Google Apigee API Engineer Google Cloud – Apigee Certified API Engineer Online Training
Google Apigee API Engineer Online Training
The questions for Apigee API Engineer were last updated at Feb 10,2025.
- Exam Code: Apigee API Engineer
- Exam Name: Google Cloud - Apigee Certified API Engineer
- Certification Provider: Google
- Latest update: Feb 10,2025
You are using Apigee Edge as the OAuth Resource Server. The product owner asks you to create an API that logs a user out by revoking OAuth tokens.
What should you do?
- A . Use the InvalidateToken operation with cascade=true
- B . Use the InvalidateToken operation with cascade=false
- C . Store a list of revoked tokens in Firebase. On each access, check the list and only allow unrevoked tokens through
- D . Store a list of revoked tokens in Key-Value Maps. On each access, check the list and only allow unrevoked tokens through
When retrieving a value from an encrypted KVM. the variable name to which it is assigned must be prefixed with which value to prevent it from being readable in tracing sessions?
- A . encrypted
- B . mask
- C . kvm
- D . private
- E . hidden
Which Edge Microgateway plugin does not need to be explicitly added to the plugin sequence attribute configuration for execution?
- A . analytics
- B . oauth
- C . quota
- D . spike arrest
Which approaches can be used for extracting data from a SOAP body and returning it as a JSON response in Apigee Edge? Select all that are correct. Choose 3 answers
- A . Use XSLT to transform the XML payload and then use a XML to JSON policy
- B . Use XML to JSON policy first to convert to JSON and then ExtractVariables with a JSONPath to extract the body from the converted SOAP envelope
- C . Use ExtractVariables with an XPath first to extract the SOAP body and then use XML to JSON policy
- D . Use an AssignMessage policy to convert the SOAP response to a JSON response, using XPath expressions to retrieve the data
How can we specrfy the type of Security (basic auth, oauth) used by the API in OpenAPI Specification 2.0?
- A . specify using the secuntyDefinrtions name property
- B . specify using the secuntySchemas name property
- C . specify using the security Variables name properly
- D . specify using the securityParams name property
You need to log certain data to a custom logging service while processing the response You want to avoid processing delays due to logging during the logic flow.
What should you do?
- A . Use a Node.JS target to implement a nonblocking call.
- B . Attach a Message Logging policy to the Post Client Flow
- C . Implement a Java Extension Callout with a worker thread
- D . Use an asynchronous Service Callout policy in your proxy (low as soon as you have enough data to log
As an API Engineer you are approached late in the day with an emergency request to configure a 2 way TLS connection between Apigee and the backend server. All existing certificates have been revoked. The security team provides you the PEM file for the backend server and your new Apigee TLS certificate.
What minimum steps are required to reconfigure 2-way TLS? Choose 2 answers
- A . Add your Apigee TLS certificate to the key store.
- B . Add the backend servers PEM file to the key store.
- C . Add the backend certificate chain to the trust store
- D . Add the backend servers PEM file to the trust store.
- E . Use the KVM to store the contents of the PEM file.
- F . Use the Access Control Policy to reference the PEM file
When using a Shared Flow from a Flow Hook, which proxies will call the Shared Flow?
- A . All proxies in the environment where the Flow Hook is configured
- B . Only proxies that contain a Flow Callout policy
- C . All proxies within an Organization
- D . Only proxies with the Flow Hook checkbox checked
Which are NOT a step in the OAuth 2 0 authorization code grant process? Select all that are correct
- A . generate an authorization code
- B . generate an access token
- C . verify the device ID
- D . validate the client API key
- E . obtain the end user’s consent for the application to request the user’s protected resources
- F . validate the developer name
Which protocols are supported by the Message Logging policy? Select all that are correct
- A . FTP
- B . HTTP
- C . SCP
- D . TCP
- E . UDP