Search Header Logo

APi Security webinar

Authored by Lakshitha Priyasad

Computers

University

Used 2+ times

APi Security webinar
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which OAuth 2.0 grant type is generally considered most secure for web and mobile applications,involving an intermediary step where an authorization code is exchanged for an access token?

Client Credentials Grant

Resource Owner Password Credentials Grant

Authorization Code Grant

Refresh Token Grant

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What core functionality does OpenID Connect (OIDC) add when layered on top of the OAuth 2.0protocol?

Enhanced token encryption standards

An identity layer for verifying end-user identity and obtaining prole data

A simplied mechanism for API key management

More granular rate-limiting policies

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A common best practice in API security architecture is to offload security responsibilities to a central component that sits between API backends and consumers. What is this component typically called?

Identity Provider (IDP)

API Gateway

Web Application Firewall (WAF)

Backend Service Broker

4.

MULTIPLE SELECT QUESTION

45 sec • 3 pts

What are some key advantages of implementing effective rate limiting for APIs?

Prevention of DDoS attacks

Enabling API usage plans for monetization

Enforcement of fair usage policies among consumers

Automatic encryption of API payload data

Protection of backend systems from sudden overuse and request spikes

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When a web browser invokes an API from a different origin, the Cross-Origin Resource Sharing(CORS) mechanism is often employed. What type of initial request is typically sent by the client application before the main API call?

Discovery request

Pre-flight request

Handshake request

Finalization request

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Within the OpenAPI specification, which element is primarily used to define how API clients must authenticate to consume API operations?

paths

components

securityDefinitions (or securitySchemes)

info

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

In the XACML (eXtensible Access Control Markup Language) architecture, which component is responsible for evaluating access requests against defined policies and ultimately making the Permit or Deny decision?

Policy Enforcement Point (PEP)

Policy Administration Point (PAP)

Policy Information Point (PIP)

Policy Decision Point (PDP)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers