exam questions

Exam 350-901 All Questions

View all questions & answers for the 350-901 exam

Exam 350-901 topic 1 question 364 discussion

Actual exam question from Cisco's 350-901
Question #: 364
Topic #: 1
[All 350-901 Questions]

Which step is part of a three-legged OAuth2 authorization code grant flow?

  • A. Use authorization codes to access protected resources when approved.
  • B. Exchange tokens for authorization codes by using the authentication server.
  • C. A user initiates a request to the OAuth client by using a predefined token.
  • D. The OAuth client redirects to the authorization server by using a username and password.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Daimon336
7 months, 2 weeks ago
Selected Answer: A
It would be B if the B line would say the following: Exchange authorization codes for tokens by using the authentication server. https://auth0.com/docs/get-started/authentication-and-authorization-flow/authorization-code-flow
upvoted 1 times
...
e7bd289
1 year ago
Selected Answer: A
A. Use authorization codes to access protected resources when approved: Explanation: This step is crucial in the OAuth2 authorization code grant flow. After the client receives an authorization code, it exchanges this code for an access token, which is then used to access protected resources. The access token represents the user’s authorization to access specific resources.
upvoted 1 times
...
doble_h
1 year, 4 months ago
Selected Answer: B
Cannot be A because authorization codes are NOT used to access protected resources, however Tokens are used which is what B states
upvoted 3 times
Amycert
9 months ago
B is completeley incorrect. Authorization tokens are the last provided code
upvoted 1 times
...
...
1a63556
1 year, 5 months ago
Selected Answer: A
A. Use authorization codes to access protected resources when approved. The three-legged OAuth2 authorization code grant flow generally involves these steps: The client (usually a web browser) requests authorization from the resource owner (usually by directing them to an authorization server with a request for access). Once the resource owner authorizes the request, the authorization server redirects the client back to the application with an authorization code. The client then exchanges this authorization code for an access token by making a request to the authorization server. The access token is then used by the client to access the protected resources. So, the authorization codes are used to access protected resources when approved.
upvoted 1 times
dkhenderson2
1 year, 1 month ago
Option A is not correct because in the three-legged OAuth2 authorization code grant flow, the authorization code is used to obtain an access token, which is then used to access protected resources. The authorization code itself is not used to access resources directly; it is an intermediary step in the process.
upvoted 1 times
...
...
razvan999
1 year, 6 months ago
Selected Answer: B
3 Leg type, 2nd phase
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...