A company is running a publicly accessible serverless application that uses Amazon API Gateway and AWS Lambda. The application’s traffic recently spiked due to fraudulent requests from botnets.
Which steps should a solutions architect take to block requests from unauthorized users? (Choose two.)
jdr75
Highly Voted 1 year, 11 months agodebasishdtta
1 year, 1 month agopentium75
1 year, 2 months agoawashenko
Highly Voted 1 year, 4 months agoMrigraj12
Most Recent 1 month agoPaulGa
4 months, 3 weeks agodiddy99
8 months, 2 weeks agodragongoseki
8 months, 3 weeks agoChymKuBoy
8 months, 3 weeks agohb0011
9 months, 2 weeks agoEMPERBACH
10 months, 3 weeks agoMrPCarrot
1 year, 1 month agodebasishdtta
1 year, 1 month agoawsgeek75
1 year, 2 months agosidharthwader
1 year agoale_brd_111
1 year, 2 months agoMiniYang
1 year, 3 months agoRuffyit
1 year, 3 months agoTariqKipkemei
1 year, 6 months agoGuru4Cloud
1 year, 6 months ago