Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

Apigee-API-Engineer Google Cloud - Apigee Certified API Engineer Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Google Apigee-API-Engineer Google Cloud - Apigee Certified API Engineer certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 126 questions

A customer has added response cache policy on all their search APIs, but traffic to the backend has not reduced much. They ask you to investigate, you find that GET queries are being cached and available in memory but cache misses are still high You want to improve caching and reduce cache misses What should you do?

A.

Use lookup/populate cache policy.

B.

Increase the TimeToLive of cached objects

C.

Review key fragments in cache key, ensuring only important parameters are used

D.

Review and increase the number of items on the cache resource to a higher number

As an API Engineer you are approached late in the day with an emergency request to configure a 2 way TLS connection between Apigee and the backend server. All existing certificates have been revoked. The security team provides you the PEM file for the backend server and your new Apigee TLS certificate. What minimum steps are required to reconfigure 2-way TLS?

Choose 2 answers

A.

Add your Apigee TLS certificate to the key store.

B.

Add the backend servers PEM file to the key store.

C.

Add the backend certificate chain to the trust store

D.

Add the backend servers PEM file to the trust store.

E.

Use the KVM to store the contents of the PEM file.

F.

Use the Access Control Policy to reference the PEM file

Which approaches can be used for extracting data from a SOAP body and returning it as a JSON response in Apigee Edge? Select all that are correct.

Choose 3 answers

A.

Use XSLT to transform the XML payload and then use a XML to JSON policy

B.

Use XML to JSON policy first to convert to JSON and then ExtractVariables with a JSONPath to extract the body from the converted SOAP envelope

C.

Use ExtractVariables with an XPath first to extract the SOAP body and then use XML to JSON policy

D.

Use an AssignMessage policy to convert the SOAP response to a JSON response, using XPath expressions to retrieve the data

As an API Engineer you have been asked to automate the build process for Apigee deployments. You decide to build a new tool to deploy the API Bundles using the Apigee Management API. What would be the correct approach?

A.

You should deploy an Apigee microgateway

B.

Management APIs need a separate API product for security reasons.

C.

Each management API you plan to use should be turned into an Apigee Proxy.

D.

Management APIs should be called directly from the tool to the Apigee gateway

How can we specrfy the type of Security (basic auth, oauth) used by the API in OpenAPI Specification 2.0?

A.

specify using the secuntyDefinrtions name property

B.

specify using the secuntySchemas name property

C.

specify using the security Variables name properly

D.

specify using the securityParams name property

Which OAuth 2 0 grant requires redirection'?

A.

Authorization Code

B.

Resource Owner Password Credentials

C.

Refresh Token

D.

Client Credentials

Your API generates tokens to authenticate users. You have the following requirements

1. Limited token lifetime.

2. Managed key rotation.

3. Self-verifiable content.

4 Compact data representation

5. Refresh without new challenge.

You plan to use SAML2 Which two of the above-listed requirements are satisfied by using SAML2? Choose 2 answers

A.

Limited token lifetime.

B.

Managed key rotation

C.

Self-verifiable content

D.

Compact data representation

E.

Refresh without a new challenge

Which is a benefit of three-legged OAuth (authonzation_code grant)'?

A.

authorization codes can be used multiple times to obtain access tokens

B.

allows another individual to access a user's private data

C.

provides access to user-specific resources without exposing end-user credentials to the client application

D.

provides end-user credentials to requesting app

You have the following requirements for your API:

• Authenticate users.

• Identify applications.

• Log update events to StackDriver

• Enforce quotas based on Product configurations

• Alert when total API latency exceeds 500 milliseconds

Your Apigee Edge API proxy is currently implemented with the following Proxy Endpoint configuration

Which above 2 requirements have been met with this configuration? Choose 2 answers

A.

Authenticate users.

B.

Authenticate applications

C.

Log update events to StackDriver

D.

Enforce quotas based on Product configurations

E.

Alert when total API latency exceeds 500 milliseconds

Which are NOT a step in the OAuth 2 0 authorization code grant process? Select all that are correct

A.

generate an authorization code

B.

generate an access token

C.

verify the device ID

D.

validate the client API key

E.

obtain the end user's consent for the application to request the user's protected resources

F.

validate the developer name

Which statements ate true when the following policy is used? Select all that are correct.

5ps

A.

The rate of 5 per second indicates that 5 requests can be made at any time during a second: but the 6th and later requests dunng the same second would be rejected

B.

Spike arrest is calculated separately on each message processor, so you could end up with significantly more than 5 calls in a second

C.

It is possible to make fewer than 5 requests in a second and still cause a spike arrest

D.

The continueOnError setting means that normal flow processing will resume even if the traffic exceeds the spike arrest rate

The product team is rolling out a new reseller program with API's. The product owner has created Epics covering the high level requirements. The product owner delegate has asked for help creating a product backlog. What task would the product owner delegate need assistance with?

A.

Creation of a message logging policy in Apigee.

B.

Creating user stories to fulfill the business requirements.

C.

Creating support tickets that cover each of the business requirements.

D.

Creating a cross functional team of API engineers, business analysts, and backend software developers.

Where in the proxy should you place a policy that modifies the flow variable target, url?

A.

proxy request flow

B.

proxy response flow

C.

target request flow

D.

target response flow

E.

any flow

You have a new set of requirements for a mobile app. The product team has asked for the following.

• The app requires access to customer order information

• The app needs to allow a search function for orders by product name

Choose two development tasks that would accomplish the requirements. Choose 2 answers

A.

Create a new API proxy for a GET /v1/customers/{customerid}/orders

B.

Create a new API proxy for a GET /v1/customers/{customerid}/products/{productname}

C.

The design should include a new custom header X-Product-Name

D.

The Apigee proxy should allow a query parameter for q=

E.

The Apigee proxy should allow a query parameter for orderld=

Which policies can be used to create or modify a request message for a service callout? Select all that are correct

A.

ServiceCallout

B.

AssignMessage

C.

RequestMessage

D.

Message Validation

Your client's Apigee Edge configuration uses Local Target Proxy Chaining with proxies that have monthly quotas The client has noticed that quotas are being exceeded more quickly than expected What should you do?

A.

Switch to daily quotas.

B.

Disable quota evaluation for chained proxies.

C.

Increase quota levels in API Product settings

D.

Use Analytics reports to balance proxy queries

In which place can outbound SSL be configured?

A.

ProxyEndpoint

B.

HTTPProxyConnection

C.

VirtualHost

D.

TargetEndpoint

You are using the Apigee ExtractVariables policy JSONPath feature, and discover that the query is not returning the expected result for the payload you are providing What should you do?

A.

Check that the Accept header is set to text/json

B.

Check that the Accept header is set to application/json.

C.

Check that the Content-Type header is set to text/json

D.

Check that the Content-Type header is set to application/json

Which are characteristics of the PopulateCache and ResponseCache policies'? Select all that are correct

A.

PopulateCache has a TimeOfYear expiry option

B.

PopulateCache allows you to cache any string object.

C.

ResponseCache has separate policy definitions for Lookup vs. Populate cache operations.

D.

ResponseCache caches the complete HTTP response (including headers).

Which policy can be used to restrict access to API resources based on the client IP?

A.

Regular Expression Protection policy

B.

Basic Authentication policy

C.

Access Control policy

D.

Raise Fault policy

Page: 1 / 2
Total 126 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved