You are composing logs created from user input that contains confidential user information You need to record the presence of all fields, while ensuring that confidential information is not recorded in any log Which approach should you take?
A. Work with the administrators of the log aggregators to mask confidential data contents.
B. Use a data masking configuration to hide sensitive data from logs
C. Sanitize all data on entry using regular expressions that search for confidential data formats.
D. Use conditions to skip logging for data that might contain confidential information.
正解:D
質問 2:
Use a Key Value Map when you need to store
A. a value that expires after 300 seconds
B. OAuth tokens for backend service calls
C. configuration values
D. an HTTP response
正解:B
質問 3:
As an API Engineer you have been asked to automate the build process for Apigee deployments. You decide to build a new tool to deploy the API Bundles using the Apigee Management API. What would be the correct approach?
A. Management APIs need a separate API product for security reasons.
B. You should deploy an Apigee microgateway
C. Each management API you plan to use should be turned into an Apigee Proxy.
D. Management APIs should be called directly from the tool to the Apigee gateway
正解:D
質問 4:
What capabilities are provided when using the apigee-access node js module? Select all that apply
A. Analytics Storage
B. Object caching
C. Edge flow variable access
D. XML and JSON conversions
正解:B,C
質問 5:
You are building a new API, and have the choice between several names for a particular field. According to Apigee recommended practices, what should you do?
A. Allow each developer to make their own choice.
B. Pick any name, and make sure that you use that name as consistently as possible
C. Use the same field name as in the back end system
D. Survey typical consumers to determine which common name to use
正解:B
鹫巣** -
電車などの隙間時間もデスクでも、PCでもスマホでも出来るようなので読みやすいです