A company is running a publicly accessible serverless application that uses Amazon API Gateway and AWS Lambda. The application’s traffic recently spiked due to fraudulent requests from botnets.
Which steps should a solutions architect take to block requests from unauthorized users? (Choose two.)
jdr75
Highly Voted 1 year, 3 months agodebasishdtta
5 months, 3 weeks agopentium75
6 months, 1 week agodiddy99
Most Recent 1 week, 5 days agodragongoseki
2 weeks agoChymKuBoy
2 weeks, 1 day agohb0011
1 month, 1 week agoEMPERBACH
2 months, 2 weeks agoMrPCarrot
5 months, 1 week agodebasishdtta
5 months, 3 weeks agoawsgeek75
6 months, 1 week agosidharthwader
4 months agoale_brd_
6 months, 3 weeks agoMiniYang
7 months, 1 week agoRuffyit
7 months, 1 week agoawashenko
8 months, 3 weeks agoTariqKipkemei
10 months agoGuru4Cloud
10 months, 3 weeks agozjcorpuz
11 months, 2 weeks agoMutiverseAgent
11 months, 3 weeks ago