Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

When a quota is configured with the distributed flag set to false, the number of which of the following would affect the overall allowed traffic?

A.

Cassandra nodes

B.

Routers

C.

Message Processors

D.

Management Servers

Which features are supported in the OAulhV2 policy'? Select all that are correct. Choose 3 answers

A.

setting custom attributes for generated access tokens

B.

storing external access tokens

C.

credentials validation when password grantjype is used

D.

setting different expiration for refresh and access tokens

Which is a use of OAuth 2 0 scopes'?

A.

govern the level of access for client applications

B.

select API products for the request

C.

implement SAML security assertions

D.

issue OAuth 2 0 refresh tokens

You need to interact with two different back end systems, depending on inbound request data One backend is a default target URL without SSL and another one is a dynamic target URL with 2-Way SSL What should you do?

A.

Use service callouts configuration for each target, and use a condition to decide which to invoke.

B.

Use a Key-Value Map configuration to access SSL and URL information to invoke target systems

C.

Use an AssignMessage policy to override default target URL and define 2-way SSL configuration at runtime

D.

Create another target endpoint with SSL configured and define route rule to pick that depends on available variables.

Which statements ate true when the following policy is used? Select all that are correct.

5ps

A.

The rate of 5 per second indicates that 5 requests can be made at any time during a second: but the 6th and later requests dunng the same second would be rejected

B.

Spike arrest is calculated separately on each message processor, so you could end up with significantly more than 5 calls in a second

C.

It is possible to make fewer than 5 requests in a second and still cause a spike arrest

D.

The continueOnError setting means that normal flow processing will resume even if the traffic exceeds the spike arrest rate

Where in the proxy should you place a policy that modifies the flow variable target, url?

A.

proxy request flow

B.

proxy response flow

C.

target request flow

D.

target response flow

E.

any flow

Which of the following statements are true for the out-of-the-box Apigee Edge Analytics Dashboard? Select all that apply Choose 3 answers

A.

Visualize API proxy error metrics

B.

Visualize API traffic metrics

C.

Visualize Developer Engagement metrics

D.

Visualize API Deployment metrics

E.

Visualize Management API traffic metrics

Which describe the ResponseCache' policy in Apigee Edge? Select all that are correct

A.

Helps to reduce the response latency

B.

Caches both the request and the response

C.

Helps to reduce the amount of load to the target system.

D.

Should be attached to both Request and Response Flow

When retrieving a value from an encrypted KVM. the variable name to which it is assigned must be prefixed with which value to prevent it from being readable in tracing sessions?

A.

encrypted

B.

mask

C.

kvm

D.

private

E.

hidden

An API product in Apigee can be used to

A.

restrict access to a set of APIs

B.

configure the quota limits for APIs

C.

restrict access to APIs in different environments

D.

all of the above