Questionnaire
0
Votes
1
Ans
What are the cloud application security issues?
459 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What is considered by the developers in regard to RESTful API deployment?
647 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What are the benefits of adopting a security-centric approach to develop the applications in the cloud?
560 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
In which part of the developmental life cycle do we implement security?
466 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which vulnerabilities are part of the OWASP Top Ten?
479 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What are pitfalls concerning cloud application development?
530 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which configuration setting must you access to set the Endpoint URL stage variable value?
474 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which statement best describes the role of the integration request in an API method in Amazon API gateway?
564 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
0
Votes
1
Ans
Which method provides a browser-based interface to manage AWS Organizations and resources?
454 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which types of custom authorizers are supported by API Gateway?
496 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
You are creating an IAM permissions policy in the Amazon API Gateway console.
420 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
You have created a Cognito user pool for your API named myLambda in the Amazon API Gateway console.
479 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Sequence the steps to correctly set up API keys using the Amazon API Gateway console.
689 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which statement best describes the role of authorization as a part of your API security process?
564 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
‘Which of the following is NOT a phishing indicator:
603 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which of the following are phishing indicators to look for in a suspicious email (select all that apply)?
556 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
How should | confirm if a request is legitimate?
646 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
A suspicious email is asking me to click a link and either log in or enter credentials. I should:
609 viewsShubham Haldkar Changed status to publish