While testing your Apigee API proxy, you discover that the TargetEndpomt that is called is not what you expect. You have verified that there is a RouteRule that matches conditions, and should be called. What should you do?
Which policies can be used to create or modify a request message for a service callout? Select all that are correct
Your APIs are configured as a relying party on an OpenID Connect platform. You need to inspect and verify the OpenID Connect identity. What two actions should you take?
Choose 2 answers
In your last release, there were unexpected errors uncovered by users within the first 24 hours The root cause analysis found that key configurations were not promoted to production You want to avoid similar release failures in your next release What should you do?
You have a requirement to expose functions and data from an existing back-end system Using Apigee recommended practices, which step should you take first*?
Where can you use a Flow Callout policy? Select all that apply.
Choose 2 answers
A customer has added response cache policy on all their search APIs, but traffic to the backend has not reduced much. They ask you to investigate, you find that GET queries are being cached and available in memory but cache misses are still high You want to improve caching and reduce cache misses What should you do?
You need to interact with two different back end systems, depending on inbound request data One backend is a default target URL without SSL and another one is a dynamic target URL with 2-Way SSL What should you do?
You need to log certain data to a custom logging service while processing the response You want to avoid processing delays due to logging during the logic flow What should you do?
You are working on a new design for an API. The backend API will set the customer to a deleted status. The customer will remain in the backend database for later cleanup. The customer can no longer be retrieved by the API once the status is set. Which method should be used at the Apigee proxy to set the deleted status?
Which feature can be used to limit application consumption to a particular group of API proxy resources?
Which protocols are supported by the Message Logging policy? Select all that are correct
You have created an OpenAPl specification and begun a sample implementation of the API Proxy in Apigee Edge Another team is asking for early access for interactive documentation What should you do1?
The product owner has asked you for a new API. This new API will change a configuration for a backend system. The use case calls for a single API. Which verb should you use?
Your implementation has the following characteristics
1 There are multiple API Products
2 Some API proxies are part of more than one API Product.
3 Quotas are configured at the API Product level
4 In the Quota policy the count, time interval and unit is referenced using Verify API Key flow variables at runtime.
5 A single Quota policy is reused across all the products 6. Each app is assigned to exactly one product.
You need to limit the number of requests during weekends for specific products without modifying this design What should you do?
Which approaches can be used for extracting data from a SOAP body and returning it as a JSON response in Apigee Edge? Select all that are correct.
Choose 3 answers
As an API Engineer your team has had issues with security vulnerabilities and poor coding practices in the past. You would like to improve your team ' s reputation within the organization. What step could take to improve your process?
You are implementing several flows in Apigee Edge and realize that there is common functionality used across many different APIs and flows You want to use Apigee Edge to minimize the number of releases What should you do?
The product team is rolling out a new reseller program with API ' s. The product owner has created Epics covering the high level requirements. The product owner delegate has asked for help creating a product backlog. What task would the product owner delegate need assistance with?
Which are NOT a step in the OAuth 2 0 authorization code grant process? Select all that are correct
You need to restrict write access to those applications that have been specifically delegated that authority by end users Your project is already using OAuth2 for user and app authentication What should you do?
A cloud customer wants to safeguard their APIs against a sudden increase in traffic. You need to calculate an allowable traffic rate of 100 transactions per second (TPS) What should you do?
As an API Engineer your team would like to make sure you are simulating a user experience prior to a deployment in a production environment. Which tests should be ran to closely resemble a consumer interaction with a APIs?
You are designing an API that allows a consumer to fetch all orders associated to a given customer. You want to use a RESTful design Which design should you use?
As an Apigee API Engineer you attend a meeting where a Product Owner would like to release a new feature to customers. There are several teams in the meeting, Backend API team, Apigee API team, and the Security team. The feature will be exposed through the companies external facing website. The architecture allows the website to call the backend APIs directly. The security team raises a concern about the backend APIs being wide open to anyone inside the network, not just the external website. You are later contacted and asked for your teams impacts. How should you reply?
You are adding a filter on an API to locate all orders in a specific date range You want to use a RESTful design Which design should you use?
How can we specrfy the type of Security (basic auth, oauth) used by the API in OpenAPI Specification 2.0?
Which will allow me to set the number of maximum elements to be cached in memory in a particular cache resource?