Your company has just launched a new critical revenue-generating web application. You deployed the application for scalability using managed instance groups, autoscaling, and a network load balancer as frontend. One day, you notice severe bursty traffic that the caused autoscaling to reach the maximum number of instances, and users of your application cannot complete transactions. After an investigation, you think it as a DDOS attack. You want to quickly restore user access to your application and allow successful transactions while minimizing cost.
Which two steps should you take? (Choose two.)
Alex_74
Highly Voted 3 years, 8 months agowalkwolf3
3 years, 4 months agoWindy_Welly88
3 years, 5 months agoAzureDP900
2 years, 5 months agoHybrid_Cloud_boy
Highly Voted 4 years, 4 months agoGeorgS
2 years, 1 month agopico
Most Recent 1 week agomohitms1996
4 weeks agoRKS_2021
1 month, 1 week agosaraali
2 months, 2 weeks agoAenarion
3 months ago12gears
3 months, 1 week agoppandher
4 months agoian_gcpca
3 months, 4 weeks agonkastanas
9 months, 2 weeks agonkastanas
10 months agohamish88
12 months agoAdjqwert
1 year, 2 months agogonlafer
1 year, 2 months agoPhuocT
1 year, 3 months agoChavoz
1 year, 4 months agoBenMS
1 year, 4 months ago