To protect against CSRF attacks, developers can implement _____ to ensure requests are only accepted from trusted sources.
- Authentication
- Cross-origin resource sharing (CORS)
- Encryption
- Rate limiting
To protect against CSRF (Cross-Site Request Forgery) attacks, developers can implement Cross-origin resource sharing (CORS) to ensure that requests are only accepted from trusted sources. CORS helps prevent unauthorized websites from making malicious requests to APIs on behalf of users.
Loading...
Related Quiz
- Can you explain how GraphQL allows for more flexibility in querying data compared to REST?
- What is REST in the context of Web APIs?
- gRPC can efficiently handle _____ communication, which is beneficial for services that need to maintain a persistent connection.
- How does GraphQL allow clients to specify exactly what data?
- How can API throttling improve the user experience?