Mike wants to ensure that third-party users of his service's API can be tracked to prevent abuse of the API. What should he implement to help with this?

A. Session IDs
B. An API firewall
C. API keys
D. An API buffer


Answer: C. API keys

Computer Science & Information Technology

You might also like to view...

Which of the following statements will display the getStudentDataForm form in such a way that any code following the statement will not execute until the getStudentDataForm closes?

a. getStudentDataForm.Open() b. getStudentDataForm.Show() c. getStudentDataForm.ShowDialog() d. getStudentDataForm.OpenForm.Modal()

Computer Science & Information Technology

A cell that is outlined in green and has data typed in it is the ________ cell

A) home B) active C) fill D) selected

Computer Science & Information Technology

Which of the following commands will count down from 10 to 1?

A. seq 10 1 B. seq 10 -1 C. seq 10 -1 1 D. seq 10 1 -1

Computer Science & Information Technology

The result of the transformation of the source document appears in a(n) _____ document.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology