Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 350-901 topic 1 question 60 discussion

Actual exam question from Cisco's 350-901
Question #: 60
Topic #: 1
[All 350-901 Questions]

Which security approach should be used for developing a REST API?

  • A. Add an API key to each URL string.
  • B. Use custom security relevant HTTP response codes.
  • C. Utilize CORS headers.
  • D. Utilize TLS for end-to-end encryption.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
duracell
Highly Voted 2 years, 2 months ago
IMO D is correct.
upvoted 9 times
...
Teringzooi
Most Recent 1 year, 6 months ago
Selected Answer: D
Correct answer: D To protect north-south API traffic, the following options are available: -Traditional TLS or Mutual TLS (MTLS) authentication and encryption -TLS or IPSec from the client to an API gateway or NGFW -Cloud-based VPN service -Dedicated cloud connections
upvoted 3 times
...
fmexican
1 year, 8 months ago
Selected Answer: D
It is D
upvoted 1 times
...
ferock
1 year, 11 months ago
Correct D Source: Cisco DEVCOR 350-901 Study Guide API traffic requires secure treatment as well because it may carry access credentials or sensitive data. Unsecured API calls may result in security breaches that may have serious business consequences, such as losing the right to operate due to lack of compliance, reputation loss due to security breaches, or escalating cloud costs dues to malicious use of resources billable in a pay-as-you-go model. To protect north-south API traffic, the following options are available: -Traditional TLS or Mutual TLS (MTLS) authentication and encryption -TLS or IPSec from the client to an API gateway or NGFW -Cloud-based VPN service -Dedicated cloud connections To protect the east-west API traffic, the following options are available: -TLS or MTLS between services, like for north-south traffic -Service mesh segmentation service -Dedicated container firewall
upvoted 3 times
designated
1 year, 7 months ago
It is correct
upvoted 1 times
...
...
RukiaTester
2 years ago
D. https://stackoverflow.blog/2021/10/06/best-practices-for-authentication-and-authorization-for-rest-apis/
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...