You are currently viewing rest api linkedin assessment answers
rest api linkedin assessment answers_theanswershome

rest api linkedin assessment answers

1. Which is the most secure method to transmit an API key?

  • Base64 encoding
  • URL parameter
  • Basic Auth
  • Authorization header

2. What should you add to a Cache-Control response header to specify that a response should not be stored in an intermediary cache?

  • private
  • restricted
  • client-only
  • no-proxy

3. What OAuth term is used to represent permissions?

  • back channel
  • claim
  • scope
  • token

4. Which property would you use to include references to other resources in a JSON document?

  • subresources
  • _links
  • _embedded
  • resources

5. Which header is not used in cache management?

  • Expires
  • Rate-Limit
  • Etag
  • Cache-Control

6. Which URL pattern is recommended when working with one resource and a collection of resources?

  • /companies/{id} and /companies
  • /companies/{id} and /company
  • /company/{id} and /company
  • /company/{id} and /companies

7. What is the best approach for requesting JSON instead of XML from an API?

  • APIs do not use XML.
  • Use the Content-Type header.
  • Add .json to the URL.
  • Use the Accept header.

8. Which HTTP verb is used to delete a resource?

  • DESTROY
  • DELETE
  • CLEAR
  • FLUSH

9. Which OAuth grant type can support a refresh token?

  • Client Credentials Grant
  • Implicit Grant
  • Authorization Code Grant
  • Authentication Grant

10. When you get a 429 response code, what should you do next?

  • Check your API key.
  • Check the API uptime status.
  • Check your JSON structure.
  • Slow down your requests.

11. The textbook approach to API versioning is to use _____.

  • URLS
  • common knowledge
  • no versioning
  • the Accept header

12. Using OAuth, what scope would you request for write access to the APl?

  • admin
  • It varies from API to API.
  • write
  • read-write

13. What is the best way to track SDK and version usage?

  • polling users
  • Accept headers
  • user agents
  • tracking downloads

14. When validating a JWT, what are some of the claims that you must confirm? (Select all that apply.)
A. The exp (expiration) has not passed.
B. The algorithm is sufficient.
C. The signature matches the payload.
D. The token was Base64 encoded.
E. The iss (issuer) is the auth server you expect.
F. There is a refresh token.
G. The cid (client ID) is the client you expect.
H. The token was encrypted.

  • A, C, E, G
  • B, C, F, G
  • A, D, G, H
  • A, B, E, H

15. What is the concept that allows an API client to explore an API via links embedded in payloads?

  • link relations
  • hypermedia
  • browsing
  • parsing

Leave a Reply