Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Apigee-API-Engineer Google Cloud - Apigee Certified API Engineer Questions and Answers

Questions 4

An API product in Apigee can be used to

Options:

A.

restrict access to a set of APIs

B.

configure the quota limits for APIs

C.

restrict access to APIs in different environments

D.

all of the above

Buy Now
Questions 5

What does the variable " message.content " represent?

Options:

A.

the request content in the request flow

B.

the response content in the response flow

C.

the request content when in the request flow and the response content when in the response flow

D.

neither the request content nor the response content

Buy Now
Questions 6

While testing your Apigee API proxy, you discover that the TargetEndpomt that is called is not what you expect. You have verified that there is a RouteRule that matches conditions, and should be called. What should you do?

Options:

A.

Modify the RouteRuies to be more specific.

B.

Create a new proxy for this special condition.

C.

Reorder the RouteRuies so that your condition is found

D.

Add a new TargetServer to handle your specific condition

Buy Now
Questions 7

Which policies can be used to create or modify a request message for a service callout? Select all that are correct

Options:

A.

ServiceCallout

B.

AssignMessage

C.

RequestMessage

D.

Message Validation

Buy Now
Questions 8

Your APIs are configured as a relying party on an OpenID Connect platform. You need to inspect and verify the OpenID Connect identity. What two actions should you take?

Choose 2 answers

Options:

A.

Verify the signature of the JWT using a shared secret.

B.

Parse the JWT to extract the exp: nbf and iat properties to determine if the token is still valid

C.

Pass the JWT to a preconfigured 3rd party for verification of the signature, exp, nbf and iat properties

D.

Use the OpenID Connect URL to locate a trusted 3rd party for verification the signature, exp, nbf and iat properties

E.

Using the JKWS URL in the OpenID Connect configuration, fetch the signing key to verify the JWT signature and parameters

Buy Now
Questions 9

In your last release, there were unexpected errors uncovered by users within the first 24 hours The root cause analysis found that key configurations were not promoted to production You want to avoid similar release failures in your next release What should you do?

Options:

A.

Notify operations of the release

B.

Run an automated smoke test suite.

C.

Monitor the logs looking for unusual error patterns

D.

Ensure all sources are checked into source control

Buy Now
Questions 10

You have a requirement to expose functions and data from an existing back-end system Using Apigee recommended practices, which step should you take first*?

Options:

A.

Write business and functional requirements documents.

B.

Implement ad-hoc microservices using a managed container system.

C.

Catalog the data model of the backing data store or API into a data dictionary

D.

Work with the existing or targeted application consumers to build an Open API Specification model

Buy Now
Questions 11

Where can you use a Flow Callout policy? Select all that apply.

Choose 2 answers

Options:

A.

Anywhere in a ProxyEndpoint or TargetEndpoint except PostClientFlow

B.

In a Shared Flow

C.

Only in the Flow phase of ProxyEndpoint or TargetEndpoint

D.

Anywhere except another Shared Flow

E.

Only in ProxyEndpoint PreFlow or TargetEndpoint PostFlow

Buy Now
Questions 12

A customer has added response cache policy on all their search APIs, but traffic to the backend has not reduced much. They ask you to investigate, you find that GET queries are being cached and available in memory but cache misses are still high You want to improve caching and reduce cache misses What should you do?

Options:

A.

Use lookup/populate cache policy.

B.

Increase the TimeToLive of cached objects

C.

Review key fragments in cache key, ensuring only important parameters are used

D.

Review and increase the number of items on the cache resource to a higher number

Buy Now
Questions 13

You need to interact with two different back end systems, depending on inbound request data One backend is a default target URL without SSL and another one is a dynamic target URL with 2-Way SSL What should you do?

Options:

A.

Use service callouts configuration for each target, and use a condition to decide which to invoke.

B.

Use a Key-Value Map configuration to access SSL and URL information to invoke target systems

C.

Use an AssignMessage policy to override default target URL and define 2-way SSL configuration at runtime

D.

Create another target endpoint with SSL configured and define route rule to pick that depends on available variables.

Buy Now
Questions 14

You need to log certain data to a custom logging service while processing the response You want to avoid processing delays due to logging during the logic flow What should you do?

Options:

A.

Use a Node.JS target to implement a nonblocking call.

B.

Attach a Message Logging policy to the Post Client Flow

C.

Implement a Java Extension Callout with a worker thread

D.

Use an asynchronous Service Callout policy in your proxy (low as soon as you have enough data to log

Buy Now
Questions 15

You are working on a new design for an API. The backend API will set the customer to a deleted status. The customer will remain in the backend database for later cleanup. The customer can no longer be retrieved by the API once the status is set. Which method should be used at the Apigee proxy to set the deleted status?

Options:

A.

GET

B.

PUT

C.

POST

D.

DELETE

E.

OPTIONS

Buy Now
Questions 16

Which feature can be used to limit application consumption to a particular group of API proxy resources?

Options:

A.

Virtual host

B.

API product

C.

Developer app

D.

RBAC (Role-based Access Control)

Buy Now
Questions 17

Which protocols are supported by the Message Logging policy? Select all that are correct

Options:

A.

FTP

B.

HTTP

C.

SCP

D.

TCP

E.

UDP

Buy Now
Questions 18

You have created an OpenAPl specification and begun a sample implementation of the API Proxy in Apigee Edge Another team is asking for early access for interactive documentation What should you do1?

Options:

A.

Publish using SwaggerUI

B.

Generate web documents using SmartDocs

C.

Send the requesting team the OpenAPl spec.

D.

Create a sample web app that uses your API, and publish the source code.

Buy Now
Questions 19

The product owner has asked you for a new API. This new API will change a configuration for a backend system. The use case calls for a single API. Which verb should you use?

Options:

A.

GET

B.

PUT

C.

POST

D.

HEAD

Buy Now
Questions 20

Your implementation has the following characteristics

1 There are multiple API Products

2 Some API proxies are part of more than one API Product.

3 Quotas are configured at the API Product level

4 In the Quota policy the count, time interval and unit is referenced using Verify API Key flow variables at runtime.

5 A single Quota policy is reused across all the products 6. Each app is assigned to exactly one product.

You need to limit the number of requests during weekends for specific products without modifying this design What should you do?

Options:

A.

Add custom attributes for counts for every product. Create custom quota policies for every product which references these custom attributes

B.

Set custom attributes for weekday and weekend count at every product Reference these How variables in the count property of Quota policy at runtime

C.

Add custom attributes at the API Product with counts to use for weekdays and weekends. Using flow variables, reference the custom counts in the Quota policy

D.

Add custom attributes for count at Product level Use a JS Policy to determine which count to use in Quota policy at runtime Use this count attribute in the Quota Policy.

Buy Now
Questions 21

Which approaches can be used for extracting data from a SOAP body and returning it as a JSON response in Apigee Edge? Select all that are correct.

Choose 3 answers

Options:

A.

Use XSLT to transform the XML payload and then use a XML to JSON policy

B.

Use XML to JSON policy first to convert to JSON and then ExtractVariables with a JSONPath to extract the body from the converted SOAP envelope

C.

Use ExtractVariables with an XPath first to extract the SOAP body and then use XML to JSON policy

D.

Use an AssignMessage policy to convert the SOAP response to a JSON response, using XPath expressions to retrieve the data

Buy Now
Questions 22

As an API Engineer your team has had issues with security vulnerabilities and poor coding practices in the past. You would like to improve your team ' s reputation within the organization. What step could take to improve your process?

Options:

A.

Add smoke tests to your CI/CD process

B.

Add code quality analysis into your CI/CD process.

C.

Ask the developers to run unit tests prior to code check-in.

D.

Ask the developers to run anti-virus against the code prior to check in.

Buy Now
Questions 23

You are implementing several flows in Apigee Edge and realize that there is common functionality used across many different APIs and flows You want to use Apigee Edge to minimize the number of releases What should you do?

Options:

A.

Use a Shared Flow and a Flow Callout where needed.

B.

Use Proxy Chaining and a Service Callout where needed

C.

Use a template build process to compose flows from flow fragments.

D.

Use a Shared Flow and Flow Hooks to enforce all APIs call the shared flow

Buy Now
Questions 24

Which HTTP method would NOT be used for CRUD operations?

Options:

A.

GET

B.

POST

C.

OPTIONS

D.

PUT

Buy Now
Questions 25

The product team is rolling out a new reseller program with API ' s. The product owner has created Epics covering the high level requirements. The product owner delegate has asked for help creating a product backlog. What task would the product owner delegate need assistance with?

Options:

A.

Creation of a message logging policy in Apigee.

B.

Creating user stories to fulfill the business requirements.

C.

Creating support tickets that cover each of the business requirements.

D.

Creating a cross functional team of API engineers, business analysts, and backend software developers.

Buy Now
Questions 26

Which are NOT a step in the OAuth 2 0 authorization code grant process? Select all that are correct

Options:

A.

generate an authorization code

B.

generate an access token

C.

verify the device ID

D.

validate the client API key

E.

obtain the end user ' s consent for the application to request the user ' s protected resources

F.

validate the developer name

Buy Now
Questions 27

Which features are supported in the OAuthV2 policy? Choose 3 answers

Options:

A.

Storing of external access tokens

B.

Setting custom attributes for generated access tokens

C.

Credentials validation when password grant_type is used

D.

Setting different expiration for refresh and access tokens

Buy Now
Questions 28

You need to restrict write access to those applications that have been specifically delegated that authority by end users Your project is already using OAuth2 for user and app authentication What should you do?

Options:

A.

Create a different URL for updates

B.

Implement user rights checks in the underlying microservice

C.

Use an OAuth2 scope to identify allowed applications and user granted rights

D.

Retrieve user rights from a database by inspecting the user id bound to the OAuth2 token

Buy Now
Questions 29

A cloud customer wants to safeguard their APIs against a sudden increase in traffic. You need to calculate an allowable traffic rate of 100 transactions per second (TPS) What should you do?

Options:

A.

Use a default Spike Arrest policy setting the limit to 100 TPS

B.

Use a Quota enforcement policy set to limit throughput to 100 TPS

C.

Use a Spike Arrest policy setting the UseEffectiveCount parameter

D.

Keep a count of accesses in the back-end, rejecting queries when they exceed 100 TPS

Buy Now
Questions 30

As an API Engineer your team would like to make sure you are simulating a user experience prior to a deployment in a production environment. Which tests should be ran to closely resemble a consumer interaction with a APIs?

Options:

A.

Unit tests

B.

Smoke tests.

C.

Integration tests

D.

Code quality analysis

Buy Now
Questions 31

You are designing an API that allows a consumer to fetch all orders associated to a given customer. You want to use a RESTful design Which design should you use?

Options:

A.

GET/customers/{customer-id)/orders

B.

GET/orders7customer-id={customer-id}

C.

GET /getOrdersForCustomer?customer-id={customer-id}

D.

POST /orders with a post-body of customer-id={customer-id}

Buy Now
Questions 32

As an Apigee API Engineer you attend a meeting where a Product Owner would like to release a new feature to customers. There are several teams in the meeting, Backend API team, Apigee API team, and the Security team. The feature will be exposed through the companies external facing website. The architecture allows the website to call the backend APIs directly. The security team raises a concern about the backend APIs being wide open to anyone inside the network, not just the external website. You are later contacted and asked for your teams impacts. How should you reply?

Options:

A.

You should recommend an Apigee Edge Access Control policy

B.

You should recommend that the backend API ' s use TLS v12 to secure their APIs.

C.

You should recommend the use of custom secure headers with time stamp verification

D.

You should recommend a design change that uses a Apigee microgateway in front of the backend APIs.

Buy Now
Questions 33

You are adding a filter on an API to locate all orders in a specific date range You want to use a RESTful design Which design should you use?

Options:

A.

GET/getOrdersBetweenDates/2016-01-01/2016-02-01

B.

GET/orders ' ?from-date=2016-01-01 & to-date=2016-02-01

C.

GET /customers/{customer-id}/orders ' ?from-date=2016-01-01 & to-date^2016-02-01

D.

POST /searchorders with a post-body of from-date-2016-01-01 & to-date=2016-02-01

Buy Now
Questions 34

How can we specrfy the type of Security (basic auth, oauth) used by the API in OpenAPI Specification 2.0?

Options:

A.

specify using the secuntyDefinrtions name property

B.

specify using the secuntySchemas name property

C.

specify using the security Variables name properly

D.

specify using the securityParams name property

Buy Now
Questions 35

Which policy is best used to convert a SOAP response to a JSON response ' ?

Options:

A.

AssignMessage

B.

Message Validation

C.

SOAPToJSON

D.

XMLToJSON

Buy Now
Questions 36

Which is a benefit of 2-way TLS (mutual TLS) for target endpoint connections?

Options:

A.

Sensitive data presented to end users will be encrypted

B.

Certificates can be used to verify the identity of both Apigee Edge and the target endpoint

C.

End users can use the name of the system to verify that they are connecting to a trusted system.

D.

All of the above

Buy Now
Questions 37

Which will allow me to set the number of maximum elements to be cached in memory in a particular cache resource?

Options:

A.

Specify in PopulateCache policy

B.

Specify number of Max Elements In Memory on the Cache Resource definition

C.

Specify max size in KB in Cache Resource definition

D.

It cannot be configured as Apigee manages it internally.

Buy Now
Exam Code: Apigee-API-Engineer
Exam Name: Google Cloud - Apigee Certified API Engineer
Last Update: Apr 30, 2026
Questions: 126

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now Apigee-API-Engineer testing engine

PDF (Q&A)

$43.57  $124.49
buy now Apigee-API-Engineer pdf