Into which two areas are AppDynamics APIs categorized? (Choose two.)
Correct Answer:
DE
An application has initiated an OAuth authorization code grant flow to get access to an API resource on behalf of an end user.
Which two parameters are specified in the HTTP request coming back to the application as the end user grants access? (Choose two.)
Correct Answer:
AB
Which two methods are API security best practices? (Choose two.)
Correct Answer:
AC
Which two types of storage are supported for app hosting on a Cisco Catalyst 9000 Series Switch? (Choose two.)
Correct Answer:
AB
A developer has just completed the configuration of an API that connects sensitive internal systems. Based on company policies, the security of the data is a high priority. Which approach must be taken to secure API keys and passwords?
Correct Answer:
D