Refer to the exhibit.
After a cyber attack, an engineer is analyzing an alert that was missed on the intrusion detection system. The attack exploited a vulnerability in a business critical, web-based application and violated its availability. Which two migration techniques should the engineer recommend? (Choose two.)
Chauncey
3 months agoVerlene
4 months agoCecilia
4 months agoTeddy
4 months agoRosendo
5 months agoLajuana
5 months agoTeddy
5 months agoArmando
6 months agoAshley
6 months agoJani
6 months agoBrett
5 months agoColeen
5 months agoLizette
5 months agoGabriele
6 months ago