Automation is a crucial aspect of cloud computing that relies heavily on APIs (Application Programming Interfaces) to manage provisioning, scaling, and orchestration of cloud resources. Insecure APIs can be exploited by attackers to manipulate cloud services, disrupt automation workflows, or gain unauthorized access to cloud environments.
Why Not the Others?
B. Resource Pooling: Insecure APIs might expose shared resources, but they do not inherently compromise the ability to pool resources.
C. Elasticity: APIs help manage elasticity, but insecure APIs do not directly prevent resources from scaling up/down.
D. Redundancy: Cloud redundancy (e.g., multi-region failover) is typically built into infrastructure, making it less dependent on API security.
This section is not available anymore. Please use the main Exam Page.CCSP Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
MaciekMT
1 month, 3 weeks agoakg001
4 months, 4 weeks ago