A company is running a publicly accessible serverless application that uses Amazon API Gateway and AWS Lambda. The application’s traffic recently spiked due to fraudulent requests from botnets.
Which steps should a solutions architect take to block requests from unauthorized users? (Choose two.)
jdr75
Highly Voted 1 year, 7 months agodebasishdtta
10 months, 1 week agopentium75
11 months agoawashenko
Highly Voted 1 year, 1 month agoPaulGa
Most Recent 1 month agodiddy99
5 months agodragongoseki
5 months agoChymKuBoy
5 months agohb0011
6 months agoEMPERBACH
7 months agoMrPCarrot
9 months, 3 weeks agodebasishdtta
10 months, 1 week agoawsgeek75
10 months, 3 weeks agosidharthwader
8 months, 3 weeks agoale_brd_111
11 months, 2 weeks agoMiniYang
11 months, 4 weeks agoRuffyit
11 months, 4 weeks agoTariqKipkemei
1 year, 2 months agoGuru4Cloud
1 year, 3 months agozjcorpuz
1 year, 3 months ago