A company is running a publicly accessible serverless application that uses Amazon API Gateway and AWS Lambda. The application’s traffic recently spiked due to fraudulent requests from botnets.
Which steps should a solutions architect take to block requests from unauthorized users? (Choose two.)
jdr75
Highly Voted 2 years agodebasishdtta
1 year, 3 months agopentium75
1 year, 4 months agoawashenko
Highly Voted 1 year, 6 months agoMrigraj12
Most Recent 2 months, 4 weeks agoPaulGa
6 months, 2 weeks agodiddy99
10 months, 2 weeks agojerryl
1 month, 1 week agodragongoseki
10 months, 2 weeks agoChymKuBoy
10 months, 2 weeks agohb0011
11 months, 2 weeks agoEMPERBACH
1 year agoMrPCarrot
1 year, 3 months agodebasishdtta
1 year, 3 months agoawsgeek75
1 year, 4 months agosidharthwader
1 year, 2 months agoale_brd_111
1 year, 4 months agoMiniYang
1 year, 5 months agoRuffyit
1 year, 5 months agoTariqKipkemei
1 year, 7 months agoGuru4Cloud
1 year, 8 months ago