exam questions

Exam 350-901 All Questions

View all questions & answers for the 350-901 exam

Exam 350-901 topic 1 question 74 discussion

Actual exam question from Cisco's 350-901
Question #: 74
Topic #: 1
[All 350-901 Questions]

Which two methods are API security best practices? (Choose two.)

  • A. Use tokens after the identity of a client has been established.
  • B. Use the same operating system throughout the infrastructure.
  • C. Use encryption and signatures to secure data.
  • D. Use basic auth credentials over all internal API interactions.
  • E. Use cloud hosting services to manage security configuration.
Show Suggested Answer Hide Answer
Suggested Answer: AC 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
It1sme
Highly Voted 2 years, 6 months ago
Ans- A & C Here are some of the most common ways you can strengthen your API security: -Use tokens:== Establish trusted identities and then control access to services and resources by using tokens assigned to those identities. -Use encryption and signatures -Identify vulnerabilities -Use an API gateway https://www.redhat.com/en/topics/security/api-security https://www.examtopics.com/exams/cisco/350-901/view/6/#
upvoted 13 times
...
examtopicstroilevw
Most Recent 1 month, 3 weeks ago
Selected Answer: AC
tokens and encryption actually provide some security. using the same OS throughout your infrastructure arguably makes you easier to compromise, because if you can compromise 1 host, you can compromise all of them. using basic auth is not advised because it is username and password, and passwords are not something you want to be pushing out there [the reason we use OAuth instead] no idea how using a cloud hosting service to manage security configuration makes you more secure, unless this is a sales/marketing exam from Azure, AWS, Google Cloud, OCI, etc.
upvoted 1 times
...
Teringzooi
7 months, 2 weeks ago
Selected Answer: AC
Answers: A & C https://techblog.cisco.com/blog/api-security
upvoted 1 times
...
designated
8 months, 4 weeks ago
Selected Answer: AC
A & C are correct Best practices recommended by Cisco 1. Vulnerability Identification 2. Encrypt Data 3. Authenticate all communication 4. Secure both internal and external API 5. Continuously monitor https://techblog.cisco.com/blog/api-security Redhat best practices are good as well.
upvoted 2 times
...
ferock
1 year ago
Selected Answer: AC
A and C
upvoted 2 times
...
udo2020
1 year, 4 months ago
Agree with A&C
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago