Final Assessment

Question 1

Which of the following statements is true about token based architectures

chevron-rightSolutionhashtag

It provides fundamentals to build a zero trust architecture

Question 2

Which HTTP request header is used to pass the access token

chevron-rightSolutionhashtag

The Authorization header

Question 3

What does the client need to send along with an access token of type Bearer when calling the API?

chevron-rightSolutionhashtag

Nothing

Question 4

Which OAuth flow is most suitable for web applications

chevron-rightSolutionhashtag

Code flow

Question 5

Who is the only allowed final recipient (audience) of a refresh token?

chevron-rightSolutionhashtag

The Authorization Server

Question 6

What is the difference between scopes and claims?

chevron-rightSolutionhashtag

Scopes don't have values but claims do

Question 7

Why do we say that the access token is the identity API for the APIs

chevron-rightSolutionhashtag

The access token contains claims that can be tailored for the APIs identity needs

Question 8

What are the two base OAuth endpoints called

chevron-rightSolutionhashtag

Authorization endpoint and token endpoint

Question 9

How does a user authenticate when the client starts a code flow

chevron-rightSolutionhashtag

It is not defined by the OAuth specification

Question 10

Why are scopes helpful for application (client) level permissions

chevron-rightSolutionhashtag

Because they limit what the client can do, no matter who logs in

Last updated