Our experts have gathered these REST API MCQs through research, and we hope that you will be able to see how much knowledge base you have for the subject of REST API by answering these 60+ multiple-choice questions.
Get started now by scrolling down!
A. Partial
B. Dependent
C. Associative
D. Linked
A. /companies/{id} and/company
B. /company/{id} and/companies
C. /companies/{id} and/companies
D. /company/{id} and/company
A. Data in the token
B. Ownership
C. A permission
D. And integer
A. Uniform Interface
B. Client-Server
C. Stateless
D. Chacheable
A. HTTP
B. REST
C. OPTIONS
D. CORS
A. Notify other systems of an event
B. Catch error faster
C. Improve error logging
D. Log additional data
A. To add new technologies to an organization's infrastructure.
B. To share features and functionality with other system.
C. To move infrastructure to the cloud.
D. To appease the latest digital transformation effort.
A. Bash
B. Curl
C. Ssh
D. PowerShell
A. OpenAPI (Swagger)
B. WADL
C. WSDL
D. OAuth
A. SUBMIT
B. WRITE
C. POST
D. CREATE
A. Mobile app work better.
B. It improves uptime.
C. It offers better security.
D. It reduce load on servers.
A. 409 Conflict
B. 400 Bad Request
C. 406 Not Acceptable
D. 405 Method Not Allowed
A. An identify layer on top of OAuth 2.0
B. The new name for SAML 3.0
C. A modern replacement for API keys
D. An SSO competitor for OAuth 2.0
A. Flexible querying/responses
B. More stable APIs
C. Compatible with more gateways
D. More secure by default
A. Stateless
B. Client-Server
C. Uniform Interface
D. Cacheable
A. It identifies the user ID.
B. It identifies the client application or SDK.
C. It identifies if the API should expect a user authentication.
D. It identifies if the API should accept microservice traffic.
A. Application/json
B. Application/json_version2
C. Text/html
D. Application/vnd.myapp.v2+json
A. A token is encrypted.
B. A token is encoded.
C. A token is scoped to the use case.
D. A token can be shared between systems.
A. Stateless architecture
B. Idempotency
C. A uniform interface
D. Cacheability
A. API proxy
B. API gateway
C. OpenAPI
D. OAuth authorization server
A. Transport over SSL
B. Encrypted payload
C. A signature
D. Encoded payload
A. Token
B. Scope
C. Claim
D. Back channel
A. ID token
B. Refresh token
C. Access token
D. Auth code token
A. No-proxy
B. Client-only
C. Restricted
D. Private
A. Authorization Code Grant
B. Client Credentials Grant
C. Implicit Grant
D. Authentication Grant
A. It varies from API to API.
B. Admin
C. Write
D. Read-write
A. _embedded
B. Resources
C. Subresources
D. _links
A. Tracking downloads
B. Accept headers
C. User agents
D. Polling users
A. Layered System
B. Stateless
C. Client-Server
D. Cacheable
A. Your tech stack
B. Reasoning for your naming schema
C. Your mission statement
D. Sample code
A. Response Time
B. Time to First Hello World
C. TTL
D. Uptime
A. GET /user/{id}
B. GET /users/{id}
C. GET /user?id={id}
D. GET /users?id={id}
A. To describe relationships between resources or actions
B. To describe subresources related to the current one
C. To link two resources together
D. To describe a resource and its purpose
A. Java, Javascript, and .NET
B. And you can support
C. PHP, Python, and Go
D. The languages that your target users use
A. Resources
B. _embedded
C. Subresources
D. _links
A. An authorization framework for granted delegated access
B. An approach to single sign-on for APIs
C. A method for API authentication
D. HTTP Basic Authentication 2.0
A. JSON
B. HTTP
C. Common use cases
D. Your tech stack
A. To share user profile information
B. To update an API configuration
C. To keep a web session active
D. To retrieve an access token
A. How long it takes for a developer to do something with your API
B. How long it takes to start a new programming language
C. How long it takes to install your SDK
D. How long it takes to read your documentation
A. Cache-State: none
B. Expires:-1
C. Cache-Control: no-cache
D. Cache-Control: no-store
A. API gateway
B. API logging
C. A layered system
D. API proxy
A. Common knowledge
B. URLs
C. No versioning
D. The Accept header
A. URL parameter
B. Authorization header
C. Base64 encoding
D. Basic Auth
A. Client
B. Not specified
C. Authorization server
D. Resource server
A. Inbound traffic
B. North-south traffic
C. Internal traffic
D. East-west traffic
A. Add .json to the URL.
B. APIs do not use XML.
C. Use the Content-Type header.
D. Use the Accept header.
A. 403
B. 404
C. 401
D. 405
A. HTTP verbs
B. JSON payloads
C. HTTP response codes
D. Rate limiting/throttling
A. Red team testing
B. White box testing
C. Blue box testing
D. Black box testing
A. PUT
B. POST
C. GET
D. OPTIONS
A. Expires: 1 minute
B. Cache-Control: max-age=60
C. Expires: 1 January 2020
D. Cache-Expires: max-age=60
A. Hypermedia
B. Link relations
C. Parsing
D. Browsing
A. 200
B. 201
C. 204
D. 202
A. AWS Lambda
B. Downloading open-source software
C. Serverless
D. JavaScript on a webpage
A. /companies/employees/{companyId}/{employeeId}
B. /company/{companyId}/employees/{employeeId}
C. /companies/{companyId}/employees/{employeeId}
D. /companies/{companyId}/employee/{employeeId}
A. Stateless
B. Cacheable
C. Layered System
D. Uniform Interface
A. FLUSH
B. DELETE
C. CLEAR
D. DESTROY
A. DELETE
B. GET
C. PUT
D. POST
A. Uniform Interface
B. Cacheable
C. Stateless
D. Client-Server
A. Check you JSON structure.
B. Check the API uptime status.
C. Slow down your requests.
D. Check you API key.
A. Date-based filtering
B. Next/previous cursors
C. Page size and filters
D. Database IDs
A. OAuth
B. Biometrics
C. API Keys
D. Username and password
A. 200 OK
B. 204 No Content
C. 201 Created
D. 202 Accepted