Question 1:
Refer to the exhibit. A threat actor behind a single computer exploited a cloud-based application by sending multiple concurrent API requests. These requests made the application unresponsive. Which solution protects the application from being overloaded and ensures more equitable application access across the end- user community?
Answer options:
A. Limit the number of API calls that a single client is allowed to make B. Add restrictions on the edge router on how often a single client can access the API C. Reduce the amount of data that can be fetched from the total pool of active clients that call the API D. Increase the application cache of the total pool of active clients that call the API