Refer to the exhibit.
After a cyber attack, an engineer is analyzing an alert that was missed on the intrusion detection system. The attack exploited a vulnerability in a business critical, web-based application and violated its availability. Which two migration techniques should the engineer recommend? (Choose two.)
Shenika
4 months agoSharen
5 months agoKarl
5 months agoMoon
5 months agoShenika
5 months agoMarg
6 months agoTy
6 months agoCristy
5 months agoLayla
5 months agoFrancesco
5 months agoDaniel
5 months agoValentine
5 months agoTequila
6 months agoValentine
6 months ago