Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Apigee-API-Engineer Exam Dumps - Google Cloud - Apigee Certified API Engineer

Question # 4

You need to log all error responses in your Apigee Edge proxy What should you do?

A.

Use a JavaScript callout

B.

Use a MessageLog policy in (he DefaultFaulIRule.

C.

Use a conditional MessageLog policy in the PostClientFlow

D.

Use a conditional MessageLog policy as the last item in the Response flow

Full Access
Question # 5

You have a new set of requirements for a mobile app. The product team tells you that the user data already exists from the website version of the app. The user APIs are currently internal access only. The product team has asked for the following.

• The app requires user authentication before data should be accessed.

• The app needs to display user data once the user has logged into the mobile app.

* The app needs to allow changes to user data once the user has logged into the mobile app.

Choose three development tasks that would accomplish the requirements. Choose 3 answers

A.

Create an Oauth 2 0 Service Account API proxy

B.

Create an Oauth 2.0 Password Grant Type API proxy

C.

Create an Oauth 2.0 Client Credential Flow Grant Type API proxy

D.

Create a new API proxy for a GET /v1/customers/{customerid}

E.

Create a new API proxy for a PUT/v1/customers/{customerid}

F.

Create a new API proxy for a POST /v1/customers/{customerid}

G.

Create a new API proxy for a DELETE/v1/customers/{customerid}

Full Access
Question # 6

A cloud customer wants to safeguard their APIs against a sudden increase in traffic. You need to calculate an allowable traffic rate of 100 transactions per second (TPS) What should you do?

A.

Use a default Spike Arrest policy setting the limit to 100 TPS

B.

Use a Quota enforcement policy set to limit throughput to 100 TPS

C.

Use a Spike Arrest policy setting the UseEffectiveCount parameter

D.

Keep a count of accesses in the back-end, rejecting queries when they exceed 100 TPS

Full Access
Question # 7

In an API Proxy flow we need to orchestrate two XML services - Service A and Service B Data fields from each response must be returned in the response to the client. Which identifies a set of Apigee policies that, when used together, could be used to implement this?

A.

AccessEntity,XSL,ExtractVariable

B.

ServiceCallout, ExtractVanable, AssignMessage

C.

XMLToJSON, ExtractVanables, APIKeyValidation

D.

MessageValidation, ServiceCallout, AccessControl

Full Access
Question # 8

You are part of an API team working on a versioning strategy for a new API. Several members of the team disagree on how to indicate the version. According to Apigee recommended practices, what would you recommend to the team?

A.

Use the payload.

B.

Use a header version: vl.

C.

UsetheURI/products/productjd/vl

D.

UsetheURI/v1/products/product id

Full Access
Question # 9

You have a particularly complicated API proxy in Edge., that uses many variables and conditions You are concerned that the number ot names is quite large, and can become confusing What can you do?

A.

Use the period "." to namespace variables.

B.

Create a data dictionary describing all the variables

C.

Use camelCase variable names instead of snake_case

D.

Break the proxy into smaller components using proxy chaining

Full Access
Question # 10

You are designing an API that allows a consumer to fetch all orders associated to a given customer. You want to use a RESTful design Which design should you use?

A.

GET/customers/{customer-id)/orders

B.

GET/orders7customer-id={customer-id}

C.

GET /getOrdersForCustomer?customer-id={customer-id}

D.

POST /orders with a post-body of customer-id={customer-id}

Full Access
Question # 11

A customer has added response cache policy on all their search APIs, but traffic to the backend has not reduced much. They ask you to investigate, you find that GET queries are being cached and available in memory but cache misses are still high You want to improve caching and reduce cache misses What should you do?

A.

Use lookup/populate cache policy.

B.

Increase the TimeToLive of cached objects

C.

Review key fragments in cache key, ensuring only important parameters are used

D.

Review and increase the number of items on the cache resource to a higher number

Full Access
Question # 12

You are generating tokens depending on a partner's service level at runtime You need to control access token expiration What should you do?

A.

Pass access token expiration values as a request query parameter

B.

Add expiration times in product custom attributes for retrieval at run time

C.

Store and fetch access token expiration times from a configuration file to use at run time

D.

Store and fetch expiration value from Key Value Maps at runtime to use for access token creation.

Full Access
Question # 13

If a custom analytics report needs to filter based on data from the request payload, which policy would be used?

A.

Custom Report

B.

Message Logging

C.

StatisticsCollector

D.

AssignMessage

Full Access
Question # 14

As an API Engineer you get a calendar invite for a backlog grooming session. What should you expect to take place in the meeting?

A.

Review the Epics and meet the cross functional team

B.

Review and update the user stories and tasks in detail.

C.

Review the high level design document and ask questions

D.

Update support tickets that have been sitting for x number of days

Full Access
Question # 15

Which proxy endpoint configuration determines the target endpoint that will be used?

A.

Step

B.

TargetConfiguration

C.

RouteRule

D.

Connection

E.

Path

Full Access
Question # 16

Which features are supported in the OAulhV2 policy'? Select all that are correct. Choose 3 answers

A.

setting custom attributes for generated access tokens

B.

storing external access tokens

C.

credentials validation when password grantjype is used

D.

setting different expiration for refresh and access tokens

Full Access
Question # 17

Which is a benefit of three-legged OAuth (authonzation_code grant)'?

A.

authorization codes can be used multiple times to obtain access tokens

B.

allows another individual to access a user's private data

C.

provides access to user-specific resources without exposing end-user credentials to the client application

D.

provides end-user credentials to requesting app

Full Access
Question # 18

Where can you use a Flow Callout policy? Select all that apply.

Choose 2 answers

A.

Anywhere in a ProxyEndpoint or TargetEndpoint except PostClientFlow

B.

In a Shared Flow

C.

Only in the Flow phase of ProxyEndpoint or TargetEndpoint

D.

Anywhere except another Shared Flow

E.

Only in ProxyEndpoint PreFlow or TargetEndpoint PostFlow

Full Access