
Ultimate access to all questions.
Your company recently deployed a critical revenue-generating web application using managed instance groups, autoscaling, and a network load balancer. During a surge in traffic, autoscaling hit its maximum instance limit, causing transaction failures for users. You suspect a DDoS attack and need to quickly restore application access while minimizing costs.
Which two actions should you take? (Select two.)
A
Use Cloud Armor to blacklist the attacker's IP addresses.
B
Increase the maximum autoscaling backend to accommodate the severe bursty traffic.
C
Create a global HTTP(s) load balancer and move your application backend to this load balancer.
D
Shut down the entire application in GCP for a few hours. The attack will stop when the application is offline.
E
SSH into the backend compute engine instances, and view the auth logs and syslogs to further understand the nature of the attack.