ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 7 - SCS-C01 discussion

Report
Export

A security engineer has created an Amazon Cognito user pool. The engineer needs to manually verify the ID and access token sent by the application for troubleshooting purposes What is the MOST secure way to accomplish this?

A.
Extract the subject (sub), audience (aud), and cognito:username from the ID token payload Manually check the subject and audience for the user name In the user pool
Answers
A.
Extract the subject (sub), audience (aud), and cognito:username from the ID token payload Manually check the subject and audience for the user name In the user pool
B.
Search for the public key with a key ID that matches the key ID In the header of the token. Then use a JSON Web Token (JWT) library to validate the signature of the token and extract values, such as the expiry date
Answers
B.
Search for the public key with a key ID that matches the key ID In the header of the token. Then use a JSON Web Token (JWT) library to validate the signature of the token and extract values, such as the expiry date
C.
Verify that the token is not expired. Then use the token_use claim function In Amazon Cognito to validate the key IDs
Answers
C.
Verify that the token is not expired. Then use the token_use claim function In Amazon Cognito to validate the key IDs
D.
Copy the JSON Web Token (JWT) as a JSON document Obtain the public JSON Web Key (JWK) and convert It to a pem file. Then use the file to validate the original JWT.
Answers
D.
Copy the JSON Web Token (JWT) as a JSON document Obtain the public JSON Web Key (JWK) and convert It to a pem file. Then use the file to validate the original JWT.
Suggested answer: A
asked 16/09/2024
Peter Chong
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first