Q353.A company is creating a REST API to share information with SiX of its partners based in the United States. The company has created an Amazon API Gateway Regional endpoint. Each of the siX partners will access the API once per day to post daily sales figures.After initial deployment the company observes 1000 requests per second originating from 500 different lP addresses around the world.The company believes this traffic iS originating from a botnet and wants to
Secure its API while minimizing cost.Which approach should the company take to secure its API?
A.Create an Amazon CloudFront distribution with the API as the origin. Create an AWS WAF web ACL with a rule to block clients that submit more than five requests per day. Associate the web ACL with the CloudFront distribution. Configure CloudFront with an origin access identity (OA) and associate it with the distribution. Configure API Gateway to ensure only the OAI can execute the POST method. B.Create an Amazon CloudFront distribution with the API as the origin. Create an AWS WAF web ACL with a rule to block clients that submit more than five requests per day. Associate the web ACL with the CloudFront distribution. Add a custom header to the CloudFront distribution populated with an API key Configure the API to require an API key on the POST method. C.Create an AWS WAF web ACL with a rule to allow access to the IP addresses used by the six partners. Associate the web ACL with the API. Create a resource policy with a request limit and associate it with the API. Configure the API to require an API key on the POST method . D.Create an AWS WAF web ACL with a rule to allow access to the lP addresses used by the six partners. Associate the web ACL with the API. Create a usage plan with a request limit and associate it with the API Create an API key and add it to the i usage plan.正确答案D