Ultimate access to all questions.
Your company recently deployed a critical revenue-generating web application using managed instance groups, autoscaling, and a network load balancer. During a surge in traffic, autoscaling hit its maximum instance limit, causing transaction failures for users. You suspect a DDoS attack and need to quickly restore application access while minimizing costs.
Which two actions should you take? (Select two.)