There are two security models for HTTP communications between an IBM Watson service and the client application. Which two statements are true regarding these two models? (Choose two.)
There are two security models for HTTP communications between an IBM Watson service and the client application. Which two statements are true regarding these two models? (Choose two.)
There are two models for HTTP communications between an IBM Watson service and the client application. Both models offer generally equivalent functionality, but they have different security and performance characteristics. Additionally, in one model, the application must manage a security token, which is not required in the other model. These distinctions are crucial for understanding the differences in handling security and performance between the two models.
The correct answers are D and E