During a major sale event, your online storefront begins receiving an unusually large volume of requests from many unknown sources, causing customers to experience sluggish page loads. Which single approach helps sustain site responsiveness while the suspicious traffic is examined?
Rotate platform credentials based on a frequent schedule
Deploy filtering at the perimeter that inspects high-volume traffic and discards questionable requests
Implement encryption for data residing in cloud storage
Activate a continuous scan of application code for lingering vulnerabilities
Filtering and rate-limiting at the network edge discard or throttle requests that match DDoS patterns, allowing legitimate shoppers to complete transactions with minimal delay. Encryption of storage or routine credential rotation bolsters confidentiality and authentication but leaves traffic volume unchanged. Likewise, vulnerability scanning improves code quality yet offers no real-time relief from volumetric floods.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is DDoS and how does it affect websites?
Open an interactive chat with Bash
What is perimeter filtering and how does it mitigate high-traffic attacks?
Open an interactive chat with Bash
What is rate-limiting and how is it used during a traffic spike?