Refer to the exhibit.
After a cyber attack, an engineer is analyzing an alert that was missed on the intrusion detection system. The attack exploited a vulnerability in a business critical, web-based application and violated its availability. Which two migration techniques should the engineer recommend? (Choose two.)
Gregoria
8 months agoTyra
8 months agoKristian
9 months agoChandra
8 months agoMarkus
8 months agoShawn
9 months agoZachary
9 months agoIsaiah
8 months agoAmmie
8 months agoStevie
9 months agoMichael
9 months ago