Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Your client's Apigee Edge configuration uses Local Target Proxy Chaining with proxies that have monthly quotas The client has noticed that quotas are being exceeded more quickly than expected What should you do?

A.

Switch to daily quotas.

B.

Disable quota evaluation for chained proxies.

C.

Increase quota levels in API Product settings

D.

Use Analytics reports to balance proxy queries

Full Access
Question # 5

Use a Key Value Map when you need to store

A.

a value that expires after 300 seconds

B.

OAuth tokens for backend service calls

C.

configuration values

D.

an HTTP response

Full Access
Question # 6

Your implementation has the following characteristics

1 There are multiple API Products

2 Some API proxies are part of more than one API Product.

3 Quotas are configured at the API Product level

4 In the Quota policy the count, time interval and unit is referenced using Verify API Key flow variables at runtime.

5 A single Quota policy is reused across all the products 6. Each app is assigned to exactly one product.

You need to limit the number of requests during weekends for specific products without modifying this design What should you do?

A.

Add custom attributes for counts for every product. Create custom quota policies for every product which references these custom attributes

B.

Set custom attributes for weekday and weekend count at every product Reference these How variables in the count property of Quota policy at runtime

C.

Add custom attributes at the API Product with counts to use for weekdays and weekends. Using flow variables, reference the custom counts in the Quota policy

D.

Add custom attributes for count at Product level Use a JS Policy to determine which count to use in Quota policy at runtime Use this count attribute in the Quota Policy.

Full Access
Question # 7

The backend API team has asked for metrics on the performance of an API. Which two pieces of data should you provide? Choose 2 answers

A.

The internet latency

B.

The network latency

C.

The backend latency

D.

The Apigee proxy latency

E.

The backend database latency

Full Access
Question # 8

You are working on a new design for an API. The backend API will set the customer to a deleted status. The customer will remain in the backend database for later cleanup. The customer can no longer be retrieved by the API once the status is set. Which method should be used at the Apigee proxy to set the deleted status?

A.

GET

B.

PUT

C.

POST

D.

DELETE

E.

OPTIONS

Full Access
Question # 9

Which policies can be used to create or modify a request message for a service callout? Select all that are correct

A.

ServiceCallout

B.

AssignMessage

C.

RequestMessage

D.

Message Validation

Full Access
Question # 10

Which proxy endpoint configuration determines the target endpoint that will be used?

A.

Step

B.

TargetConfiguration

C.

RouteRule

D.

Connection

E.

Path

Full Access
Question # 11

When is it appropriate to use query parameters in RESTful API design? Select all that are correct

A.

When passing username and passwords.

B.

When providing the ability to return different levels of detail in the response.

C.

When requesting that an entire collection be deleted.

D.

When filtering the response based upon a query

Full Access
Question # 12

The AssignMessage policy can be used to

A.

add headers

B.

remove the payload

C.

assign a value to a variable

D.

all of the above

Full Access
Question # 13

While testing your Apigee API proxy, you discover that the TargetEndpomt that is called is not what you expect. You have verified that there is a RouteRule that matches conditions, and should be called. What should you do?

A.

Modify the RouteRuies to be more specific.

B.

Create a new proxy for this special condition.

C.

Reorder the RouteRuies so that your condition is found

D.

Add a new TargetServer to handle your specific condition

Full Access
Question # 14

You need to interact with two different back end systems, depending on inbound request data One backend is a default target URL without SSL and another one is a dynamic target URL with 2-Way SSL What should you do?

A.

Use service callouts configuration for each target, and use a condition to decide which to invoke.

B.

Use a Key-Value Map configuration to access SSL and URL information to invoke target systems

C.

Use an AssignMessage policy to override default target URL and define 2-way SSL configuration at runtime

D.

Create another target endpoint with SSL configured and define route rule to pick that depends on available variables.

Full Access
Question # 15

Which approaches can be used for extracting data from a SOAP body and returning it as a JSON response in Apigee Edge? Select all that are correct.

Choose 3 answers

A.

Use XSLT to transform the XML payload and then use a XML to JSON policy

B.

Use XML to JSON policy first to convert to JSON and then ExtractVariables with a JSONPath to extract the body from the converted SOAP envelope

C.

Use ExtractVariables with an XPath first to extract the SOAP body and then use XML to JSON policy

D.

Use an AssignMessage policy to convert the SOAP response to a JSON response, using XPath expressions to retrieve the data

Full Access
Question # 16

As an API Engineer your team has had issues with security vulnerabilities and poor coding practices in the past. You would like to improve your team's reputation within the organization. What step could take to improve your process?

A.

Add smoke tests to your CI/CD process

B.

Add code quality analysis into your CI/CD process.

C.

Ask the developers to run unit tests prior to code check-in.

D.

Ask the developers to run anti-virus against the code prior to check in.

Full Access
Question # 17

Which of the following properties have type as "required" in the OpenAPI Specification 2.0? Choose 3 answers

A.

Info

B.

host

C.

paths

D.

license

E.

swagger

F.

basePath

G.

produces

Full Access
Question # 18

Which OAuth 2 0 grant requires redirection'?

A.

Authorization Code

B.

Resource Owner Password Credentials

C.

Refresh Token

D.

Client Credentials

Full Access