Which algorithms are used to secure REST API from brute attacks and minimize the impact?

IT Questions BankCategory: CCNPWhich algorithms are used to secure REST API from brute attacks and minimize the impact?
Which algorithms are used to secure REST API from brute attacks and minimize the impact? 1ITExamAnswers Staff asked 1 month ago
Question:
Which algorithms are used to secure REST API from brute attacks and minimize the impact?

  • A. SHA-512 and SHA-384
  • B. MD5 algorithm-128 and SHA-384
  • C. SHA-1, SHA-256, and SHA-512
  • D. PBKDF2, BCrypt, and SCrypt

Explanation: One of the best practices to secure REST APIs is using password hash. Passwords must always be hashed to protect the system (or minimize the damage) even if it is compromised in some hacking attempts. There are many such hashing algorithms which can prove really effective for password security e.g. PBKDF2, bcrypt and scrypt algorithms.
Other ways to secure REST APIs are: Always use HTTPS, Never expose information on URLs (Usernames, passwords, session tokens, and API keys should not appear in the URL), Adding Timestamp in Request, Using OAuth, Input Parameter Validation.
Reference: https://restfulapi.net/security-essentials/
We should not use MD5 or any SHA (SHA-1, SHA-256, SHA-512…) algorithm to hash password as they are not totally secure.
Note: A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works.

More Questions: CCNP 350-401 Dumps


Related Articles