Your company has just launched a new critical revenue-generating web application. You deployed the application for scalability using managed instance groups, autoscaling, and a network load balancer as frontend. One day, you notice severe bursty traffic that the caused autoscaling to reach the maximum number of instances, and users of your application cannot complete transactions. After an investigation, you think it as a DDOS attack. You want to quickly restore user access to your application and allow successful transactions while minimizing cost.
Which two steps should you take? (Choose two.)
Alex_74
Highly Voted 3 years, 5 months agowalkwolf3
3 years, 1 month agoWindy_Welly88
3 years, 2 months agoAzureDP900
2 years, 2 months agoHybrid_Cloud_boy
Highly Voted 4 years, 2 months agoGeorgS
1 year, 10 months agoAenarion
Most Recent 1 week, 1 day ago12gears
2 weeks, 2 days agoppandher
1 month, 1 week agoian_gcpca
1 month agonkastanas
6 months, 3 weeks agonkastanas
7 months agohamish88
9 months, 1 week agoAdjqwert
11 months, 3 weeks agogonlafer
12 months agoPhuocT
1 year agoChavoz
1 year, 1 month agoBenMS
1 year, 1 month agoxhilmi
1 year, 1 month agoCloudSISG2023
1 year, 4 months agosidharthwader
1 year, 4 months agoDelonBH
1 year, 2 months agodidek1986
1 year, 5 months ago