Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CyberArk Exam PAM-SEN Topic 1 Question 36 Discussion

Actual exam question for CyberArk's CyberArk Sentry - PAM exam
Question #: 36
Topic #: 1
[All CyberArk Sentry - PAM Questions]

Which statement about REST API is correct? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: A, D

Contribute your Thoughts:

Roslyn
27 days ago
Haha, imagine if the correct answers were 'C' and 'E'. That would be the most insecure REST API ever!
upvoted 0 times
Rusty
3 days ago
Yeah, that would definitely be a security nightmare!
upvoted 0 times
...
Rusty
9 days ago
D) Each REST API call requires that a valid authentication token be provided. Most Voted
upvoted 0 times
...
Rusty
10 days ago
A) When a user successfully authenticates to the Vault, an authentication token is returned. Most Voted
upvoted 0 times
...
...
Lorean
29 days ago
This question is a good test of our understanding of REST API security and best practices. I'm glad they're not just asking for textbook definitions.
upvoted 0 times
India
13 days ago
D) Each REST API call requires that a valid authentication token be provided. Most Voted
upvoted 0 times
...
India
16 days ago
A) When a user successfully authenticates to the Vault, an authentication token is returned. Most Voted
upvoted 0 times
...
...
Leana
1 months ago
E is just plain wrong. REST calls are sent over standard HTTP/HTTPS ports, not a specific Vault port.
upvoted 0 times
...
Garry
1 months ago
C is a bit suspicious. Editing the configuration file to enable session load balancing? That sounds like a hack, not a proper REST API feature.
upvoted 0 times
Annalee
13 days ago
I agree, editing configuration files for session load balancing seems risky.
upvoted 0 times
...
Annalee
14 days ago
D) Each REST API call requires that a valid authentication token be provided. Most Voted
upvoted 0 times
...
Asuncion
18 days ago
D) Each REST API call requires that a valid authentication token be provided. Most Voted
upvoted 0 times
...
Asuncion
29 days ago
A) When a user successfully authenticates to the Vault, an authentication token is returned. Most Voted
upvoted 0 times
...
Thea
1 months ago
D) Each REST API call requires that a valid authentication token be provided. Most Voted
upvoted 0 times
...
Annalee
1 months ago
A) When a user successfully authenticates to the Vault, an authentication token is returned. Most Voted
upvoted 0 times
...
Thea
1 months ago
A) When a user successfully authenticates to the Vault, an authentication token is returned. Most Voted
upvoted 0 times
...
...
Arlette
2 months ago
B is definitely wrong. Windows authentication should not bypass the logon process. That would be a major security risk.
upvoted 0 times
...
Karl
2 months ago
A and D seem to be the correct answers. The Vault authentication token and requiring a valid token for each REST API call are essential security features.
upvoted 0 times
Brandon
1 months ago
Which statement about REST API is correct? (Choose two.)
upvoted 0 times
...
Joana
1 months ago
Which statement about REST API is correct? (Choose two.)
upvoted 0 times
...
Leslie
2 months ago
Which stBlonLeslieelltement BlonLeslieellbout REST BlonLeslieellPI is correct? (Choose two.)
upvoted 0 times
...
Blondell
2 months ago
Which stBlondelltement Blondellbout REST BlondellPI is correct? (Choose two.)
upvoted 0 times
...
...

Save Cancel