A company is running a publicly accessible serverless application that uses Amazon API Gateway and AWS Lambda. The application's traffic recently spiked due to fraudulent requests from botnets.
Which steps should a solutions architect take to block requests from unauthorized users? (Choose two.)
patriktre
Highly Voted 3Â years, 6Â months agopatriktre
3Â years, 6Â months agoAlfio
3Â years, 6Â months agoja_girl_eng
3Â years, 5Â months agoAlcpt
3Â years, 4Â months agoamshivraj
3Â years, 6Â months agoslcheng
Highly Voted 2Â years, 8Â months agoBECAUSE
Most Recent 1Â year, 10Â months agosam_aws2021
2Â years, 9Â months agonaveenagurjara
2Â years, 9Â months agobighedgedog
2Â years, 10Â months agoVijiTu
2Â years, 10Â months agoexamhamster
2Â years, 11Â months agocutecolt
2Â years, 11Â months agoashdon
3Â years, 2Â months agoenvest
3Â years, 3Â months agoThawdr
3Â years, 3Â months agoFF11
3Â years, 3Â months ago69657
3Â years, 4Â months ago69657
3Â years, 4Â months agojinyjiny40
3Â years, 4Â months agoGomer
3Â years, 4Â months ago