A company is running a publicly accessible serverless application that uses Amazon API Gateway and AWS Lambda. The application’s traffic recently spiked due to fraudulent requests from botnets.
Which steps should a solutions architect take to block requests from unauthorized users? (Choose two.)
jdr75
Highly Voted 2 years, 4 months agodebasishdtta
1 year, 7 months agopentium75
1 year, 7 months agoawashenko
Highly Voted 1 year, 10 months ago90c3163
2 weeks agoMrigraj12
Most Recent 6 months, 2 weeks agoPaulGa
10 months agodiddy99
1 year, 1 month agojerryl
4 months, 4 weeks agodragongoseki
1 year, 1 month agoChymKuBoy
1 year, 1 month agohb0011
1 year, 2 months agoEMPERBACH
1 year, 4 months agoMrPCarrot
1 year, 6 months agodebasishdtta
1 year, 7 months agoawsgeek75
1 year, 7 months agosidharthwader
1 year, 5 months agoale_brd_111
1 year, 8 months agoMiniYang
1 year, 8 months agoRuffyit
1 year, 8 months agoTariqKipkemei
1 year, 11 months agoGuru4Cloud
2 years ago