Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 300-735 Topic 8 Question 51 Discussion

Actual exam question for Cisco's 300-735 exam
Question #: 51
Topic #: 8
[All 300-735 Questions]

A developer has just completed the configuration of an API that connects sensitive internal systems. Based on company policies, the security of the data is a high priority.

Which approach must be taken to secure API keys and passwords?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Kent
8 days ago
Hah, this question is a trap! Anyone who picks A, B, or C is just begging to get their system compromised. The only real answer is D - rotate those keys and passwords on a regular basis. Gotta stay one step ahead of the bad guys, you know?
upvoted 0 times
...
Walker
9 days ago
Ugh, this question is painful. Who would even think of putting sensitive data in the code or source tree? That's rookie-level security stuff. Changing the keys regularly is the only way to go if you want to keep your system safe.
upvoted 0 times
...
Tashia
10 days ago
Oh man, this is a tricky one. I guess the only real answer is D - changing the keys and passwords periodically. That's the only way to keep the system truly secure. The other options are just asking to get hacked!
upvoted 0 times
...
Ozell
11 days ago
Embedding sensitive data directly in the code? That's just asking for trouble! Hiding it in a file or storing it in the source tree aren't much better. Those are all terrible options that go against basic security practices.
upvoted 0 times
...

Save Cancel