Refer to the exhibit.
After a cyber attack, an engineer is analyzing an alert that was missed on the intrusion detection system. The attack exploited a vulnerability in a business critical, web-based application and violated its availability. Which two migration techniques should the engineer recommend? (Choose two.)
Gregoria
10 months agoTyra
10 months agoKristian
10 months agoChandra
10 months agoMarkus
10 months agoShawn
11 months agoZachary
11 months agoIsaiah
10 months agoAmmie
10 months agoStevie
10 months agoMichael
11 months ago