You are working with the product owners and uncover an opportunity for new functionality. The product owners ask you to quickly outline the desired functionality. Which approach should you use?
Which versioning scheme follows Apigee's API design best practices?
You are working on a new design for an API. The backend API will set the customer to a deleted status. The customer will remain in the backend database for later cleanup. The customer can no longer be retrieved by the API once the status is set. Which method should be used at the Apigee proxy to set the deleted status?
Which is true about PostClientFlow?
Which statements are true for configuring the Edge Microgateway quota plugin? Choose 3 answers
In Apigee Edge APIs, what is fault.name?
You need to restrict write access to those applications that have been specifically delegated that authority by end users Your project is already using OAuth2 for user and app authentication What should you do?
Which policy is best used to convert a SOAP response to a JSON response'?
Which features are supported in the OAuthV2 policy? Choose 3 answers
You have implemented an Apigee Edge API proxy that includes a new shared flow Before you release to production, you need to ensure all dependencies are readied What should you do?
Which of the following statements are true for the out-of-the-box Apigee Edge Analytics Dashboard? Select all that apply Choose 3 answers
You have a new set of requirements for a mobile app. The product team tells you that the user data already exists from the website version of the app. The user APIs are currently internal access only. The product team has asked for the following.
• The app requires user authentication before data should be accessed.
• The app needs to display user data once the user has logged into the mobile app.
* The app needs to allow changes to user data once the user has logged into the mobile app.
Choose three development tasks that would accomplish the requirements. Choose 3 answers
How many times can an authorization code be used to obtain an access token?