Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

APIGEE

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
When creating an API product, what built-in access levels are available?   show
🗑
Your new proxies are designed to offer valuable information to a range of apps, but you also want to make it possible for industry partners to contribute to that information. What do you do?   show
🗑
show A VerifyAPIKey policy.  
🗑
In keeping with RESTful design principals, after a successful POST call, which response code should be returned?   show
🗑
show /**  
🗑
Which of the following are true statements regarding Apigee Edge Microgateway?   show
🗑
Which hash objects does the crypto object reference support in the JavaScript policy?   show
🗑
What best describes Apigee Edge Microgateway?   show
🗑
show 1. Set different quotas at the product level. 2. Add a Quota policy to the flow that references the product configuration.  
🗑
show Use a ConcurrentRateLimit policy.  
🗑
show <Condition>(verifyapikey.TargetKey.apiproduct.target = "consumer")</Condition>  
🗑
Your team has developed a series of policies to handle logging and want to apply the same configuration to all of them. What's the best approach?   show
🗑
Which of the following should you keep in mind when choosing naming conventions for your data model?   show
🗑
show 1. Links to any associated apps 2. A Status toggle for switching the developer from Active to Inactive  
🗑
show OAuthV2 policy via its scoping capabilities  
🗑
show The consumption model, also known as the outside-in model, is API design from the developer's perspective and is considered to be the best practice.  
🗑
show 1. Flows are sequential stages along the API processing path. 2. Flows are used to control what happens and when.  
🗑
When releasing a new version, what are the best practices for handling the old version?   show
🗑
Where should the ConcurrentRateLimit policy be added, when incorporating the policy in API?   show
🗑
show In the Phase Details area.  
🗑
How do you add a custom object to an OpenAPI specification?   show
🗑
show Organization Administrator  
🗑
show 1. Message Weight 2. Identifier  
🗑
Which of the following HTTP verbs are supported by the KeyValueMap Operations policy?   show
🗑
Your team has added the requirement of an outbound SSL. Where do you configure this?   show
🗑
Name an Apigee feature that can both host and version your API documentation   show
🗑
In Apigee's pre-defined roles, which one is responsible for creating API proxies and running them in the test environment, but cannot deploy them?   show
🗑
Your back-end service needs to inspect validated third-party JSON Web Token and execute conditions based on those claims. Which policies would be used to accomplish this?   show
🗑
show <HTTPTargetConnection> in the default Target Endpoint.  
🗑
Flow hooks can be deployed to which of the following points in the Apigee flow?   show
🗑
show Add a ResponseCache policy.  
🗑
When discussing "users" in regards to role-based access control, to whom are we referring?   show
🗑
When creating a Reverse proxy, what are your options regarding an OpenAPI specification?   show
🗑
show <SpikeArrest> <Rate>12pm</Rate> </SpikeArrest> The rate here is per second, so the smoothing formula in this case would result in 1000 / 5 and equal to one click every 200 milliseconds. Video for reference: Handling Traffic Spikes When the time unit is minutes, the SpikeArrest policy smooths according to the formula 60 / Rate and here, 60 / 12 = 5.  
🗑
What's the most efficient way to display an error message if a particular condition is met with a request to your API?   show
🗑
show Apply the BasicAuthentication policy.  
🗑
In addition to validating SOAP messages against WSDL definitions, what else can the SOAPMessageValidation policy do?   show
🗑
show PUT is used for updating existing entries and will not delete the entry.  
🗑
Your company is working on new functionality for your API proxy that requires the ID of the developer and the app accessing the API product. Which Apigee policy would be best to use?   show
🗑
Your organization is anticipating a major influx of traffic during their upcoming Cyber Monday sale. They think they are prepared but don't want to risk the server being overwhelmed. Which of these policies should be implemented?   show
🗑
show Use the InvalidateToken operation with the Token properties type=accesstoken cascade=true  
🗑
Your API proxy has four fault rules in the <ProxyEndpoint> section. During one test, the conditions are such that the first, second, and third rules all evaluate to true. Which rule is executed?   show
🗑
The directive has come down from leadership that traffic to the API should be held to under 200 TPS. How do you manage this?   show
🗑
What key Apigee feature allows it to gather a full range of analytical data?   show
🗑
show One StatisticsCollector policy is placed in the request flow and another in a fault handler.  
🗑
You've noticed some issues with the back-end service and want to review the frequency of generated errors. What do you do?   show
🗑
show The shared-pom.xml file contains the profiles for the desired Apigee environments as well as information about the Maven plugins to be used. The edge.json file is the primary configuration file for the API proxy.  
🗑
show 1. Request Processing Latency 2. Response Processing Latency  
🗑
Which of the following is true regarding the PostClientFlow?   show
🗑
show Include route rules for each target endpoint.  
🗑
show GET /directors/{DIRECTOR_ID}/films. In a RESTful design, it's best to follow a collection with a identifying resource; this option uses two consecutives collections.  
🗑
In an Apigee UI development lifecycle strategy, where does the lifecycle begin?   show
🗑
show The combination of simultaneous development in the Apigee Edge UI and with offline developers.  
🗑
Which of the following are advantages of Apigee unit testing?   show
🗑
show Confirm that the Content-Type header is set to application/json.  
🗑
Which of the following policies should undergo unit testing?   show
🗑
What is the key difference in the local/UI development and early testing SDLC strategy?   show
🗑
Where does the MessageLogging policy store its custom messages for Apigee Edge Cloud?   show
🗑
You have a back-end API that is authorized by a machine user credential, and each API call must use unique credentials at runtime. How should you store these user credentials securely?   show
🗑
show Integrated custom code  
🗑
show The servers section.  
🗑
show The request is sent to the fault handler.  
🗑
In Trace, which aspects of a request can be filtered?   show
🗑
show Add a RaiseFault policy to the Proxy Endpoint Request Preflow.  
🗑
Your organization needs to incorporate stored sensitive data while processing your API proxy. How can you ensure that this data is kept private during testing?   show
🗑
show The resource owner password grant type. The authorization code grant type is intended for apps that are written by third-party developers who do not have a trusted business relationship with the API provider. The resource owner password grant type is used for highly trusted apps, such as those in-house.  
🗑
show Conditional Flow  
🗑
Which of the following statements about API versions are true?   show
🗑
What is the standard technique for including pagination in API requests?   show
🗑
Which of the following correctly directs the rate in a Quota policy to be pulled from the product-level setting where the VerifyAPIKey policy is named Verify-API-Key?   show
🗑
show /v1/la-courses/  
🗑
To which Apigee entities can custom attributes be added through the Apigee Edge UI?   show
🗑
Your team is in a highly competitive market where the back-end services are constantly updating and it's vital that API response be handled as quickly as possible. As an Apigee API engineer, what solution should you suggest?   show
🗑
show None. A custom role should be created for them  
🗑
show 1. <TargetEndPoint> 2. <ProxyEndPoint>  
🗑
show 1. SCP 2. FTP  
🗑
show 1. TCP 2. UDP  
🗑
show Add a FlowCallout policy to either the ProxyEndpoint Preflow or the TargetEndpoint Postflow.  
🗑
Your API is about to release into production and you want to ensure that everything deployed properly. What kind of tests should you run?   show
🗑
show The Target Request flow.  
🗑
show After the developer has triggered automated testing.  
🗑
You've been asked to set up a procedure to track a specific response string and capture the data for analysis. Which policies are best to use?   show
🗑
What step do you have to take before running a static code analysis of your API proxy?   show
🗑
How would you change the path of a ServiceCallout policy programmatically?   show
🗑
You'd want to present a helpful message whenever a problem arises with your API proxy. To this end, you've created numerous fault rules for every conceivable issue. What else could you do?   show
🗑
Your team lead has noticed through one of the Analytics dashboards that one of your APIs is experiencing an unusual decrease in performance. You've been asked to debug the problem. What should you do?   show
🗑
In the AccessContol policy, which of the following code blocks would allow access to the IP address 10.10.10.20?   show
🗑
Which of the following statements about API revisions are true?   show
🗑
What code would you use to get the value of a query parameter zip using a JavaScript policy?   show
🗑
show Virtual host  
🗑
show 1. The developer can raise an error by setting a condition that is triggered. 2. Apigee can raise the error during a policy execution or other problem.  
🗑
show In any flow or code that executes after the ExtractVariables policy.  
🗑
You've been asked to integrate functionality that verifies an incoming XML message against a specific XSD schema. Which Apigee policy should you use?   show
🗑
What's the best flow to use if you need to make sure that something happens before anything else?   show
🗑
show A resource has zero or more sub-resources, and a collection is a list of resources of the same type.  
🗑
You are developing a custom analytics report which needs to filter data from the request payload. Which policy should be implemented to retrieve the necessary data?   show
🗑
Which policy is capable of authenticating SAML assertions attached to inbound SOAP requests?   show
🗑
show 1. JSON 2. HTML 3. Terminal table  
🗑
What process is used for exporting an Apigee API proxy?   show
🗑
show Integration tests  
🗑
show 1. Ensures consistency. 2. Improves overall code quality. 3. Speeds development.  
🗑
What is the key distinguishing characteristic of the hybrid development SDLC strategy?   show
🗑
show Run apigeelint on all code updates.  
🗑
show 1. To view resources. 2. To target specific resources. 3. To update resources.  
🗑
Your company is bringing on-board a new Operations Administrator to work on a new API proxy. Management wants to restrict the new hire's access to just the new proxy. What is the most efficient way this should be handled?   show
🗑
show $ref: '#/components/parameters/q'  
🗑
You've been asked to adjust the network timeout values of the <HTTPTargetConnection> element. Which properties do you modify?   show
🗑
show 1. StatusCode 2. ReasonPhrase 3. Payload The StatusCode rather than the error code is returned. The <FaultResponse> within a fault rule typically sets the payload, status code, and reason phrase. It can also set a header.  
🗑
show PostClientFlow. The PostClientFlow, not the Response ProxyEndpoint Postflow, is the best flow to use for logging messages. Coming after the request and response have completed the circuit of flows, the PostClientFlow is the best flow to use for logging messages.  
🗑
show Set up a TargetServer. TargetServers decouples the concrete endpoint URLs from TargetEndpoint configurations so you can modify the variable according to the environment.  
🗑
In the OpenAPI specification, what is the object used to define authentication and related issues?   show
🗑
show Both types of entities are supported. The SAMLAssertion policy allows the API platform to act as both an identity provider and a security provider  
🗑
show 1.Message Weight 2. Identifier 3. Rate  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: CapMax
Popular Computers sets