Which are NOT a step in the OAuth 2 0 authorization code grant process? Select all that are correct
Which feature can be used to limit application consumption to a particular group of API proxy resources?
As an API Engineer your team is deploying code to production tonight. The test team will spend most of the night ensuring there are no bugs in the new release. After you deploy you want to go home. What is the best way to quickly verify a complete deployment?
In Apigee Quota policy, if it is essential that you do NOT allow any API calls over the quota, which configuration option is used?
You are designing an API that allows a consumer to tetch all orders associated to a given customer You want to use a RESTful design Which design should you use?
As an API Engineer you are approached late in the day with an emergency request to configure a 2 way TLS connection between Apigee and the backend server. All existing certificates have been revoked. The security team provides you the PEM file for the backend server and your new Apigee TLS certificate. What minimum steps are required to reconfigure 2-way TLS?
Choose 2 answers
Your implementation has the following characteristics
1 There are multiple API Products
2 Some API proxies are part of more than one API Product.
3 Quotas are configured at the API Product level
4 In the Quota policy the count, time interval and unit is referenced using Verify API Key flow variables at runtime.
5 A single Quota policy is reused across all the products 6. Each app is assigned to exactly one product.
You need to limit the number of requests during weekends for specific products without modifying this design What should you do?
You have a requirement to expose functions and data from an existing back-end system Using Apigee recommended practices, which step should you take first*?
Your client's Apigee Edge configuration uses Local Target Proxy Chaining with proxies that have monthly quotas The client has noticed that quotas are being exceeded more quickly than expected What should you do?
You have a new set of requirements for a mobile app. The product team has asked for the following.
• The app requires access to customer order information
• The app needs to allow a search function for orders by product name
Choose two development tasks that would accomplish the requirements. Choose 2 answers
You need to restrict write access to those applications that have been specifically delegated that authority by end users Your project is already using OAuth2 for user and app authentication What should you do?
You need to log certain data to a custom logging service while processing the response You want to avoid processing delays due to logging during the logic flow What should you do?