Refer to the exhibit.
After a cyber attack, an engineer is analyzing an alert that was missed on the intrusion detection system. The attack exploited a vulnerability in a business critical, web-based application and violated its availability. Which two migration techniques should the engineer recommend? (Choose two.)
Marg
19 days agoTy
20 days agoCristy
3 days agoLayla
4 days agoFrancesco
5 days agoDaniel
6 days agoValentine
7 days agoTequila
21 days agoValentine
22 days ago