SecGov (D) Flashcards

(15 cards)

1
Q

Are essential components of system integration in order to safeguard APIs from unauthorized access, guarantee data privacy, and preserve integrity of integrated systems

A

API Security and Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How might you apply an API Security Fundamentals?

A

API Key Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an API Key Authentication?

A

Common and straightforward technique for controlling API Access where each client has a unique key included in authentication and authorization requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What services require developers to acquire API Key Authentication to access their APIs

A

Google Maps, Twitter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does OAuth 2.0 for Third-Party API Access do?

A

allow third-party apps to access APIs securely by allowing users to grant restricted permissions without disclosing actual credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How might social media platforms like Facebook and LinkedIn use OAuth 2.0?

A

to grant secure access for functions like social login or data integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An RBAC allows administrators to do what?

A

Set and enforce granular access policies depending on user roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How might an online store API utilize RBAC?

A

have different roles like “admin”, “customer” and “guest” with specific perms to access or edit resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an application of API Rate Limiting and Throttling?

A

API Rate Limiting for Protection and Governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Implementing this helps control the volume of requests made by a client, prevents abuse and ensures equitable utilization of infrastructure resources.

A

Rate Restriction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How might major APIs like Google Maps and Twitter use API Rate Limiting and Throttling?

A

Provide fair access to their services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What might be an application of API Security Testing and Vulnerability Assessment

A

API Security Testing Tools and Practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

T or F

There is a small amount of software and frameworks available to perform JSON security audits, locate security flaws, and verify that a system complies with security standards

A

False. Wide variety of software and frameworks available to perform API security audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some tools popular on evaluating API security and locating potential flaws?

A

OWASP ZAP, Postman, Burp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some strong security measures that Organizations may implement to secure and regulate access to their APIs

A

API Key Authentication
OAuth 2.0
RBAC
Rate Limitation
Frequent Security Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly