Which steps should a solutions architect take to block requests from unauthorized users?
A company is running a publicly accessible serverless application that uses Amazon API Gateway and AWS Lambda.The application’s traffic recently spiked due to fraudulent requests from botnets.Which steps should a solutions architect take to block requests from unauthorized users? (Choose two.)Read More →