
AWS Certified Developer - Associate
Get started today
Ultimate access to all questions.
In the context of securing an API that integrates with a downstream AWS Lambda function, a developer needs to implement robust access control mechanisms.
Which of the following options describes a method that CANNOT be utilized for authenticating with the API Gateway?
In the context of securing an API that integrates with a downstream AWS Lambda function, a developer needs to implement robust access control mechanisms.
Which of the following options describes a method that CANNOT be utilized for authenticating with the API Gateway?
Exam-Like