A developer has experienced security issues with a previously developed application. The API offered by that application is open and without any constraints. During a recent attack, the application was overloaded with API requests. To address this issue, an API constraint is implemented to protect the application from future attacks or any sudden throttling. Which API constraint must the application developer implement in this situation?
Lucy
4 months agoTabetha
4 months agoAmalia
4 months agoArt
3 months agoBrande
3 months agoLonny
4 months agoJoseph
4 months agoPage
4 months agoLaquita
5 months agoVal
5 months agoVeronika
3 months agoAlonso
3 months agoMicah
3 months agoTemeka
4 months agoMariann
4 months agoTasia
4 months agoGussie
5 months agoNicholle
4 months agoRutha
4 months agoAnnett
5 months agoHeike
4 months agoPete
4 months agoTheodora
4 months agoJudy
4 months ago