5:00
Stop
CISSP - Security Assessment Methodologies - Secure Code Review
Expert
1/5
During a secure code review, you find an API that requires token-based authentication. Unfortunately, the token is hardcoded in the application's source code. What is the most secure solution to remedy this problem?
Expert