A and C are correct answers:
https://intersight.com/apidocs/introduction/security/%23generating-api-keys&sa=D&ust=1612024909729000&usg=AOvVaw362rkbFxqhX_Mo8w0xkDJG/#generating-api-keys
Looks ok: https://intersight.com/apidocs/introduction/security/#benefits-of-using-api-keys
The "signature" parameter is a digital signature of the HTTP headers and body.
RSA - The key pair is generated using the RSA algorithm and specified parameters. The supported RSA modulus values are 2048, 2560, 3072, 3584 and 4096.
Maybe B and C
HTTP Signature Algorithms
API keys are used to sign HTTP requests as follows:
A cryptographic digest of the body of the HTTP request is calculated using one of the supported cryptographic hash algorithms.
The value of the digest is base-64 encoded in the Digest HTTP header.
A signature is calculated as specified in the HTTP signature scheme, and the signature is added to the Authorization HTTP request header.
upvoted 1 times
...
...
This section is not available anymore. Please use the main Exam Page.300-635 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
anonymousch
1 year, 4 months agovk_no
1 year, 6 months agobmoney1
1 year, 7 months agobmoney1
1 year, 7 months ago