Which two methods are API security best practices? (Choose two.)
A . Use tokens after the identity of a client has been established.
B . Use the same operating system throughout the infrastructure.
C . Use encryption and signatures to secure data.
D . Use basic auth credentials over all internal API interactions.
E . Use cloud hosting services to manage security configuration.
Answer: A,C