Which proxy endpoint configuration determines the target endpoint that will be used?
A.
Step
B.
TargetConfiguration
C.
RouteRule
D.
Connection
E.
Path
Path
Which is a benefit of three-legged OAuth (authonzation_code grant)'?
A.
authorization codes can be used multiple times to obtain access tokens
B.
allows another individual to access a user's private data
C.
provides access to user-specific resources without exposing end-user credentials to the client application
D.
provides end-user credentials to requesting app
provides end-user credentials to requesting app
Which of the following statements are true for the out-of-the-box Apigee Edge Analytics Dashboard? Select all that apply Choose 3 answers
A.
Visualize API proxy error metrics
B.
Visualize API traffic metrics
C.
Visualize Developer Engagement metrics
D.
Visualize API Deployment metrics
E.
Visualize Management API traffic metrics
Visualize API proxy error metrics
Visualize API Deployment metrics
Visualize Management API traffic metrics
You have a new set of requirements for a mobile app. The product team has asked for the following.
• The app requires access to customer order information
• The app needs to allow a search function for orders by product name
Choose two development tasks that would accomplish the requirements. Choose 2 answers
A.
Create a new API proxy for a GET /v1/customers/{customerid}/orders
B.
Create a new API proxy for a GET /v1/customers/{customerid}/products/{productname}
C.
The design should include a new custom header X-Product-Name
D.
The Apigee proxy should allow a query parameter for q=
E.
The Apigee proxy should allow a query parameter for orderld=
The Apigee proxy should allow a query parameter for q=
The Apigee proxy should allow a query parameter for orderld=
How can we specrfy the type of Security (basic auth, oauth) used by the API in OpenAPI Specification 2.0?
A.
specify using the secuntyDefinrtions name property
B.
specify using the secuntySchemas name property
C.
specify using the security Variables name properly
D.
specify using the securityParams name property
specify using the security Variables name properly
Page 4 out of 25 Pages |
Previous |