A developer has just completed the configuration of an API that connects sensitive internal systems. Based on company policies, the security of the data is a high priority. Which approach must be taken to secure API keys and passwords?
A) Embed them directly in the code.
B) Store them in a hidden file.
C) Store them inside the source tree of the application.
D) Change them periodically.
Correct Answer:
Verified
Q32: Which two techniques protect against injection attacks?
Q33: Q34: AppGigabitEthernet interface is used as data port Q35: The Meraki API url https://api.meraki.com/api/v0/networks/123456789/ssids/2 has been Q36: The UCS Python SDK includes modules for Q38: What is submitted when an SSL certificate Q39: Q40: Which two types of storage are supported Q41: An automated solution is needed to configure Q42: Unlock this Answer For Free Now! View this answer and more for free by performing one of the following actions Scan the QR code to install the App and get 2 free unlocks Unlock quizzes for free by uploading documents![]()
![]()
![]()