Which two encryption principles should be applied to secure APIs?

Which two encryption principles should be applied to secure APIs? (Choose two.)
A. Use temporary files as part of the encryption and decryption process
B. Transmit authorization information by using digitally signed payloads
C. Use encrypted connections to protect data n transit
D. Reuse source code that contain existing UUIDs
E. Embed keys in code to simplify the decryption process

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.