Your company recently launched a mission-critical web application that generates revenue. The application is deployed using managed instance groups with autoscaling enabled, and it’s fronted by a network load balancer for scalability. One day, you observe a sudden surge in traffic that causes the autoscaler to hit its maximum limit, preventing legitimate users from completing transactions. After analysis, you suspect a Distributed Denial-of-Service (DDoS) attack is underway. You need to act quickly to restore user access, enable successful transactions, and control operational costs. Which two actions should you take? (Choose two.)