A developer has experienced security issues with a previously developed application. The API offered by that application is open and without any constraints. During a recent attack, the application was overloaded with API requests. To address this issue, an API constraint is implemented to protect the application from future attacks or any sudden throttling. Which API constraint must the application developer implement in this situation?
Billy
6 months agoBrandon
6 months agoDean
6 months agoBilly
6 months agoStevie
7 months agoArgelia
7 months agoArminda
7 months agoDean
7 months agoLeslie
8 months agoStephaine
8 months agoNu
8 months agoMaybelle
8 months agoLindsey
8 months agoAllene
8 months agoMisty
8 months ago