Book Resume 6- 7 Devasc Flashcards

1
Q

Are often used for communication from a network controller to its management
software. For example, Cisco DNA Center has a software graphical user interface
(GUI) that is used to manage its own network controller.

A

Northbound APIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If a network operator makes a change to a switch’s configuration in the management software
of the controller, those changes will then be pushed down to the individual devices
using a

A

Southbound APIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Causes an application to wait for a response from the API in order to continue
processing data or function normally.

A

Synchronous APis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Provide a callback function so that the API response can be sent back at
another time, without the application having to wait for the entire transaction to complete.

A

Asynchronous APIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Use HTTP methods
to gather and manipulate data. Because there is a defined structure for how HTTP works,
HTTP offers a consistent way to interact with APIs from multiple vendors.

A

Restful APIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is a predetermined string that
is passed from the client to the server. It is intended to be a pre-shared secret and should
not be well known or easy to guess because it functions just like a password.

A

API Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An API key can be passed to the server in three
different ways:

A

String
■■ Request header
■■ Cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Allows a user to enter his or her username and password once and receive
a unique auto-generated and encrypted xxxxxx.

A

Custom Tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is used to exchange data between applications that were
built on different programming languages, such as Java, .NET, and PHP

A

Simple Object Access Protocol
SOAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SOAP messages, which typically consist of the following four main components,
are sent between the web applications and the clients

A

■■ Envelope
■■ Header
■■ Body
■■ Fault (optional)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Make it possible to execute code or a program on a remote
node in a network

A

Remote-Procedure Calls (RPCs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Enumere the APIs Styles:

A

Rest, Sincronic, Asincronic, Remote Procedural Calls (RPC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RESTful API Authentication

A

Basic Authentication, APIs Keys, Custom Tokens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

-Is one of the simplest and most common
authentication methods used in APIs.

A

Basic Authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is a set of functions and procedures intended
to be used as an interface for software components to communicate with each other.

A

An application programming interface (API)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe the APIs clasification:

A
  • Service APIs
  • Information APIs
  • Hardware APIs
17
Q

An application can call on another application to solve a
particular problem (see Figure 7-2). Usually these systems can exist independently. For
example, in a payment system, an application can call the API to accept payments via
credit cards.

A

Service APIs

18
Q

Allows one application to ask another application
for information. Information in this context can refer to data gathered over time,
telemetry data, or a list of devices that are currently connected.

A

Information APIs

19
Q

Gain access to the features
of hardware devices. Usually these APIs encompass some kind of hardware or
sensors, and an application can call this kind of API to get the GPS location or realtime
sensor data such as temperature or humidity.

A

Hardware APIs

20
Q

API Access Types
There are typically three ways APIs can be accessed:

A

1/ Private
2/ Partner
3/ Public

21
Q

In HTTP, in order to make a successful request to the server, the client needs to include four
items:

A

■■ URL (uniform resource locator)
■■ Method
■■ List of headers
■■ Body

22
Q

A URL typically has four components,

A

■■ Protocol
■■ Server/host address
■■ Resource
■■ Parameters

23
Q

Are user-defined HTTP callbacks. Are Triggered by an event, such as pushing code to a repository or typing a keyword in a chat window.

A

Webhooks

24
Q

REST Constraints

A

** Client/server
■■ Stateless
■■ Cache
■■ Uniform interface
■■ Layered system
■■ Code on demand

25
Q

Each individual request contains all the information the
server needs to perform the request and return a response, regardless of other requests made
by the same API user.

A

Stateless (REST)

26
Q

In this strategy, the version number of the API is included in the
URL path.

A

URI path versioning

27
Q

In this strategy, the version number is sent as a
query parameter in the URL.

A

Query parameter versioning

28
Q

Are versioned by providing custom headers with the version
number included as an attribute.

A

Custom headers: REST APIs

29
Q

This strategy allows you to version a single resource representation
instead of versioning an entire API

A

Content negotiation

30
Q

What are the populars aproch to pagination?

A

■■ Offset-based pagination
■■ Keyset-based pagination, also known as continuation token or cursor pagination (recommended)