Question: 1
A developer has just completed the configuration of an API that connects sensitive internal systems. Based on company policies, the security of the data is a high priority.
Which approach must be taken to secure API keys and passwords?
Question: 2
Refer to the exhibit.
An application is being developed as an information repository. The application will be used to store details about television shows, including the scenario, year, and category. Which database type must used for high performance for the data structure?
Question: 3
Refer to the exhibits. Which data payload completes the CURL command to run the create port object API call In Cisco Firepower Threat Defense?
Refer to the exhibits. Which data payload completes the CURL command to run the create port object API call In Cisco Firepower Threat Defense?
A)
B)
C)
D)
Question: 4
Refer to the exhibit.
Refer to the exhibit. A Python API server has been deployed. Based on metrics and logs, increased load has been noticed. Which two approaches must be taken to optimize API usage on the server? (Choose two.)
Question: 5
Refer to the exhibit.
The cURL POST request creates an OAuth access token for authentication with FDM API requests. What is the purpose of the file ''@token_data'' that cURL is handling?