Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Google Exam Apigee-API-Engineer Topic 11 Question 6 Discussion

Actual exam question for Google's Apigee-API-Engineer exam
Question #: 6
Topic #: 11
[All Apigee-API-Engineer Questions]

You need to interact with two different back end systems, depending on inbound request data One backend is a default target URL without SSL and another one is a dynamic target URL with 2-Way SSL What should you do?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Viola
1 months ago
I think using a Key-Value Map configuration to access SSL and URL information is the best option.
upvoted 0 times
...
Stephane
1 months ago
You know, I've been doing this for years, and I still can't keep track of all these SSL configurations. Why can't they just make it simpler?
upvoted 0 times
...
Merri
1 months ago
I'm going with Option C. Overriding the target URL and SSL config at runtime is the way to go!
upvoted 0 times
Loreen
18 days ago
I agree, using service callouts with a condition to decide which target to invoke seems like a solid choice.
upvoted 0 times
...
Muriel
23 days ago
I think using a Key-Value Map configuration could work too. It's a good way to access SSL and URL information.
upvoted 0 times
...
Kiera
24 days ago
Option C sounds like the best approach. Overriding the target URL and SSL config at runtime is flexible.
upvoted 0 times
...
...
Royal
2 months ago
I would go with option D, creating another target endpoint with SSL configured.
upvoted 0 times
...
Rosalind
2 months ago
I agree with Art, it seems like the most logical approach.
upvoted 0 times
...
Art
2 months ago
I think we should use service callouts configuration for each target and use a condition to decide which to invoke.
upvoted 0 times
...
Keshia
2 months ago
Wait, did you hear about the developer who tried to use a quantum computer to manage their SSL keys? Talk about overkill!
upvoted 0 times
Linn
24 days ago
Wait, did you hear about the developer who tried to use a quantum computer to manage their SSL keys? Talk about overkill!
upvoted 0 times
...
Marguerita
1 months ago
B) Use a Key-Value Map configuration to access SSL and URL information to invoke target systems
upvoted 0 times
...
Katie
2 months ago
A) Use service callouts configuration for each target, and use a condition to decide which to invoke.
upvoted 0 times
...
...
Joni
3 months ago
Option A seems like the most straightforward approach. Keep it simple, right?
upvoted 0 times
Anna
1 months ago
D) Create another target endpoint with SSL configured and define route rule to pick that depends on available variables.
upvoted 0 times
...
Shaunna
1 months ago
Yes, that sounds like the best way to handle the different back end systems.
upvoted 0 times
...
Darrin
2 months ago
A) Use service callouts configuration for each target, and use a condition to decide which to invoke.
upvoted 0 times
...
...

Save Cancel