APi Security webinar

APi Security webinar

University

10 Qs

quiz-placeholder

Similar activities

useLocalStorage  - Custom React Hook

useLocalStorage - Custom React Hook

University

9 Qs

Access Control

Access Control

University

10 Qs

Web Dev Quizz 1

Web Dev Quizz 1

University

15 Qs

Lesson 1 - The Basics

Lesson 1 - The Basics

University

12 Qs

Change Management ITILV4

Change Management ITILV4

University

10 Qs

Administration Database

Administration Database

University - Professional Development

15 Qs

Security Architecture

Security Architecture

University

10 Qs

AWS Developer Dominio 2: Seguridad

AWS Developer Dominio 2: Seguridad

University

10 Qs

APi Security webinar

APi Security webinar

Assessment

Quiz

Computers

University

Hard

Created by

Lakshitha Priyasad

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which OAuth 2.0 grant type is generally considered most secure for web and mobile applications,involving an intermediary step where an authorization code is exchanged for an access token?

Client Credentials Grant

Resource Owner Password Credentials Grant

Authorization Code Grant

Refresh Token Grant

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What core functionality does OpenID Connect (OIDC) add when layered on top of the OAuth 2.0protocol?

Enhanced token encryption standards

An identity layer for verifying end-user identity and obtaining prole data

A simplied mechanism for API key management

More granular rate-limiting policies

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A common best practice in API security architecture is to offload security responsibilities to a central component that sits between API backends and consumers. What is this component typically called?

Identity Provider (IDP)

API Gateway

Web Application Firewall (WAF)

Backend Service Broker

4.

MULTIPLE SELECT QUESTION

45 sec • 3 pts

What are some key advantages of implementing effective rate limiting for APIs?

Prevention of DDoS attacks

Enabling API usage plans for monetization

Enforcement of fair usage policies among consumers

Automatic encryption of API payload data

Protection of backend systems from sudden overuse and request spikes

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When a web browser invokes an API from a different origin, the Cross-Origin Resource Sharing(CORS) mechanism is often employed. What type of initial request is typically sent by the client application before the main API call?

Discovery request

Pre-flight request

Handshake request

Finalization request

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Within the OpenAPI specification, which element is primarily used to define how API clients must authenticate to consume API operations?

paths

components

securityDefinitions (or securitySchemes)

info

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

In the XACML (eXtensible Access Control Markup Language) architecture, which component is responsible for evaluating access requests against defined policies and ultimately making the Permit or Deny decision?

Policy Enforcement Point (PEP)

Policy Administration Point (PAP)

Policy Information Point (PIP)

Policy Decision Point (PDP)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?