During a high-traffic sale, an online marketplace experiences recurring slow responses. The logs reveal an excessive number of invalid requests from multiple IP addresses. Which step addresses the performance issue caused by these repeated requests while letting normal buyers continue?
Set up rate limits on suspicious IPs to hold back overwhelming requests
Deploy host-level monitoring to identify suspicious connections
Upgrade server hardware to handle higher traffic loads
Add more authentication steps for all customer sessions
Throttling connection attempts for repeated invalid requests reduces the surge that drains server capacity, letting legitimate customers keep shopping. Extra server resources alone do not alter malicious behavior, new authentication steps disrupt standard operations, and host-level detection provides alerts but does not prevent overwhelming requests.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are rate limits, and how do they work in mitigating excessive requests?
Open an interactive chat with Bash
How can rate limiting differentiate between legitimate and malicious traffic?
Open an interactive chat with Bash
What is the difference between rate limiting and host-level monitoring?