Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 300-735 Topic 7 Question 50 Discussion

Actual exam question for Cisco's 300-735 exam
Question #: 50
Topic #: 7
[All 300-735 Questions]

Which two methods are API security best practices? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: A, C

Contribute your Thoughts:

Goldie
6 months ago
I'm with you guys on the encryption and tokens. Those are like API Security 101. But the operating system thing, that's a new one to me. I wonder what the rationale is there. Maybe they're trying to trick us?
upvoted 0 times
Earnestine
5 months ago
A) Use tokens after the identity of a client has been established.
upvoted 0 times
...
Helaine
5 months ago
Using the same OS can reduce vulnerabilities across the infrastructure.
upvoted 0 times
...
Santos
5 months ago
E) Use cloud hosting services to manage security configuration.
upvoted 0 times
...
Elena
5 months ago
Operating system consistency can help with security patches and updates.
upvoted 0 times
...
Ressie
5 months ago
C) Use encryption and signatures to secure data.
upvoted 0 times
...
Sharmaine
5 months ago
A) Use tokens after the identity of a client has been established.
upvoted 0 times
...
...
Howard
6 months ago
Haha, yeah, basic auth for internal APIs? What is this, the 90s? Cloud hosting to manage security config is an interesting idea, but I think it really depends on the cloud provider and your specific use case. Gotta be careful with that one.
upvoted 0 times
...
Elouise
6 months ago
Yeah, I agree. Using encryption and signatures is a must for API security. And using tokens after authentication is also a really common best practice. Basic auth over internal APIs? That just sounds like a disaster waiting to happen.
upvoted 0 times
...
Deonna
6 months ago
Hmm, this is a tricky one. I'm not sure about using the same operating system throughout the infrastructure - that seems like it could be more of a deployment consideration than a security best practice. But using encryption and signatures to secure data, that's definitely a good one.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77