The product owner has asked you for a new API. This new API will change a configuration for a backend system. The use case calls for a single API. Which verb should you use?
A. GET
B. PUT
C. POST
D. HEAD
What is the order in which RouteRules are evaluated when many are present?
A. no order, random
B. alphabetical by name
C. bottom to top as configured in the ProxyEndpoint
D. bottom to top as configured in the TargetEndpoint
E. top to bottom as configured in the ProxyEndpoint
Which describe the ResponseCache' policy in Apigee Edge? Select all that are correct
A. Helps to reduce the response latency
B. Caches both the request and the response
C. Helps to reduce the amount of load to the target system.
D. Should be attached to both Request and Response Flow
Which approaches can be used for extracting data from a SOAP body and returning it as a JSON response in Apigee Edge? Select all that are correct. Choose 3 answers
A. Use XSLT to transform the XML payload and then use a XML to JSON policy
B. Use XML to JSON policy first to convert to JSON and then ExtractVariables with a JSONPath to extract the body from the converted SOAP envelope
C. Use ExtractVariables with an XPath first to extract the SOAP body and then use XML to JSON policy
D. Use an AssignMessage policy to convert the SOAP response to a JSON response, using XPath expressions to retrieve the data
If a custom analytics report needs to filter based on data from the request payload, which policy would be used?
A. Custom Report
B. Message Logging
C. StatisticsCollector
D. AssignMessage
Which is true about PostClientFlow?
A. PostClientFlow will only be executed if a payload is returned.
B. The response is blocked until! the PostClientFlow policies are executed.
C. PostClientFlow can only include MessageLogging policies.
D. PostClientFlow can include any supported policy.
You are composing logs created from user input that contains confidential user information You need to record the presence of all fields, while ensuring that confidential information is not recorded in any log Which approach should you take?
A. Use a data masking configuration to hide sensitive data from logs
B. Use conditions to skip logging for data that might contain confidential information.
C. Work with the administrators of the log aggregators to mask confidential data contents.
D. Sanitize all data on entry using regular expressions that search for confidential data formats.
When implementing a node js application in Edge, what is the only supported configuration for running the application?
A. ScriptTarget in a ServiceCallout policy
B. ScriptTarget in a TargetEndpotnt
C. NodeApp policy
D. ResourceURL in a Javascript policy
An API product in Apigee can be used to
A. restrict access to a set of APIs
B. configure the quota limits for APIs
C. restrict access to APIs in different environments
D. all of the above
An API product in Apigee can be used to
A. restrict access to a set of APIs
B. configure the quota limits for APIs
C. restrict access to APIs in different environments
D. all of the above
As an API Engineer you get a calendar invite for a backlog grooming session. What should you expect to take place in the meeting?
A. Review the Epics and meet the cross functional team
B. Review and update the user stories and tasks in detail.
C. Review the high level design document and ask questions
D. Update support tickets that have been sitting for x number of days
Which policies can be used to create or modify a request message for a service callout? Select all that are correct
A. ServiceCallout
B. AssignMessage
C. RequestMessage
D. Message Validation
Your client's Apigee Edge configuration uses Local Target Proxy Chaining with proxies that have monthly quotas The client has noticed that quotas are being exceeded more quickly than expected What should you do?
A. Switch to daily quotas.
B. Disable quota evaluation for chained proxies.
C. Increase quota levels in API Product settings
D. Use Analytics reports to balance proxy queries
You are working with the product owners and uncover an opportunity for new functionality. The product owners ask you to quickly outline the desired functionality. Which approach should you use?
A. Use a business requirements document.
B. Use a behavior driven development "given-when-then" script to outline the main steps
C. Implement a proof of concept
D. Implement a suite of unit test cases that qualify a working API
Which HTTP method would NOT be used for CRUD operations?
A. GET
B. POST
C. OPTIONS
D. PUT