Which two encryption principles should be applied to secure APIs? (Choose two.)
A . Use temporary files as part of the encryption and decryption process
B . Transmit authorization information by using digitally signed payloads
C . Use encrypted connections to protect data n transit
D . Reuse source code that contain existing UUIDs
E . Embed keys in code to simplify the decryption process
Answer: B,C
Latest 350-901 Dumps Valid Version with 169 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund