Refer to the exhibit. The application follows a containerized microservices architecture that has one container per microservice. The microservices communicate with each other by using REST APIs. The double-headed arrows in the diagram display chains of synchronous HTTP calls needed for a single user request.
Which action ensures the resilience of the application in the scope of a single user request?
Answer : B
DRAG DROP -
Drag and drop the steps on the left into the order on the right for an end-user to access an OAuth2 protected resource using the 'Authorization Code Grant' flow.
Select and Place:
Answer :
In the three-legged OAuth2 authorization workflow, which entity grants access to a protected resource?
Answer : D
Reference:
https://developer.orange.com/tech_guide/3-legged-oauth/
What are two steps in the OAuth2 protocol flow? (Choose two.)
Answer : AE
Reference:
https://www.digitalocean.com/community/tutorials/an-introduction-to-oauth-2
DRAG DROP -
Drag and drop the descriptions from the left onto the related OAuth-defined roles on the right.
Select and Place:
Answer :
Refer to the exhibit. This cURL POST request creates an OAuth access token for authentication with FDM API requests.
What is the purpose of the file `@token_data` that cURL is handling?
Answer : C
What is the result of a successful OAuth2 authorization grant flow?
Answer : A
In the three-legged OAuth2 process, after the authorization server presents a form to the resource owner to grant access, what is the next step?
Answer : D
Which OAuth mechanism enables clients to continue to have an active access token without further interaction from the user?
Answer : A
A developer is building an application to access a website. When running the application, an HTTP 403 error code has been received.
How should the application be modified to handle this code?
Answer : B
Refer to the exhibit. Which API call does an engineer use to delete the FQDN object?
Answer : A
Refer to the exhibit. Which code snippet completes this code to handle API rate-limit?
Answer : A
Reference:
https://developer.cisco.com/meraki/api/#!rate-limit
Refer to the exhibit. Which parameter is missing from the JSON response to confirm the API version that is used?
Answer : C
Which two methods are API security best practices? (Choose two.)
Answer : AC
DRAG DROP -
Refer to the exhibit. The Python script is supposed to make an API call to Cisco DNA Center querying a wireless profile for the `ChicagoCampus` and then parsing out its enable FlexConnect value. Drag and drop the parts of the Python code from the left onto the item numbers on the right that match the missing sections in the exhibit.
Select and Place:
Answer :