1.
In the REST API request URI example
http://example.com/update/person?id=42&email=person%40example.com , which
term describes the component example.com ?
Query
Path
authority (True)
scheme
2.
Refer to the exhibit. A network
administrator is using a Python script to send a REST API request. What is the
purpose of the line of code resp = requests.get(url, verify = False) ?
It
omits the sending URL in the response.
It
tests the function of the Python requests library.
It
bypasses the certificate validation check. (True)
It
skips the URL verification step and tests the resource path
3.
3Which characteristic of the SOAP architecture
specifies communication between all similar and dissimilar application types?
Independence (True)
extensibility
neutrality
interface
uniformity
4.
What is the meaning of the term flow as it
relates to the OAuth 2.0 authorization framework?
It is a process for an API user to obtain
an access token from the authorization server. (True)
It is the number of requests contained in
the token bucket.
It is a process for an API request to send
authentication credentials to a web service.
It is the sequence of data exchanged
between a REST API request and a response.
5.
Which type of credential information is used for
the bearer authentication in REST APIs?
a
string generated by an authentication server (True)
a
username and password set by the client
an
MD5 hash string generated by the client application
a
password encoded using Base64
6.
Which API architectural style uses an XML-based
messaging protocol to communicate between applications?
SOAP (True)
XML-RPC
NFS
REST
7.
Which SOAP message root element defines the XML
document as a SOAP message?
Meta
tag
Body
Envelope (True)
Header
8.
Refer to the exhibit. A network administrator is using a Python script to test a REST API request. The traceback message indicates that there is an error in the URI. What is a possible issue?
The query component is missing.
The destination host address is wrong.
(True)
The protocol is wrong.
The SSL certificate is invalid.
9.
Which HTTP response status code indicates that
the user is not authenticated to access the site?
201
400
401
(True)
403
404
10.
In which situation would a synchronous API be
used?
when the client is not required to take
action
when data is being retrieved from a
database (True)
when a server is not part of the process
when the original API request or data from
the request is delayed
11.
What are two purposes for using rate limits on
public and unrestricted APIs? (Choose two.)
to provide better service and response time
to all users (True)
to limit the number of passwords that a
client can have in making API requests
to
avoid a server overloading from too many requests at the same time (True)
to
ensure a client uses a multifactor authentication mechanism
to
limit the number of authorization requests per API call
12.
13.
A network engineer is learning about Rest APIs.
When executing a particular API, the server responds with curl. How is this
information useful?
Curl shows the URL used in the API request.
Curl shows the information the API returned
from the server.
Curl shows the retrieved information in
JSON format.
Curl shows how to access the content
displayed in the response body using curl (True)
14.
What is an architectural constraint to which a
true RESTful API web service must adhere?
It operates as a cloud service.
It must operate along with a DNS server.
It operates in a stateless way. (True)
It uses HTTPS to transport data.
15.
What is a characteristic of a RESTful API?
It uses HTTP methods to gather and
manipulate data. (True)
It is a southbound API.
It supports a secure data transmission
between a remote user and an enterprise network.
It facilitates the configuration changes
from a network controller to end devices.
16.
A client is sending a REST API request to a web
server. The request includes the need for data compression. Which three values
are acceptable for the Accept-Encoding request header? (Choose three.)
Br (True)
xz
zip
gzip (true)
tar
*(True)