DEVCOR Exam QuestionsBrowse all questions from this exam

DEVCOR Exam - Question 143


How do end-to-end encryption principles apply to APIs?

Show Answer
Correct Answer: A

End-to-end encryption (E2EE) ensures that data can only be read by the sender and the intended recipient, preventing service owners or third parties from accessing the data while it is being transferred. This principle is directly applied to APIs by ensuring that the data transmitted via the API is encrypted in such a way that only the endpoints with the appropriate decryption keys can access it.

Discussion

9 comments
Sign in to comment
udo2020
Jul 17, 2022

It's C

__al__Option: C
Oct 2, 2022

C ......

designatedOption: A
Feb 28, 2023

A is correct. In many messaging services, third parties store the data, which is encrypted only in transit. This server-side encryption method secures the data from unauthorized viewers only. But as an effect of this method, the sender can view the information, too, which can be undesirable in cases where data privacy at all points is needed. ### In the case of end-to-end encryption, encrypted data is only viewable by those with decryption keys. In other words, E2EE prevents unintended users, including third parties, from reading or modifying data when only the intended readers should have this access and ability. ### But the end-to-end encryption has the following challenges: - Endpoint Security - Man-in-the-Middle - Backdoors https://www.ibm.com/topics/end-to-end-encryption

razvan999Option: C
Jun 12, 2024

IMO, if owners tries to access data in motion it will still be same as MitM

TeringzooiOption: C
Apr 10, 2023

As this question mentions end-to-end encryption, it clearly is about the communication (C) and not about the endpoints (A&B&D).

[Removed]Option: A
May 7, 2023

agree with designated. But the end-to-end encryption has the following challenges: - Endpoint Security - Man-in-the-Middle - Backdoors https://www.ibm.com/topics/end-to-end-encryption

Dave513Option: C
Apr 24, 2024

I guess A and C are correct. Maybe something was misspelled on writing the answers

samael666Option: A
Jan 13, 2025

MITM is done by the HTTPS protocol already

al_monOption: A
Feb 5, 2025

Not C, because C (The API data is protected against man-in-the-middle attacks) ❌ While TLS encryption prevents man-in-the-middle (MITM) attacks, E2EE is not primarily designed for this purpose. E2EE ensures only the intended recipient can read the data, even if MITM attackers or service providers intercept it.