How many times can an authorization code be used to obtain an access token?

How many times can an authorization code be used to obtain an access token?A . 1B . 2C . 5D . Unlimited until it expiresE . Unlimited as long as requests come within specified time of authorization code creationView AnswerAnswer: A

December 31, 2020 No Comments READ MORE +

Which HTTP method would NOT be used for CRUD operations?

Which HTTP method would NOT be used for CRUD operations?A . GETB . POSTC . OPTIONSD . PUTView AnswerAnswer: C

December 31, 2020 No Comments READ MORE +

Which two of the above-listed requirements could be satisfied by this action?

Your team has the following requirements in building an API: • Adhere to Pragmatic REST. • Model the API to the consumption use case. • Require API Key authentication • Implement CORS • Validate inputs. You have begun migrating a SOAP-based web service to a REST API by using the...

December 31, 2020 No Comments READ MORE +

What two actions should you take?

Your APIs are configured as a relying party on an OpenID Connect platform. You need to inspect and verify the OpenID Connect identity. What two actions should you take? Choose 2 answersA . Verify the signature of the JWT using a shared secret.B . Parse the JWT to extract the...

December 30, 2020 No Comments READ MORE +

Which identifies a set of Apigee policies that, when used together, could be used to implement this?

In an API Proxy flow we need to orchestrate two XML services - Service A and Service B Data fields from each response must be returned in the response to the client. Which identifies a set of Apigee policies that, when used together, could be used to implement this?A ....

December 30, 2020 No Comments READ MORE +

Which identifies a set of Apigee policies that, when used together, could be used to implement this?

In an API Proxy flow we need to orchestrate two XML services - Service A and Service B Data fields from each response must be returned in the response to the client. Which identifies a set of Apigee policies that, when used together, could be used to implement this?A ....

December 29, 2020 No Comments READ MORE +

What minimum steps are required to reconfigure 2-way TLS?

As an API Engineer you are approached late in the day with an emergency request to configure a 2 way TLS connection between Apigee and the backend server. All existing certificates have been revoked. The security team provides you the PEM file for the backend server and your new Apigee...

December 28, 2020 No Comments READ MORE +

What is the best way to quickly verify a complete deployment?

As an API Engineer your team is deploying code to production tonight. The test team will spend most of the night ensuring there are no bugs in the new release. After you deploy you want to go home. What is the best way to quickly verify a complete deployment?A ....

December 28, 2020 No Comments READ MORE +

When is it appropriate to use query parameters in RESTful API design? Select all that are correct

When is it appropriate to use query parameters in RESTful API design? Select all that are correctA . When passing username and passwords.B . When providing the ability to return different levels of detail in the response.C . When requesting that an entire collection be deleted.D . When filtering the...

December 28, 2020 No Comments READ MORE +

When retrieving a value from an encrypted KVM. the variable name to which it is assigned must be prefixed with which value to prevent it from being readable in tracing sessions?

When retrieving a value from an encrypted KVM. the variable name to which it is assigned must be prefixed with which value to prevent it from being readable in tracing sessions?A . encryptedB . maskC . kvmD . privateE . hiddenView AnswerAnswer: C

December 27, 2020 No Comments READ MORE +