A company is facing frequent Layer 7 attacks on its published cloud services. Which feature can be used to mitigate the company’s vulnerability?
A. deep packet inspection
B. access control lists
C. control plane protection
D. role-based access control