Refer to the exhibit.
After a cyber attack, an engineer is analyzing an alert that was missed on the intrusion detection system. The attack exploited a vulnerability in a business critical, web-based application and violated its availability. Which two migration techniques should the engineer recommend? (Choose two.)
Gregoria
4 months agoTyra
4 months agoKristian
4 months agoChandra
3 months agoMarkus
3 months agoShawn
4 months agoZachary
4 months agoIsaiah
3 months agoAmmie
3 months agoStevie
4 months agoMichael
4 months ago