Additionally, it is also common to use load balancers to continually monitor and shift loads between resources to prevent overloading any one resource. … against illegitimate requests which could have characteristics like disguising as good traffic or coming from bad IPs, unexpected geographies, etc. At times it might also be helpful in …

