Your company has just launched a new critical revenue-generating web application. You deployed the application for scalability using managed instance groups, autoscaling, and a network load balancer as frontend. One day, you notice severe bursty traffic that the caused autoscaling to reach the maximum number of instances, and users of your application cannot complete transactions. After an investigation, you think it as a DDOS attack. You want to quickly restore user access to your application and allow successful transactions while minimizing cost.
Which two steps should you take? (Choose two.)
Alex_74
Highly Voted 3 years, 7 months agowalkwolf3
3 years, 3 months agoWindy_Welly88
3 years, 4 months agoAzureDP900
2 years, 4 months agoHybrid_Cloud_boy
Highly Voted 4 years, 3 months agoGeorgS
2 years agomohitms1996
Most Recent 2 days, 16 hours agoRKS_2021
2 weeks agosaraali
1 month, 2 weeks agoAenarion
2 months ago12gears
2 months, 2 weeks agoppandher
3 months, 1 week agoian_gcpca
3 months agonkastanas
8 months, 2 weeks agonkastanas
9 months agohamish88
11 months agoAdjqwert
1 year, 1 month agogonlafer
1 year, 1 month agoPhuocT
1 year, 2 months agoChavoz
1 year, 3 months agoBenMS
1 year, 3 months agoxhilmi
1 year, 3 months ago