Your company has just launched a new critical revenue-generating web application. You deployed the application for scalability using managed instance groups, autoscaling, and a network load balancer as frontend. One day, you notice severe bursty traffic that the caused autoscaling to reach the maximum number of instances, and users of your application cannot complete transactions. After an investigation, you think it as a DDOS attack. You want to quickly restore user access to your application and allow successful transactions while minimizing cost.
Which two steps should you take? (Choose two.)
Alex_74
Highly Voted 3 years, 10 months agowalkwolf3
3 years, 6 months agoWindy_Welly88
3 years, 7 months agoAzureDP900
2 years, 7 months agoHybrid_Cloud_boy
Highly Voted 4 years, 7 months agoGeorgS
2 years, 3 months agopico
Most Recent 2 months, 2 weeks agomohitms1996
3 months, 1 week agoRKS_2021
3 months, 2 weeks agosaraali
4 months, 3 weeks agoAenarion
5 months, 1 week ago12gears
5 months, 2 weeks agoppandher
6 months, 2 weeks agoian_gcpca
6 months, 1 week agonkastanas
11 months, 3 weeks agonkastanas
1 year agohamish88
1 year, 2 months agoAdjqwert
1 year, 4 months agogonlafer
1 year, 5 months agoPhuocT
1 year, 6 months agoChavoz
1 year, 6 months agoBenMS
1 year, 6 months ago