Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Apigee-API-Engineer PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

Apigee-API-Engineer PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Google Cloud - Apigee Certified API Engineer
  • Last Update: May 5, 2024
  • Questions and Answers: 126
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

Apigee-API-Engineer Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

Apigee-API-Engineer Practice Exam Questions with Answers Google Cloud - Apigee Certified API Engineer Certification

Question # 6

When a quota is configured with the distributed flag set to false, the number of which of the following would affect the overall allowed traffic?

A.

Cassandra nodes

B.

Routers

C.

Message Processors

D.

Management Servers

Full Access
Question # 7

Which HTTP method would NOT be used for CRUD operations?

A.

GET

B.

POST

C.

OPTIONS

D.

PUT

Full Access
Question # 8

As an API Engineer you are approached late in the day with an emergency request to configure a 2 way TLS connection between Apigee and the backend server. All existing certificates have been revoked. The security team provides you the PEM file for the backend server and your new Apigee TLS certificate. What minimum steps are required to reconfigure 2-way TLS?

Choose 2 answers

A.

Add your Apigee TLS certificate to the key store.

B.

Add the backend servers PEM file to the key store.

C.

Add the backend certificate chain to the trust store

D.

Add the backend servers PEM file to the trust store.

E.

Use the KVM to store the contents of the PEM file.

F.

Use the Access Control Policy to reference the PEM file

Full Access
Question # 9

You are asked by the mobile app team which API should be used to populate a drop down for regions. According to pragmatic RESTful practices, which method should be used?

A.

GET

B.

HEAD

C.

POST

D.

PUT

E.

OPTIONS

Full Access
Question # 10

You are working on a new design for an API. The backend API will set the customer to a deleted status. The customer will remain in the backend database for later cleanup. The customer can no longer be retrieved by the API once the status is set. Which method should be used at the Apigee proxy to set the deleted status?

A.

GET

B.

PUT

C.

POST

D.

DELETE

E.

OPTIONS

Full Access
Question # 11

Your implementation has the following characteristics

1 There are multiple API Products

2 Some API proxies are part of more than one API Product.

3 Quotas are configured at the API Product level

4 In the Quota policy the count, time interval and unit is referenced using Verify API Key flow variables at runtime.

5 A single Quota policy is reused across all the products 6. Each app is assigned to exactly one product.

You need to limit the number of requests during weekends for specific products without modifying this design What should you do?

A.

Add custom attributes for counts for every product. Create custom quota policies for every product which references these custom attributes

B.

Set custom attributes for weekday and weekend count at every product Reference these How variables in the count property of Quota policy at runtime

C.

Add custom attributes at the API Product with counts to use for weekdays and weekends. Using flow variables, reference the custom counts in the Quota policy

D.

Add custom attributes for count at Product level Use a JS Policy to determine which count to use in Quota policy at runtime Use this count attribute in the Quota Policy.

Full Access
Question # 12

You have a particularly complicated API proxy in Edge., that uses many variables and conditions You are concerned that the number ot names is quite large, and can become confusing What can you do?

A.

Use the period "." to namespace variables.

B.

Create a data dictionary describing all the variables

C.

Use camelCase variable names instead of snake_case

D.

Break the proxy into smaller components using proxy chaining

Full Access
Question # 13

Which use case best fits the authorization code grant type?

A.

The client app is also the resource owner.

B.

The client app was developed internally and is highly trusted

C.

The client app was developed by an untrusted third party

D.

The client app runs on the end user's browser

Full Access
Question # 14

Which plugins are not enabled as part of the default Edge Microgateway installation? Choose 2 answers

A.

analytics

B.

oauth

C.

quota

D.

spike arrest

Full Access
Question # 15

Which policy can be used to see if a SOAP request matches a provided WSDL?

A.

XMLValidation

B.

MessageValidation

C.

XMLThreatProtection

D.

AccessControl

Full Access
Question # 16

Where can you use a Flow Callout policy? Select all that apply.

Choose 2 answers

A.

Anywhere in a ProxyEndpoint or TargetEndpoint except PostClientFlow

B.

In a Shared Flow

C.

Only in the Flow phase of ProxyEndpoint or TargetEndpoint

D.

Anywhere except another Shared Flow

E.

Only in ProxyEndpoint PreFlow or TargetEndpoint PostFlow

Full Access
Question # 17

You are adding a filter on an API to locate all orders in a specific date range You want to use a RESTful design Which design should you use?

A.

GET/getOrdersBetweenDates/2016-01-01/2016-02-01

B.

GET/orders'?from-date=2016-01-01&to-date=2016-02-01

C.

GET /customers/{customer-id}/orders'?from-date=2016-01-01&to-date^2016-02-01

D.

POST /searchorders with a post-body of from-date-2016-01-01&to-date=2016-02-01

Full Access
Question # 18

Which describe OAuth 2.0 Refresh Tokens'? Select all that are correct

A.

can be used to generate or renew access tokens

B.

is always issued with every access token

C.

can be used to reset crederfflals

D.

may be reused multiple times to create new access tokens

Full Access