AWS Certified Developer Associate DVA-C02 Practice Question
A development team is working on an application that allows users to access their order history on an e-commerce platform. The team decides to use bearer tokens to handle user authentication and authorization. What strategy should the developers implement to maximize the security of the application while using these tokens?
Validate the bearer token once at the beginning of the user session and trust subsequent requests from the same user without further validation.
Store the bearer token in local storage and send it through regular HTTP to simplify the architecture.
Enforce HTTPS for all token transmissions and validate the token's integrity and revocation on the server with each request.
Email the bearer token to users for easy access and retrieval, ensuring they can authenticate their sessions easily.
The secure handling of bearer tokens involves measures such as transmission over HTTPS to protect the token during transit and validating the token on the server with each request to ensure it is still valid and has not been revoked. The use of HTTPS prevents man-in-the-middle attacks by encrypting the data in transit, including the bearer token. On the server-side, validating the token's integrity and checking for revocation ensures that the token is still permitted to access the requested resources. Choosing not to enforce HTTPS or failing to validate the token on the server can lead to potential security breaches.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a bearer token, and how does it work?
Open an interactive chat with Bash
What does enforcing HTTPS involve, and why is it important?
Open an interactive chat with Bash
What does token validation on the server entail?
Open an interactive chat with Bash
AWS Certified Developer Associate DVA-C02
Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access