A developer has experienced security issues with a previously developed application. The API offered by that application is open and without any constraints. During a recent attack, the application was overloaded with API requests. To address this issue, an API constraint is implemented to protect the application from future attacks or any sudden throttling. Which API constraint must the application developer implement in this situation?
Martha
6 months agoMargurite
6 months agoDerick
6 months agoShalon
7 months agoMargurite
7 months agoErinn
8 months agoTequila
8 months agoKanisha
8 months agoErinn
8 months agoRex
8 months agoErinn
8 months agoErick
8 months agoAmalia
8 months ago