Ultimate access to all questions.
Question 18 Correct A company plans to transmit data to a third party using an HTTP API endpoint that is controlled by the third party. The company possesses the required API key to access the endpoint. It is crucial that integrating the API key into the company's application code does not degrade the application’s performance.
What is the most secure method to achieve this?