rate limits, or web attack patterns. When a request arrives, Cloud Armor checks if it matches any block rule. If yes, the request is dropped and does not reach the backend. If no rules match, the request is allowed and forwarded. This protects backend services from overload and attacks. The execution table shows different requests and how Cloud Armor decides to allow or block them based on rules. Variables like source IP, matched rule, and action change step by step. Key moments clarify why some requests are blocked even without IP blocks and what happens after blocking. The visual quiz tests understanding of these steps and rule effects.