A company is running a publicly accessible serverless application that uses Amazon API Gateway and AWS Lambda. The application’s traffic recently spiked due to fraudulent requests from botnets.
Which steps should a solutions architect take to block requests from unauthorized users? (Choose two.)
jdr75
Highly Voted 1 year, 9 months agodebasishdtta
1 year agopentium75
1 year agoawashenko
Highly Voted 1 year, 3 months agoPaulGa
Most Recent 3 months, 1 week agodiddy99
7 months agodragongoseki
7 months agoChymKuBoy
7 months agohb0011
8 months agoEMPERBACH
9 months, 1 week agoMrPCarrot
11 months, 3 weeks agodebasishdtta
1 year agoawsgeek75
1 year agosidharthwader
10 months, 3 weeks agoale_brd_111
1 year, 1 month agoMiniYang
1 year, 1 month agoRuffyit
1 year, 1 month agoTariqKipkemei
1 year, 4 months agoGuru4Cloud
1 year, 5 months agozjcorpuz
1 year, 6 months ago