exam questions

Exam 350-901 All Questions

View all questions & answers for the 350-901 exam

Exam 350-901 topic 1 question 143 discussion

Actual exam question from Cisco's 350-901
Question #: 143
Topic #: 1
[All 350-901 Questions]

How do end-to-end encryption principles apply to APIs?

  • A. The owners of the service are prevented from accessing data that is being transferred.
  • B. Sensitive information is protected against backdoor attacks.
  • C. The API data is protected against man-in-the-middle attacks.
  • D. Both endpoints that are using the API resources are hardened against hacking.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
udo2020
Highly Voted 2 years, 6 months ago
It's C
upvoted 7 times
...
__al__
Highly Voted 2 years, 3 months ago
Selected Answer: C
C ......
upvoted 6 times
...
samael666
Most Recent 2 days, 13 hours ago
Selected Answer: A
MITM is done by the HTTPS protocol already
upvoted 1 times
...
razvan999
7 months, 1 week ago
Selected Answer: C
IMO, if owners tries to access data in motion it will still be same as MitM
upvoted 2 times
...
Dave513
8 months, 3 weeks ago
Selected Answer: C
I guess A and C are correct. Maybe something was misspelled on writing the answers
upvoted 1 times
...
[Removed]
1 year, 8 months ago
Selected Answer: A
agree with designated. But the end-to-end encryption has the following challenges: - Endpoint Security - Man-in-the-Middle - Backdoors https://www.ibm.com/topics/end-to-end-encryption
upvoted 1 times
...
Teringzooi
1 year, 9 months ago
Selected Answer: C
As this question mentions end-to-end encryption, it clearly is about the communication (C) and not about the endpoints (A&B&D).
upvoted 1 times
...
designated
1 year, 10 months ago
Selected Answer: A
A is correct. In many messaging services, third parties store the data, which is encrypted only in transit. This server-side encryption method secures the data from unauthorized viewers only. But as an effect of this method, the sender can view the information, too, which can be undesirable in cases where data privacy at all points is needed. ### In the case of end-to-end encryption, encrypted data is only viewable by those with decryption keys. In other words, E2EE prevents unintended users, including third parties, from reading or modifying data when only the intended readers should have this access and ability. ### But the end-to-end encryption has the following challenges: - Endpoint Security - Man-in-the-Middle - Backdoors https://www.ibm.com/topics/end-to-end-encryption
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago