
APi Security webinar
Authored by Lakshitha Priyasad
Computers
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which OAuth 2.0 grant type is generally considered most secure for web and mobile applications,involving an intermediary step where an authorization code is exchanged for an access token?
Client Credentials Grant
Resource Owner Password Credentials Grant
Authorization Code Grant
Refresh Token Grant
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What core functionality does OpenID Connect (OIDC) add when layered on top of the OAuth 2.0protocol?
Enhanced token encryption standards
An identity layer for verifying end-user identity and obtaining prole data
A simplied mechanism for API key management
More granular rate-limiting policies
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A common best practice in API security architecture is to offload security responsibilities to a central component that sits between API backends and consumers. What is this component typically called?
Identity Provider (IDP)
API Gateway
Web Application Firewall (WAF)
Backend Service Broker
4.
MULTIPLE SELECT QUESTION
45 sec • 3 pts
What are some key advantages of implementing effective rate limiting for APIs?
Prevention of DDoS attacks
Enabling API usage plans for monetization
Enforcement of fair usage policies among consumers
Automatic encryption of API payload data
Protection of backend systems from sudden overuse and request spikes
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When a web browser invokes an API from a different origin, the Cross-Origin Resource Sharing(CORS) mechanism is often employed. What type of initial request is typically sent by the client application before the main API call?
Discovery request
Pre-flight request
Handshake request
Finalization request
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Within the OpenAPI specification, which element is primarily used to define how API clients must authenticate to consume API operations?
paths
components
securityDefinitions (or securitySchemes)
info
7.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
In the XACML (eXtensible Access Control Markup Language) architecture, which component is responsible for evaluating access requests against defined policies and ultimately making the Permit or Deny decision?
Policy Enforcement Point (PEP)
Policy Administration Point (PAP)
Policy Information Point (PIP)
Policy Decision Point (PDP)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
CHAPTER 4: IDS AND IPS
Quiz
•
University
10 questions
Chapter 5: Hardware Security Controls
Quiz
•
University
10 questions
ITESA Roadmap Event 12-09-24
Quiz
•
University
10 questions
CSE-205-DCN-UNIT 6-QUIZ
Quiz
•
University
10 questions
CH 12- Defense in Depth
Quiz
•
University
15 questions
Administration Database
Quiz
•
University - Professi...
15 questions
POST-TEST MODUL 1 APSI
Quiz
•
University
10 questions
CHAPTER 1: COMPUTER SECURITY REVIEW
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade