How many times can an authorization code be used to obtain an access token?
How many times can an authorization code be used to obtain an access token?A . 1B . 2C . 5D . Unlimited until it expiresE . Unlimited as long as requests come within specified time of authorization code creationView AnswerAnswer: A
Which HTTP method would NOT be used for CRUD operations?
Which HTTP method would NOT be used for CRUD operations?A . GETB . POSTC . OPTIONSD . PUTView AnswerAnswer: C
Which two of the above-listed requirements could be satisfied by this action?
Your team has the following requirements in building an API: • Adhere to Pragmatic REST. • Model the API to the consumption use case. • Require API Key authentication • Implement CORS • Validate inputs. You have begun migrating a SOAP-based web service to a REST API by using the...
What two actions should you take?
Your APIs are configured as a relying party on an OpenID Connect platform. You need to inspect and verify the OpenID Connect identity. What two actions should you take? Choose 2 answersA . Verify the signature of the JWT using a shared secret.B . Parse the JWT to extract the...
Which identifies a set of Apigee policies that, when used together, could be used to implement this?
In an API Proxy flow we need to orchestrate two XML services - Service A and Service B Data fields from each response must be returned in the response to the client. Which identifies a set of Apigee policies that, when used together, could be used to implement this?A ....
Which identifies a set of Apigee policies that, when used together, could be used to implement this?
In an API Proxy flow we need to orchestrate two XML services - Service A and Service B Data fields from each response must be returned in the response to the client. Which identifies a set of Apigee policies that, when used together, could be used to implement this?A ....
What minimum steps are required to reconfigure 2-way TLS?
As an API Engineer you are approached late in the day with an emergency request to configure a 2 way TLS connection between Apigee and the backend server. All existing certificates have been revoked. The security team provides you the PEM file for the backend server and your new Apigee...
What is the best way to quickly verify a complete deployment?
As an API Engineer your team is deploying code to production tonight. The test team will spend most of the night ensuring there are no bugs in the new release. After you deploy you want to go home. What is the best way to quickly verify a complete deployment?A ....
When is it appropriate to use query parameters in RESTful API design? Select all that are correct
When is it appropriate to use query parameters in RESTful API design? Select all that are correctA . When passing username and passwords.B . When providing the ability to return different levels of detail in the response.C . When requesting that an entire collection be deleted.D . When filtering the...
When retrieving a value from an encrypted KVM. the variable name to which it is assigned must be prefixed with which value to prevent it from being readable in tracing sessions?
When retrieving a value from an encrypted KVM. the variable name to which it is assigned must be prefixed with which value to prevent it from being readable in tracing sessions?A . encryptedB . maskC . kvmD . privateE . hiddenView AnswerAnswer: C