In your last release, there were unexpected errors uncovered by users within the first 24 hours The root cause
analysis found that key configurations were not promoted to production You want to avoid similar release
failures in your next release What should you do?
A.
Notify operations of the release
B.
Run an automated smoke test suite.
C.
Monitor the logs looking for unusual error patterns
D.
Ensure all sources are checked into source control
Monitor the logs looking for unusual error patterns
How can we add custom objects to an OpenAPI Specification 2.0?
A.
By prefixing x- before the name of the custom object
B.
By prefixing c- before the name of the custom object
C.
By prefixing ext- before the name of the custom object
D.
Open API specification does not allow custom objects
By prefixing c- before the name of the custom object
Your API generates tokens to authenticate users. You have the following requirements
1. Limited token lifetime.
2. Managed key rotation.
3. Self-verifiable content.
4 Compact data representation
5. Refresh without new challenge.
You plan to use SAML2 Which two of the above-listed requirements are satisfied by using SAML2? Choose 2
answers
A.
Limited token lifetime.
B.
Managed key rotation
C.
Self-verifiable content
D.
Compact data representation
E.
Refresh without a new challenge
Limited token lifetime.
Which are NOT a step in the OAuth 2 0 authorization code grant process? Select all that are correct
A.
generate an authorization code
B.
generate an access token
C.
verify the device ID
D.
validate the client API key
E.
obtain the end user's consent for the application to request the user's protected resources
F.
validate the developer name
generate an authorization code
obtain the end user's consent for the application to request the user's protected resources
validate the developer name
Which are characteristics of the PopulateCache and ResponseCache policies'? Select all that are correct
A.
PopulateCache has a TimeOfYear expiry option
B.
PopulateCache allows you to cache any string object.
C.
ResponseCache has separate policy definitions for Lookup vs. Populate cache operations.
D.
ResponseCache caches the complete HTTP response (including headers).
ResponseCache has separate policy definitions for Lookup vs. Populate cache operations.
Which proxy endpoint configuration determines the target endpoint that will be used?
A.
Step
B.
TargetConfiguration
C.
RouteRule
D.
Connection
E.
Path
Path
Which is a benefit of three-legged OAuth (authonzation_code grant)'?
A.
authorization codes can be used multiple times to obtain access tokens
B.
allows another individual to access a user's private data
C.
provides access to user-specific resources without exposing end-user credentials to the client application
D.
provides end-user credentials to requesting app
provides end-user credentials to requesting app
Which of the following statements are true for the out-of-the-box Apigee Edge Analytics Dashboard? Select all that apply Choose 3 answers
A.
Visualize API proxy error metrics
B.
Visualize API traffic metrics
C.
Visualize Developer Engagement metrics
D.
Visualize API Deployment metrics
E.
Visualize Management API traffic metrics
Visualize API proxy error metrics
Visualize API Deployment metrics
Visualize Management API traffic metrics
You have a new set of requirements for a mobile app. The product team has asked for the following.
• The app requires access to customer order information
• The app needs to allow a search function for orders by product name
Choose two development tasks that would accomplish the requirements. Choose 2 answers
A.
Create a new API proxy for a GET /v1/customers/{customerid}/orders
B.
Create a new API proxy for a GET /v1/customers/{customerid}/products/{productname}
C.
The design should include a new custom header X-Product-Name
D.
The Apigee proxy should allow a query parameter for q=
E.
The Apigee proxy should allow a query parameter for orderld=
The Apigee proxy should allow a query parameter for q=
The Apigee proxy should allow a query parameter for orderld=
How can we specrfy the type of Security (basic auth, oauth) used by the API in OpenAPI Specification 2.0?
A.
specify using the secuntyDefinrtions name property
B.
specify using the secuntySchemas name property
C.
specify using the security Variables name properly
D.
specify using the securityParams name property
specify using the security Variables name properly
Page 2 out of 13 Pages |
Previous |