Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

MCIA-Level-1 Questions and Answers

Question # 6

An organization plans to use the Anypoint Platform audit logging service to log Anypoint MQ actions.

What consideration must be kept in mind when leveraging Anypoint MQ Audit Logs?

A.

Anypoint MQ Audit Logs include logs for sending, receiving, or browsing messages

B.

Anypoint MQ Audit Logs include fogs for failed Anypoint MQ operations

C.

Anypoint MQ Audit Logs include logs for queue create, delete, modify, and purge operations

Full Access
Question # 7

An organization uses one specific CloudHub (AWS) region for all CloudHub deployments. How are CloudHub workers assigned to availability zones (AZs) when the organization's Mule applications are deployed to CloudHub in that region?

A.

Workers belonging to a given environment are assigned to the same AZ within that region.

B.

AZs are selected as part of the Mule application's deployment configuration.

C.

Workers are randomly distributed across available AZs within that region.

D.

An AZ is randomly selected for a Mule application, and all the Mule application's CloudHub workers are assigned to that one AZ

Full Access
Question # 8

An Integration Mule application is being designed to synchronize customer data between two systems. One system is an IBM Mainframe and the other system is a Salesforce Marketing Cloud (CRM) instance. Both systems have been deployed in their typical configurations, and are to be invoked using the native protocols provided by Salesforce and IBM.

What interface technologies are the most straightforward and appropriate to use in this Mute application to interact with these systems, assuming that Anypoint Connectors exist that implement these interface technologies?

A.

IBM: DB access CRM: gRPC

B.

IBM: REST CRM:REST

C.

IBM: Active MQ CRM: REST

D.

IBM: CICS CRM: SOAP

Full Access
Question # 9

Refer to the exhibit.

A business process involves the receipt of a file from an external vendor over SFTP. The file needs to be parsed and its content processed, validated, and ultimately persisted to a database. The delivery mechanism is expected to change in the future as more vendors send similar files using other mechanisms such as file transfer or HTTP POST.

What is the most effective way to design for these requirements in order to minimize the impact of future change?

A.

Use a MuleSoft Scatter-Gather and a MuleSoft Batch Job to handle the different files coming from different sources

B.

Create a Process API to receive the file and process it using a MuleSoft Batch Job while delegating the data save process to a System API

C.

Create an API that receives the file and invokes a Process API with the data contained In the file, then have the Process API process the data using a MuleSoft Batch Job and other System APIs as needed

D.

Use a composite data source so files can be retrieved from various sources and delivered to a MuleSoft Batch Job for processing

Full Access
Question # 10

An automation engineer needs to write scripts to automate the steps of the API lifecycle, including steps to create, publish, deploy and manage APIs and their implementations in Anypoint Platform.

What Anypoint Platform feature can be used to automate the execution of all these actions in scripts in the easiest way without needing to directly invoke the Anypoint Platform REST APIs?

A.

Automated Policies in API Manager

B.

Runtime Manager agent

C.

The Mule Maven Plugin

D.

Anypoint CLI

Full Access
Question # 11

An organization is using Mulesoft cloudhub and develops API's in the latest version. As a part of requirements for one of the API's, third party API needs to be called. The security team has made it clear that calling any external API needs to have include listing

As an integration architect please suggest the best way to accomplish the design plan to support these requirements?

A.

Implement includelist IP on the cloudhub VPC firewall to allow the traffic

B.

Implement the validation of includelisted IP operation

C.

Implement the Any point filter processor to implement the include list IP

D.

Implement a proxy for the third party API and enforce the IPinclude list policy and call this proxy from the flow of the API

Full Access
Question # 12

What is the MuleSoft-recommended best practice to share the connector and configuration information among the APIs?

A.

Build a Mule domain project, add the Database connector and configuration to it, and reference this one domain project from each System API

B.

Build a separate Mule domain project for each API, and configure each of them to use a file on a shared file store to load the configuration information dynamically

C.

Build another System API that connects to the database, and refactor all the other APIs to make requests through the new System API to access the database

D.

Create an API proxy for each System API and share the Database connector configuration with all the API proxies via an automated policy

Full Access
Question # 13

A Kubernetes controller automatically adds another pod replica to the resource pool in response to increased application load.

Which scalability option is the controller implementing?

A.

Down

B.

Diagonal

C.

Vertical

D.

Horizontal

Full Access
Question # 14

An organization heeds to procure an enterprise software system to increase cross-selling opportunities and better rack prospect data.

Which category of enterprise software has these core capabilities, when used for its typical and intended purpose?

A.

Supply Chain Management (SCM)

B.

IT Service Management (ITSM)

C.

Business-to-Business (A2B)

D.

Customer Relationship Management (CRM)

Full Access
Question # 15

What is true about automating interactions with Anypoint Platform using tools such as Anypoint Platform REST API's, Anypoint CLI or the Mule Maven plugin?

A.

By default, the Anypoint CLI and Mule Maven plugin are not included in the Mule runtime

B.

Access to Anypoint Platform API;s and Anypoint CLI can be controlled separately thruough the roles and permissions in Anypoint platform, so that specific users can get access to Anypoint CLI while others get access to the platform API's

C.

Anypoint Platform API's can only automate interactions with CloudHub while the Mule maven plugin is required for deployment to customer hosted Mule runtimes

D.

API policies can be applied to the Anypoint platform API's so that only certain LOS's has access to specific functions

Full Access
Question # 16

A banking company is developing a new set of APIs for its online business. One of the critical API's is a master lookup API which is a system API. This master lookup API uses persistent object store. This API will be used by all other APIs to provide master lookup data.

Master lookup API is deployed on two cloudhub workers of 0.1 vCore each because there is a lot of master data to be cached. Master lookup data is stored as a key value pair. The cache gets refreshed if they key is not found in the cache.

Doing performance testing it was observed that the Master lookup API has a higher response time due to database queries execution to fetch the master lookup data.

Due to this performance issue, go-live of the online business is on hold which could cause potential financial loss to Bank.

As an integration architect, which of the below option you would suggest to resolve performance issue?

A.

Implement HTTP caching policy for all GET endpoints for the master lookup API and implement locking to synchronize access to object store

B.

Upgrade vCore size from 0.1 vCore to 0,2 vCore

C.

Implement HTTP caching policy for all GET endpoints for master lookup API

D.

Add an additional Cloudhub worker to provide additional capacity

Full Access
Question # 17

An organization has implemented a continuous integration (CI) lifecycle that promotes Mule applications through code, build, and test stages. To standardize the organization's CI journey, a new dependency control approach is being designed to store artifacts that include information such as dependencies, versioning, and build promotions.

To implement these process improvements, the organization will now require developers to maintain all dependencies related to Mule application code in a shared location.

What is the most idiomatic (used for its intended purpose) type of system the organization should use in a shared location to standardize all dependencies related to Mule application code?

A.

A MuleSoft-managed repository at repository.mulesoft.org

B.

A binary artifact repository

C.

API Community Manager

D.

The Anypoint Object Store service at cloudhub.io

Full Access
Question # 18

According to MuleSoft’s recommended REST conventions, which HTTP method should an API use to specify how AP\ clients can request data from a specified resource?

A.

POST

B.

PUT

C.

PATCH

D.

GET

Full Access
Question # 19

An organization is designing an integration solution to replicate financial transaction data from a legacy system into a data warehouse (DWH).

The DWH must contain a daily snapshot of financial transactions, to be delivered as a CSV file. Daily transaction volume exceeds tens of millions of records, with significant spikes in volume during popular shopping periods.

What is the most appropriate integration style for an integration solution that meets the organization's current requirements?

A.

Event-driven architecture

B.

Microservice architecture

C.

API-led connectivity

D.

Batch-triggered ETL

Full Access
Question # 20

Which role is primarily responsible for building API implementation as part of a typical MuleSoft integration project?

A.

API Developer

B.

API Designer

C.

Integration Architect

D.

Operations

Full Access
Question # 21

Refer to the exhibit.

A Mule application has an HTTP Listener that accepts HTTP DELETE requests. This Mule application Is deployed to three CloudHub workers under the control of the CloudHub Shared Load Balancer.

A web client makes a sequence of requests to the Mule application's public URL.

How is this sequence of web client requests distributed among the HTTP Listeners running in the three CloudHub workers?

A.

Each request is routed to the PRIMARY CloudHub worker in the PRIMARY Availability Zone (AZ)

B.

Each request is routed to ONE ARBiTRARY CloudHub worker in the PRIMARY Availability Zone (AZ)

C.

Each request Is routed to ONE ARBiTRARY CloudHub worker out of ALL three CloudHub workers

D.

Each request is routed (scattered) to ALL three CloudHub workers at the same time

Full Access
Question # 22

What is true about the network connections when a Mule application uses a JMS connector to interact with a JMS provider (message broker)?

A.

To complete sending a JMS message, the JMS connector must establish a network connection with the JMS message recipient

B.

To receive messages into the Mule application, the JMS provider initiates a network connection to the JMS connector and pushes messages along this connection

C.

The JMS connector supports both sending and receiving of JMS messages over the protocol determined by the JMS provider

D.

The AMQP protocol can be used by the JMS connector to portably establish connections to various types of JMS providers

Full Access
Question # 23

An auto mobile company want to share inventory updates with dealers Dl and D2 asynchronously and concurrently via queues Q1 and Q2. Dealer Dl must consume the message from the queue Q1 and dealer D2 to must consume a message from the queue Q2.

Dealer D1 has implemented a retry mechanism to reprocess the transaction in case of any errors while processing the inventers updates. Dealer D2 has not implemented any retry mechanism.

How should the dealers acknowledge the message to avoid message loss and minimize impact on the current implementation?

A.

Dealer D1 must use auto acknowledgement and dealer D2 can use manual acknowledgement and acknowledge the message after successful processing

B.

Dealer D1 can use auto acknowledgement and dealer D2 can use IMMEDIATE acknowledgement and acknowledge the message of successful processing

C.

Dealer D1 and dealer D2 must use AUTO acknowledgement and acknowledge the message after successful processing

D.

Dealer D1 can use AUTO acknowledgement and dealer D2 must use manual acknowledgement and acknowledge the message

after successful processing

Full Access
Question # 24

What approach configures an API gateway to hide sensitive data exchanged between API consumers and API implementations, but can convert tokenized fields back to their original value for other API requests or responses, without having to recode the API implementations?

A.

Create both masking and tokenization formats and use both to apply a tokenization policy in an API gateway to mask sensitive values in message payloads withcharacters, and apply a corresponding detokenization policy to return the original

values to other APIs

B.

Create a masking format and use it to apply a tokenization policy in an API gateway to mask sensitive values in message payloads with characters, and apply a corresponding detokenization policy to return the original values to other APIs

C.

Use a field-level encryption policy in an API gateway to replace sensitive fields in message payload with encrypted values, and apply a corresponding field-level

decryption policy to return the original values to other APIs

D.

Create a tokenization format and use it to apply a tokenization policy in an API gateway to replace sensitive fields in message payload with similarly formatted

tokenized values, and apply a corresponding detokenization policy to return the original values to other APIs

Full Access
Question # 25

What Mule application can have API policies applied by Anypoint Platform to the endpoint exposed by that Mule application?

A.

A Mule application that accepts requests over HTTP/1x

B.

A Mule application that accepts JSON requests over TCP but is NOT required to provide a response.

C.

A Mule application that accepts JSON requests over WebSocket

D.

A Mule application that accepts gRPC requests over HTTP/2

Full Access
Question # 26

What best describes the Fully Qualified Domain Names (FQDNs), also known as DNS entries, created when a Mule application is deployed to the CloudHub Shared Worker Cloud?

A.

A fixed number of FQDNs are created, IRRESPECTIVE of the environment and VPC design

B.

The FQDNs are determined by the application name chosen, IRRESPECTIVE of the region

C.

The FQDNs are determined by the application name, but can be modified by an administrator after deployment

D.

The FQDNs are determined by both the application name and the region

Full Access
Question # 27

An integration team follows MuleSoft’s recommended approach to full lifecycle API development.

Which activity should this team perform during the API implementation phase?

A.

Validate the API specification

B.

Use the API specification to build the MuleSoft application

C.

Design the API specification

D.

Use the API specification to monitor the MuleSoft application

Full Access
Question # 28

A Mule application is deployed to a cluster of two(2) cusomter-hosted Mule runtimes. Currently the node name Alice is the primary node and node named bob is the secondary node. The mule application has a flow that polls a directory on a file system for new files.

The primary node Alice fails for an hour and then restarted.

After the Alice node completely restarts, from what node are the files polled, and what node is now the primary node for the cluster?

A.

Files are polled from Alice node

Alice is now the primary node

B.

Files are polled form Bob node

Alice is now the primary node

C.

Files are polled from Alice node

Bob is the now the primary node

D.

Files are polled form Bob node

Bob is now the primary node

Full Access
Question # 29

A company is designing an integration Mule application to process orders by submitting them to a back-end system for offline processing. Each order will be received by the Mule application through an HTTP5 POST and must be acknowledged immediately.

Once acknowledged the order will be submitted to a back-end system. Orders that cannot be successfully submitted due to the rejections from the back-end system will need to be processed manually (outside the banking system).

The mule application will be deployed to a customer hosted runtime and will be able to use an existing ActiveMQ broker if needed. The ActiveMQ broker is located inside the organization's firewall. The back-end system has a track record of unreliability due to both minor network connectivity issues and longer outages.

Which combination of Mule application components and ActiveMQ queues are required to ensure automatic submission of orders to the back-end system while supporting but minimizing manual order processing?

A.

One or more On Error scopes to assist calling the back-end system An Untill successful scope containing VM components for long retries A persistent dead-letter VM queue configure in Cloud hub

B.

An Until Successful scope to call the back-end system One or more ActiveMQ long-retry queues One or more ActiveMQ dead-letter queues for manual processing

C.

One or more on-Error scopes to assist calling the back-end system one or more ActiveMQ long-retry queues A persistent dead-letter Object store configuration in the CloudHub object store service

D.

A batch job scope to call the back in system An Untill successful scope containing Object Store components for long retries. A dead-letter object store configured in the Mule application

Full Access
Question # 30

An organization has various integrations implemented as Mule applications. Some of these Mule applications are deployed to custom hosted Mule runtimes (on-premises) while others execute in the MuleSoft-hosted runtime plane (CloudHub). To perform the Integra functionality, these Mule applications connect to various backend systems, with multiple applications typically needing to access the backend systems.

How can the organization most effectively avoid creating duplicates in each Mule application of the credentials required to access the backend systems?

A.

Create a Mule domain project that maintains the credentials as Mule domain-shared resources Deploy the Mule applications to the Mule domain, so the credentials are available to the Mule applications

B.

Store the credentials in properties files in a shared folder within the organization's data center Have the Mule applications load properties files from this shared location at startup

C.

Segregate the credentials for each backend system into environment-specific properties files Package these properties files in each Mule application, from where they are loaded at startup

D.

Configure or create a credentials service that returns the credentials for each backend system, and that is accessible from customer-hosted and MuleSoft-hosted Mule runtimes Have the Mule applications toad the properties at startup by invoking that credentials service

Full Access
Question # 31

A mule application is being designed to perform product orchestration. The Mule application needs to join together the responses from an inventory API and a Product Sales History API with the least latency.

To minimize the overall latency. What is the most idiomatic (used for its intended purpose) design to call each API request in the Mule application?

A.

Call each API request in a separate lookup call from Dataweave reduce operator

B.

Call each API request in a separate route of a Scatter-Gather

C.

Call each API request in a separate route of a Parallel For Each scope

D.

Call each API request in a separate Async scope

Full Access
Question # 32

Refer to the exhibit.

An organization uses a 2-node Mute runtime cluster to host one stateless API implementation. The API is accessed over HTTPS through a load balancer that uses round-robin for load distribution.

Two additional nodes have been added to the cluster and the load balancer has been configured to recognize the new nodes with no other change to the load balancer.

What average performance change is guaranteed to happen, assuming all cluster nodes are fully operational?

A.

50% reduction in the response time of the API

B.

100% increase in the throughput of the API

C.

50% reduction In the JVM heap memory consumed by each node

D.

50% reduction In the number of requests being received by each node

Full Access
Question # 33

Which Anypoint Platform component helps integration developers discovers and share reusable APIs, connectors, and templates?

A.

Anypoint Exchange

B.

API Manager

C.

Anypoint Studio

D.

Design Center

Full Access
Question # 34

A new Mule application under development must implement extensive data transformation logic. Some of the data transformation functionality is already available as external transformation services that are mature and widely used across the organization; the rest is highly specific to the new Mule application.

The organization follows a rigorous testing approach, where every service and application must be extensively acceptance tested before it is allowed to go into production.

What is the best way to implement the data transformation logic for this new Mule application while minimizing the overall testing effort?

A.

Implement and expose all transformation logic as mlaoservices using DataWeave, so it can be reused by any application component that needs it, including the new Mule application

B.

Implement transformation logic in the new Mute application using DataWeave, replicating the transformation logic of existing transformation services

C.

Extend the existing transformation services with new transformation logic and Invoke them from the new Mule application

D.

Implement transformation logic in the new Mute application using DataWeave, invoking existing transformation services when possible

Full Access
Question # 35

A high-volume eCommerce retailer receives thousands of orders per hour and requires notification of its order management, warehouse, and billing system for subsequent processing within 15 minutes of order submission through its website.

Which integration technology, when used for its typical and intended purpose, meets the retailer’s requirements for this use case?

A.

Managed File Transfer (MFT)

B.

Publish/Subscriber Messaging Bus (Pub/Sub)

C.

Enterprise Data Warehouse (EDW)

D.

Extract Transform Load (ETL)

Full Access
Question # 36

Additional nodes are being added to an existing customer-hosted Mule runtime cluster to improve performance. Mule applications deployed to this cluster are invoked by API clients through a load balancer.

What is also required to carry out this change?

A.

A new load balancer must be provisioned to allow traffic to the new nodes in a round-robin fashion

B.

External monitoring tools or log aggregators must be configured to recognize the new nodes

C.

API implementations using an object store must be adjusted to recognize the new nodes and persist to them

D.

New firewall rules must be configured to accommodate communication between API clients and the new nodes

Full Access
Question # 37

An API client makes an HTTP request to an API gateway with an Accept header containing the value’’ application’’.

What is a valid HTTP response payload for this request in the client requested data format?

A.

healthy

B.

{"status" "healthy"}

C.

status(‘healthy")

D.

status: healthy

Full Access
Question # 38

A company is building an application network and has deployed four Mule APIs: one experience API, one process API, and two system APIs. The logs from all the APIs are aggregated in an external log aggregation tool. The company wants to trace messages that are exchanged between multiple API implementations. What is the most idiomatic (based on its intended use) identifier that should be used to implement Mule event tracing across the multiple API implementations?

A.

Mule event ID

B.

Mule correlation ID

C.

Client's IP address

D.

DataWeave UUID

Full Access
Question # 39

How should the developer update the logging configuration in order to enable this package specific debugging?

A.

In Anypoint Monitoring, define a logging search query with class property set to org.apache.cxf and level set to DEBUG

B.

In the Mule application's log4j2.xml file, add an AsyncLogger element with name property set to org.apache.cxf and level set to DEBUG, then redeploy the Mule application in the CloudHub production environment

C.

In the Mule application's log4j2.xmI file, change the root logger's level property to DEBUG, then redeploy the Mule application to the CloudHub production environment

D.

In Anypoint Runtime Manager, in the Deployed Application Properties tab for the Mule application, add a line item with DEBUG level for package org.apache.cxf and apply the changes

Full Access
Question # 40

When a Mule application using VM queues is deployed to a customer-hosted cluster or multiple CloudHub v1.0 workers/replicas, how are messages consumed across the nodes?

A.

Sequentially, from a dedicated Anypoint MQ queue

B.

Sequentially, only from the primary node

C.

In a non-deterministic way

D.

Round-robin, within an XA transaction

Full Access
Question # 41

A Mule application contains a Batch Job with two Batch Steps (Batch_Step_l and Batch_Step_2). A payload with 1000 records is received by the Batch Job.

How many threads are used by the Batch Job to process records, and how does each Batch Step process records within the Batch Job?

A.

Each Batch Job uses SEVERAL THREADS for the Batch Steps Each Batch Step instance receives ONE record at a time as the payload, and RECORDS are processed IN PARALLEL within and between the two Batch Steps

B.

Each Batch Job uses a SINGLE THREAD for all Batch steps Each Batch step instance receives ONE record at a time as the payload, and RECORDS are processed IN ORDER, first through Batch_Step_l and then through Batch_Step_2

C.

Each Batch Job uses a SINGLE THREAD to process a configured block size of record Each Batch Step instance receives A BLOCK OF records as the payload, and BLOCKS of records are processed IN ORDER

D.

Each Batch Job uses SEVERAL THREADS for the Batch Steps Each Batch Step instance receives ONE record at a time as the payload, and BATCH STEP INSTANCES execute IN PARALLEL to process records and Batch Steps in ANY order as fast as possible

Full Access
Question # 42

A rale limiting policy has been applied to a soap VI.2 API published in Clondhub. The API implementation catches errors in a global error handler on error propagate in the main flow for HTTP: RETRY_EXHAUSTED with HTTP status set to 429 and any with the HTTP status set to 500.

What is the expected H1TP status when the client exceeds the quota of the API calls?

A.

HTTP status 429 as defined in the HTTP:RETRY EXHAUSTED error handler in the API B. HTTP status 500 as defined in the ANY error handler in the API since an API:RETRY_EXHAUSTED will be generated

B.

HTTP status 401 unauthorized for policy violation

C.

HTTP status 400 from the rate-limiting policy violation since the call does not reach the back-end

Full Access
Question # 43

A retail company is implementing a MuleSoft API to get inventory details from two vendors by Invoking each vendor's online applications. Due to network issues, the invocations to the vendor applications are timing out intermittently, but the requests are successful after re-invoking each

vendor application.

What is the most performant way of implementing the API to invoke each vendor application and to retry invocations that generate timeout errors?

A.

Use a For-Each scope to invoke the two vendor applications in series, one after the other.

Place the For-Each scope inside an Until-Successful scope to retry requests that raise timeout errors.

B.

Use a Choice scope to Invoke each vendor application on a separate route.

Place the Choice scope inside an Until-Successful scope to retry requests that raise

timeout errors.

C.

Use a Scatter-Gather scope to invoke each vendor application on a separate route.

Use an Until-Successful scope in each route to retry requests that raise timeout errors.

D.

Use a Round-Robin scope to invoke each vendor application on a separate route.

Use a Try-Catch scope in each route to retry requests that raise timeout errors.

Full Access
Question # 44

A leading bank implementing new mule API.

The purpose of API to fetch the customer account balances from the backend application and display them on the online platform the online banking platform. The online banking platform will send an array of accounts to Mule API get the account balances.

As a part of the processing the Mule API needs to insert the data into the database for auditing purposes and this process should not have any performance related implications on the account balance retrieval flow

How should this requirement be implemented to achieve better throughput?

A.

Implement the Async scope fetch the data from the backend application and to insert records in the Audit database

B.

Implement a for each scope to fetch the data from the back-end application and to insert records into the Audit database

C.

Implement a try-catch scope to fetch the data from the back-end application and use the Async scope to insert records into the Audit database

D.

Implement parallel for each scope to fetch the data from the backend application and use Async scope to insert the records into the Audit database

Full Access
Question # 45

An organization is designing Mule application which connects to a legacy backend. It has been reported that backend services are not highly available and experience downtime quite often. As an integration architect which of the below approach you would propose to achieve high reliability goals?

A.

Alerts can be configured in Mule runtime so that backend team can be communicated when services are down

B.

Until Successful scope can be implemented while calling backend API's

C.

On Error Continue scope to be used to call in case of error again

D.

Create a batch job with all requests being sent to backend using that job as per the availability of backend API's

Full Access
Question # 46

A mule application is required to periodically process large data set from a back-end database to Salesforce CRM using batch job scope configured properly process the higher rate of records.

The application is deployed to two cloudhub workers with no persistence queues enabled.

What is the consequence if the worker crashes during records processing?

A.

Remaining records will be processed by a new replacement worker

B.

Remaining records be processed by second worker

C.

Remaining records will be left and processed

D.

All the records will be processed from scratch by the second worker leading to duplicate processing

Full Access
Question # 47

An integration Mute application is being designed to process orders by submitting them to a backend system for offline processing. Each order will be received by the Mute application through an HTTPS POST and must be acknowledged immediately. Once acknowledged, the order will be submitted to a backend system. Orders that cannot be successfully submitted due to rejections from the backend system will need to be processed manually (outside the backend system).

The Mule application will be deployed to a customer-hosted runtime and is able to use an existing ActiveMQ broker if needed.

The backend system has a track record of unreliability both due to minor network connectivity issues and longer outages.

What idiomatic (used for their intended purposes) combination of Mule application components and ActiveMQ queues are required to ensure automatic submission of orders to the backend system, while minimizing manual order processing?

A.

An On Error scope Non-persistent VM ActiveMQ Dead Letter Queue for manual processing

B.

An On Error scope MuleSoft Object Store ActiveMQ Dead Letter Queue for manual processing

C.

Until Successful component MuleSoft Object Store ActiveMQ is NOT needed or used

D.

Until Successful component ActiveMQ long retry Queue ActiveMQ Dead Letter Queue for manual processing

Full Access
Question # 48

Why would an Enterprise Architect use a single enterprise-wide canonical data model (CDM) when designing an integration solution using Anypoint Platform?

A.

To reduce dependencies when integrating multiple systems that use different data formats

B.

To automate Al-enabled API implementation generation based on normalized backend databases from separate vendors

C.

To leverage a data abstraction layer that shields existing Mule applications from nonbackward compatible changes to the model's data structure

D.

To remove the need to perform data transformation when processing message payloads in Mule applications

Full Access
Question # 49

An organization is sizing an Anypoint VPC to extend their internal network to Cloudhub.

For this sizing calculation, the organization assumes 150 Mule applications will be deployed among three(3) production environments and will use Cloudhub’s default zero-downtime feature. Each Mule application is expected to be configured with two(2) Cloudhub workers.This is expected to result in several Mule application deployments per hour.

A.

10.0.0.0/21(2048 IPs)

B.

10.0.0.0/22(1024IPs)

C.

10.0.0.0/23(512 IPs)

D.

10.0.0.0/24(256 IPs)

Full Access
Question # 50

Refer to the exhibit.

A business process involves two APIs that interact with each other asynchronously over HTTP. Each API is implemented as a Mule application. API 1 receives the initial HTTP request and invokes API 2 (in a fire and forget fashion) while API 2, upon completion of the processing, calls back into API l to notify about completion of the asynchronous process.

Each API Is deployed to multiple redundant Mule runtimes and a separate load balancer, and is deployed to a separate network zone.

In the network architecture, how must the firewall rules be configured to enable the above Interaction between API 1 and API 2?

A.

To authorize the certificate to be used both APIs

B.

To enable communication from each API’s Mule Runtimes and Network zone to the load balancer of the other API

C.

To open direct two-way communication between the Mule Runtimes of both API’s

D.

To allow communication between load balancers used by each API

Full Access
Question # 51

Following MuleSoft best practices, what MuleSoft runtime deployment option best meets the company's goals to begin its digital transformation journey?

A.

Runtime Fabric on VMs/bare metal

B.

CloudHub runtimes

C.

Customer-hosted runtimes provisioned by a MuleSoft services partner

D.

Customer-hosted self-provisioned runtimes

Full Access
Question # 52

A manufacturing company is developing a new set of APIs for its retail business. One of the APIs is a Master Look Up API, which is a System API,

The API uses a persistent object-store. This API will be used by almost all other APIs to provide master lookup data.

The Master Look Up API is deployed on two CloudHub workers of 0.1 vCore each because there is a lot of master data to be cached. Most of the master

lookup data is stored as a key-value pair. The cache gets refreshed if the key is not found in the cache.

During performance testing, it was determined that the Master Look Up API has a high response time due to the latency of database queries executed to fetch the master lookup data.

What two methods can be used to resolve these performance issues?

Choose 2 answers

A.

Implement the HTTP caching policy for all GET endpoints for the Master Look Up API

B.

Implement an HTTP caching policy for all GET endpoints in the Master Look Up API

C.

Implement locking to synchronize access to the Object Store

D.

Upgrade the vCore size from 0.1 vCore to 0.2 vCore

Full Access
Question # 53

What is required before an API implemented using the components of Anypoint Platform can be managed and governed (by applying API policies) on Anypoint Platform?

A.

The API must be published to Anypoint Exchange and a corresponding API instance ID must be obtained from API Manager to be used in the API implementation

B.

The API implementation source code must be committed to a source control management system (such as GitHub)

C.

A RAML definition of the API must be created in API designer so it can then be published to Anypoint Exchange

D.

The API must be shared with the potential developers through an API portal so API consumers can interact with the API

Full Access
Question # 54

What is an advantage of using OAuth 2.0 client credentials and access tokens over only API keys for API authentication?

A.

If the access token is compromised, the client credentials do not to be reissued.

B.

If the access token is compromised, I can be exchanged for an API key.

C.

If the client ID is compromised, it can be exchanged for an API key

D.

If the client secret is compromised, the client credentials do not have to be reissued.

Full Access
Question # 55

According to MuleSoft, which deployment characteristic applies to a microservices application architecture?

A.

Services exist as independent deployment artifacts and can be scaled -independently of other services

B.

All services of an application can be deployed together as single Java WAR file

C.

A deployment to enhance one capability requires a redeployment of all capabilities

D.

Core business capabilities are encapsulated in a single, deployable application

Full Access
Question # 56

An insurance company has an existing API which is currently used by customers. API is deployed to customer hosted Mule runtime cluster. The load balancer that is used to access any APIs on the mule cluster is only configured to point to applications hosted on the server at port 443.

Mule application team of a company attempted to deploy a second API using port 443 but the application will not start and checking logs shows an error indicating the address is already in use.

Which steps must the organization take to resolve this error and allow customers to access both the API's?

A.

Change the base path of the HTTP listener configuration in the second API to a different one from the first API

B.

Set HTTP listener configuration in both API's to allow for connections from multiple ports

C.

Move the HTTP listener configurations from the API's and package them in a mule domain project using port 443

D.

Set the HTTP listener of the second API to use different port than the one used in the first API

Full Access
Question # 57

A new upstream API Is being designed to offer an SLA of 500 ms median and 800 ms maximum (99th percentile) response time. The corresponding API implementation needs to sequentially invoke 3 downstream APIs of very similar complexity. The first of these downstream APIs offers the following SLA for its response time: median: 100 ms, 80th percentile: 500 ms, 95th percentile: 1000 ms. If possible, how can a timeout be set in the upstream API for the invocation of the first downstream API to meet the new upstream API's desired SLA?

A.

Set a timeout of 100 ms; that leaves 400 ms for the other two downstream APIs to complete

B.

Do not set a timeout; the Invocation of this API Is mandatory and so we must wait until it responds

C.

Set a timeout of 50 ms; this times out more invocations of that API but gives additional room for retries

D.

No timeout is possible to meet the upstream API's desired SLA; a different SLA must be negotiated with the first downstream API or invoke an alternative API

Full Access
Question # 58

An airline is architecting an API connectivity project to integrate its flight data into an online aggregation website. The interface must allow for secure communication high-performance and asynchronous message exchange.

What are suitable interface technologies for this integration assuming that Mulesoft fully supports these technologies and that Anypoint connectors exist for these interfaces?

A.

AsyncAPI over HTTPS

AMQP with RabbitMQ JSON/REST over HTTPS

B.

XML over ActiveMQ XML over SFTP XML/REST over HTTPS

C.

CSV over FTP YAM L over TLS JSON over HTTPS

D.

SOAP over HTTPS HOP over TLS gRPC over HTTPS

Full Access
Question # 59

What aspect of logging is only possible for Mule applications deployed to customer-hosted Mule runtimes, but NOT for Mule applications deployed to CloudHub?

A.

To send Mule application log entries to Splunk

B.

To change tog4j2 tog levels in Anypoint Runtime Manager without having to restart the Mule application

C.

To log certain messages to a custom log category

D.

To directly reference one shared and customized log4j2.xml file from multiple Mule applications

Full Access
Question # 60

Which productivity advantage does Anypoint Platform have to both implement and manage an AP?

A.

Automatic API proxy generation

B.

Automatic API specification generation

C.

Automatic API semantic versioning

D.

Automatic API governance

Full Access
Question # 61

What are two reasons why a typical MuleSoft customer favors a MuleSoft-hosted Anypoint Platform runtime plane over a customer-hosted runtime for its Mule application deployments? (Choose two.)

A.

Reduced application latency

B.

Increased application isolation

C.

Reduced time-to-market for the first application

D.

Increased application throughput

E.

Reduced IT operations effort

Full Access
Question # 62

A developer is examining the responses from a RESTful web service that is compliant with the Mypertext Transfer Protocol (HTTP/1.1) a8 defined by the Internet Engineering Task Force (IETF).

In this HTTP/1.1-compliant web service, which class of HTTP response status codes should be specified to indicate when client requests are successfully received, understood, and accepted by the web service?

A.

3xx

B.

2xx

C.

4xx

D.

5xx

Full Access
Question # 63

A company is planning to migrate its deployment environment from on-premises cluster to a Runtime Fabric (RTF) cluster. It also has a requirement to enable Mule applications deployed to a Mule runtime instance to store and share data across application replicas and restarts.

How can these requirements be met?

A.

Anypoint object store V2 to share data between replicas in the RTF cluster

B.

Install the object store pod on one of the cluster nodes

C.

Configure Persistence Gateway in any of the servers using Mule Object Store

D.

Configure Persistent Gateway at the RTF

Full Access
Question # 64

According to MuteSoft, which principle is common to both Service Oriented Architecture (SOA) and API-led connectivity approaches?

A.

Service centralization

B.

Service statefulness

C.

Service reusability

D.

Service interdependence

Full Access
Question # 65

Mule application muleA deployed in cloudhub uses Object Store v2 to share data across instances. As a part of new requirement , application muleB which is deployed in same region wants to access this Object Store.

Which of the following option you would suggest which will have minimum latency in this scenario?

A.

Object Store REST API

B.

Object Store connector

C.

Both of the above option will have same latency

D.

Object Store of one mule application cannot be accessed by other mule application.

Full Access
Question # 66

As a part of design , Mule application is required call the Google Maps API to perform a distance computation. The application is deployed to cloudhub.

At the minimum what should be configured in the TLS context of the HTTP request configuration to meet these requirements?

A.

The configuration is built-in and nothing extra is required for the TLS context

B.

Request a private key from Google and create a PKCS12 file with it and add it in keyStore as a part of TLS context

C.

Download the Google public certificate from a browser, generate JKS file from it and add it in key store as a part of TLS context

D.

Download the Google public certificate from a browser, generate a JKS file from it and add it in Truststore as part of the TLS context

Full Access
Question # 67

Which Exchange asset type represents configuration modules that extend the functionality of an API and enforce capabilities such as security?

A.

Rulesets

B.

Policies

C.

RESTAPIs

D.

Connectors

Full Access
Question # 68

An XA transaction Is being configured that involves a JMS connector listening for Incoming JMS messages. What is the meaning of the timeout attribute of the XA transaction, and what happens after the timeout expires?

A.

The time that is allowed to pass between committing the transaction and the completion of the Mule flow After the timeout, flow processing triggers an error

B.

The time that Is allowed to pass between receiving JMS messages on the same JMS connection After the timeout, a new JMS connection Is established

C.

The time that Is allowed to pass without the transaction being ended explicitly After the timeout, the transaction Is forcefully rolled-back

D.

The time that Is allowed to pass for state JMS consumer threads to be destroyed After the timeout, a new JMS consumer thread is created

Full Access
Question # 69

A MuteSoft developer must implement an API as a Mule application, run the application locally, and execute unit tests against the Running application.

Which Anypoint Platform component can the developer use to full all of these requirements?

A.

API Manager

B.

API Designer

C.

Anypoint CLI

D.

Anypoint Studio

Full Access
Question # 70

Anypoint Exchange is required to maintain the source code of some of the assets committed to it, such as Connectors, Templates, and API specifications.

What is the best way to use an organization's source-code management (SCM) system in this context?

A.

Organizations should continue to use an SCM system of their choice, in addition to keeping source code for these asset types in Anypoint Exchange, thereby enabling parallel development, branching, and merging

B.

Organizations need to use Anypoint Exchange as the main SCM system to centralize versioning and avoid code duplication

C.

Organizations can continue to use an SCM system of their choice for branching and merging, as long as they follow the branching and merging strategy enforced by Anypoint Exchange

D.

Organizations need to point Anypoint Exchange to their SCM system so Anypoint Exchange can pull source code when requested by developers and provide it to Anypoint Studio

Full Access
Question # 71

Which Mulesoft feature helps users to delegate their access without sharing sensitive credentials or giving full control of accounts to 3rd parties?

A.

Secure Scheme

B.

client id enforcement policy

C.

Connected apps

D.

Certificates

Full Access
Question # 72

A trading company handles millions of requests a day. Due to nature of its business, it requires excellent

performance and reliability within its application.

For this purpose, company uses a number of event-based API's hosted on various mule clusters that communicate across a shared message queue sitting within its network.

Which method should be used to meet the company's requirement for its system?

A.

XA transactions and XA connected components

B.

JMS transactions

C.

JMS manual acknowledgements with a reliability pattern

D.

VM queues with reliability pattern

Full Access
Question # 73

In which order are the API Client, API Implementation, and API interface components called in a typical REST request?

A.

API Client > API implementation > API Interface

B.

API interface > API Client > API Implementation

C.

API Client > API Interface > API implementation

D.

API Implementation > API Interface > API Client

Full Access
Question # 74

Refer to the exhibit.

The HTTP Listener and the Logger are being handled from which thread pools respectively?

A.

CPU_INTENSIVE and Dedicated Selector pool

B.

UBER and NONBLOCKING

C.

Shared Selector Pool and CPU LITE

D.

BLOCKING _IO and UBER

Full Access
Question # 75

Which of the below requirements prevent the usage of Anypoint MQ in a company's network? (Choose two answers)

A.

single message payload can be up to 15 MB

B.

payloads must be encrypted

C.

the message broker must be hosted on premises

D.

support for point-to-point messaging

E.

ability for a third party outside the company's network to consume events from the queue

Full Access
Question # 76

An insurance provider is implementing Anypoint platform to manage its application infrastructure and is using the customer hosted runtime for its business due to certain financial requirements it must meet. It has built a number of synchronous API's and is currently hosting these on a mule runtime on one server

These applications make use of a number of components including heavy use of object stores and VM queues.

Business has grown rapidly in the last year and the insurance provider is starting to receive reports of reliability issues from its applications.

The DevOps team indicates that the API's are currently handling too many requests and this is over loading the server. The team has also mentioned that there is a significant downtime when the server is down for maintenance.

As an integration architect, which option would you suggest to mitigate these issues?

A.

Add a load balancer and add additional servers in a server group configuration

B.

Add a load balancer and add additional servers in a cluster configuration

C.

Increase physical specifications of server CPU memory and network

D.

Change applications by use an event-driven model

Full Access
Question # 77

Which Salesforce API is invoked to deploy, retrieve, create, update, or delete customization information, such as custom object definitions using Mule Salesforce Connectors in a Mule application?

A.

sObject Platform Action API

B.

User Interface API

C.

Metadata API

D.

Process Rules API

Full Access
Question # 78

According to MuleSoft, what is a major distinguishing characteristic of an application network in relation to the integration of systems, data, and devices?

A.

It uses a well-organized monolithic approach with standards

B.

It is built for change and self-service

C.

It leverages well-accepted internet standards like HTTP and JSON

D.

It uses CI/CD automation for real-time project delivery

Full Access
Question # 79

Refer to the exhibit.

One of the backend systems invoked by an API implementation enforces rate limits on the number of requests a particular client can make. Both the backend system and the API implementation are deployed to several non-production environments in addition to production.

Rate limiting of the backend system applies to all non-production environments. The production environment, however, does NOT have any rate limiting.

What is the most effective approach to conduct performance tests of the API implementation in a staging (non-production) environment?

A.

Create a mocking service that replicates the backend system's production performance characteristics. Then configure the API implementation to use the mocking service and conduct the performance tests

B.

Use MUnit to simulate standard responses from the backend system then conduct performance tests to identify other bottlenecks in the system

C.

Include logic within the API implementation that bypasses invocations of the backend system in a performance test situation. Instead invoking local stubs that replicate typical backend system responses then conduct performance tests using this API Implementation

D.

Conduct scaled-down performance tests in the staging environment against the rate limited backend system then upscale performance results to full production scale

Full Access
Question # 80

A project uses Jenkins to implement CI/CD process. It was observed that each Mule package contains some of the Jenkins files and folders for configurations of CI/CD jobs.

As these files and folders are not part of the actual package, expectation is that these should not be part of deployed archive.

Which file can be used to exclude these files and folders from the deployed archive?

A.

muleignore

B.

_unTrackMule

C.

mulelnclude

D.

_muleExclude

Full Access
Question # 81

A customer wants to use the mapped diagnostic context (MDC) and logging variables to enrich its logging and improve tracking by providing more context in the logs.

The customer also wants to improve the throughput and lower the latency of message processing.

As an Mulesoft integration architect can you advise, what should the customer implement to meet these requirements?

A.

Use synchronous logging and use pattern layout with [%MDC] in the log4j2.xml configuration file and then configure the logging variables

B.

Useasync logger at the level greater than INFO and use pattern layout with [%MDC] in the log4j2,xml configuration file and then configure the logging variables

C.

Useasync logger at the level equal to DEBUG orTRACEand use pattern

layout with [%MDC] in the log4j2.xml configuration file and then configure the logging variables

D.

Use synchronous logging at the INFO DEBUG or Trace level and use pattern layout with [%MDC] in the log4j2.xml configuration file and then configure the logging variables

Full Access