Refer to the exhibit.
After a cyber attack, an engineer is analyzing an alert that was missed on the intrusion detection system. The attack exploited a vulnerability in a business critical, web-based application and violated its availability. Which two migration techniques should the engineer recommend? (Choose two.)
Gregoria
1 months agoTyra
2 months agoKristian
2 months agoChandra
1 months agoMarkus
1 months agoShawn
2 months agoZachary
2 months agoIsaiah
1 months agoAmmie
1 months agoStevie
2 months agoMichael
2 months ago