Which two encryption principles should be applied to secure APIs?

Which two encryption principles should be applied to secure APIs? (Choose two.)
A. Use temporary files as part of the encryption and decryption process.
B. Use encrypted connections to protect data in transit.
C. Reuse source code that contain existing UUIDs.
D. Embed keys in code to simplify the decryption process.
E. Transmit authorization information by using digitally signed payloads.

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.