A company is running a publicly accessible serverless application that uses Amazon API Gateway and AWS Lambda. The application’s traffic recently spiked due to fraudulent requests from botnets.
Which steps should a solutions architect take to block requests from unauthorized users? (Choose two.)
jdr75
Highly Voted 1 year, 8 months agodebasishdtta
11 months, 2 weeks agopentium75
12 months agoawashenko
Highly Voted 1 year, 2 months agoPaulGa
Most Recent 2 months, 1 week agodiddy99
6 months agodragongoseki
6 months agoChymKuBoy
6 months agohb0011
7 months agoEMPERBACH
8 months, 1 week agoMrPCarrot
10 months, 3 weeks agodebasishdtta
11 months, 2 weeks agoawsgeek75
11 months, 3 weeks agosidharthwader
9 months, 3 weeks agoale_brd_111
1 year agoMiniYang
1 year agoRuffyit
1 year agoTariqKipkemei
1 year, 3 months agoGuru4Cloud
1 year, 4 months agozjcorpuz
1 year, 5 months ago