New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

MuleSoft-Integration-Architect-I Questions and Answers

Question # 6

Refer to the exhibit.

An organization uses a 2-node Mute runtime cluster to host one stateless API implementation. The API is accessed over HTTPS through a load balancer that uses round-robin for load distribution.

Two additional nodes have been added to the cluster and the load balancer has been configured to recognize the new nodes with no other change to the load balancer.

What average performance change is guaranteed to happen, assuming all cluster nodes are fully operational?

A.

50% reduction in the response time of the API

B.

100% increase in the throughput of the API

C.

50% reduction In the JVM heap memory consumed by each node

D.

50% reduction In the number of requests being received by each node

Full Access
Question # 7

An organization has defined a common object model in Java to mediate the communication between different Mule applications in a consistent way. A Mule application is being built to use this common object model to process responses from a SOAP API and a REST API and then write the processed results to an order management system.

The developers want Anypoint Studio to utilize these common objects to assist in creating mappings for various transformation steps in the Mule application.

What is the most idiomatic (used for its intended purpose) and performant way to utilize these common objects to map between the inbound and outbound systems in the Mule application?

A.

Use JAXB (XML) and Jackson (JSON) data bindings

B.

Use the WSS module

C.

Use the Java module

D.

Use the Transform Message component

Full Access
Question # 8

A Mule application is being designed to do the following:

Step 1: Read a SalesOrder message from a JMS queue, where each SalesOrder consists of a header and a list of SalesOrderLineltems.

Step 2: Insert the SalesOrder header and each SalesOrderLineltem into different tables in an RDBMS.

Step 3: Insert the SalesOrder header and the sum of the prices of all its SalesOrderLineltems into a table In a different RDBMS.

No SalesOrder message can be lost and the consistency of all SalesOrder-related information in both RDBMSs must be ensured at all times.

What design choice (including choice of transactions) and order of steps addresses these requirements?

A.

1) Read the JMS message (NOT in an XA transaction)

2) Perform BOTH DB inserts in ONE DB transaction

3) Acknowledge the JMS message

B.

1) Read the JMS message (NOT in an XA transaction)

2) Perform EACH DB insert in a SEPARATE DB transaction

3) Acknowledge the JMS message

C.

1) Read the JMS message in an XA transaction

2) In the SAME XA transaction, perform BOTH DB inserts but do NOT acknowledge the JMS message

D.

1) Read and acknowledge the JMS message (NOT in an XA transaction)

2) In a NEW XA transaction, perform BOTH DB inserts

Full Access
Question # 9

As a part of project , existing java implementation is being migrated to Mulesoft. Business is very tight on the budget and wish to complete the project in most economical way possible.

Canonical object model using java is already a part of existing implementation. Same object model is required by mule application for a business use case. What is the best way to achieve this?

A.

Make use of Java module

B.

Create similar model for Mule applications

C.

Create a custom application to read Java code and make it available for Mule application

D.

Use Anypoint exchange

Full Access
Question # 10

When the mule application using VM is deployed to a customer-hosted cluster or multiple cloudhub workers, how are messages consumed by the Mule engine?

A.

in non-deterministic way

B.

by starting an XA transaction for each new message

C.

in a deterministic way

D.

the primary only in order to avoid duplicate processing

Full Access
Question # 11

A platform architect includes both an API gateway and a service mesh in the architect of a distributed application for communication management.

Which type of communication management does a service mesh typically perform in this architecture?

A.

Between application services and the firewall

B.

Between the application and external API clients

C.

Between services within the application

D.

Between the application and external API implementations.

Full Access
Question # 12

Refer to the exhibit.

A customer is running Mule applications on Runtime Fabric for Self-Managed Kubernetes

(RTF-BYOKS) in a multi-cloud environment.

Based on this configuration, how do Agents and Runtime Manager

communicate, and what Is exchanged between them?

A.

BLOCKING_IO, UBER

B.

UBER, Dedicated NIO Selector Pool

C.

CPU_LITE, CPU_INTENSIVE

D.

Shared NIO Selector Pool, CPU_LITE

Full Access
Question # 13

A project uses Jenkins to implement CI/CD process. It was observed that each Mule package contains some of the Jenkins files and folders for configurations of CI/CD jobs.

As these files and folders are not part of the actual package, expectation is that these should not be part of deployed archive.

Which file can be used to exclude these files and folders from the deployed archive?

A.

muleignore

B.

_unTrackMule

C.

mulelnclude

D.

_muleExclude

Full Access
Question # 14

An insurance company is implementing a MuleSoft API to get inventory details from the two vendors. Due to network issues, the invocations to vendor applications are getting timed-out intermittently. But the transactions are successful upon reprocessing

What is the most performant way of implementing this requirement?

A.

Implement a scatter-gather scope to invoke the two vendor

applications on two different route

Use the Until-Successful scope to implement the retry mechanism

for timeout errors on each route

B.

Implement a Choice scope to invoke the two vendor applications on two different route

Use the try-catch scope to implement the retry mechanism for timeout errors on each route

C.

Implement a For-Each scope to invoke the two vendor applications

Use until successful scope to implement the retry mechanism for the timeout errors

D.

Implement Round-Robin scope to invoke the two vendor applications on two different routes

Use the Try-Catch scope to implement retry mechanism for timeout errors on each route

Full Access
Question # 15

Which Anypoint Platform component should a MuleSoft developer use to create an API specification prior to building the API implementation?

A.

MUnit

B.

API Designer

C.

API Manager

D.

Runtime Manager

Full Access
Question # 16

A banking company is developing a new set of APIs for its online business. One of the critical API's is a master lookup API which is a system API. This master lookup API uses persistent object store. This API will be used by all other APIs to provide master lookup data.

Master lookup API is deployed on two cloudhub workers of 0.1 vCore each because there is a lot of master data to be cached. Master lookup data is stored as a key value pair. The cache gets refreshed if they key is not found in the cache.

Doing performance testing it was observed that the Master lookup API has a higher response time due to database queries execution to fetch the master lookup data.

Due to this performance issue, go-live of the online business is on hold which could cause potential financial loss to Bank.

As an integration architect, which of the below option you would suggest to resolve performance issue?

A.

Implement HTTP caching policy for all GET endpoints for the master lookup API and implement locking to synchronize access to object store

B.

Upgrade vCore size from 0.1 vCore to 0,2 vCore

C.

Implement HTTP caching policy for all GET endpoints for master lookup API

D.

Add an additional Cloudhub worker to provide additional capacity

Full Access
Question # 17

An organization's governance process requires project teams to get formal approval from all key stakeholders for all new Integration design specifications. An integration Mule application Is being designed that interacts with various backend systems. The Mule application will be created using Anypoint Design Center or Anypoint Studio and will then be deployed to a customer-hosted runtime.

What key elements should be included in the integration design specification when requesting approval for this Mule application?

A.

SLAs and non-functional requirements to access the backend systems

B.

Snapshots of the Mule application's flows, including their error handling

C.

A list of current and future consumers of the Mule application and their contact details

D.

The credentials to access the backend systems and contact details for the administrator of each system

Full Access
Question # 18

What aspects of a CI/CD pipeline for Mule applications can be automated using MuleSoft-provided Maven plugins?

A.

Compile, package, unit test, validate unit test coverage, deploy

B.

Compile, package, unit test, deploy, integration test (Incorrect)

C.

Compile, package, unit test, deploy, create associated API instances in API Manager

D.

Import from API designer, compile, package, unit test, deploy, publish to Anypoint Exchange

Full Access
Question # 19

A gaming company has implemented an API as a Mule application and deployed the API implementation to a CloudHub 2.0 private space. The API implementation must connect to a mainframe application running in the customer’s on-premises corporate data center and also to a Kafka cluster running in an Amazon AWS VPC.

What is the most efficient way to enable the API to securely connect from its private space to the mainframe application and Kafka cluster?

A.

In Runtime Manager, set up VPC peering between the CloudHub 2.0 private network and the on-premises data center.

In the AWS account, set up VPC peering between the AWS VPC and the CloudHub 2.0 private network.

B)

In the AWS account, attach the CloudHub 2.0 private space to an AWS transit gateway tha

B.

Option A

C.

Option B

D.

Option C

E.

Option D

Full Access
Question # 20

According to MuleSoft, what Action should an IT organization take regarding its technology assets in order to close the IT delivery.

A.

Make assets easily discoverable via a central repository

B.

Focus project delivery efforts on custom assets that meet the specific requirements of each individual line of business

C.

Create weekly meetings that all members of IT attend to present justification and request approval to use existing assets

D.

Hire additional staff to meet the demand for asset creation required for approved projects and timelines

Full Access
Question # 21

An XA transaction Is being configured that involves a JMS connector listening for Incoming JMS messages. What is the meaning of the timeout attribute of the XA transaction, and what happens after the timeout expires?

A.

The time that is allowed to pass between committing the transaction and the completion of the Mule flow After the timeout, flow processing triggers an error

B.

The time that Is allowed to pass between receiving JMS messages on the same JMS connection After the timeout, a new JMS connection Is established

C.

The time that Is allowed to pass without the transaction being ended explicitly After the timeout, the transaction Is forcefully rolled-back

D.

The time that Is allowed to pass for state JMS consumer threads to be destroyed After the timeout, a new JMS consumer thread is created

Full Access
Question # 22

An organization has decided on a cloudhub migration strategy that aims to minimize the organizations own IT resources. Currently, the organizational has all of its Mule applications running on its own premises and uses an premises load balancer that exposes all APIs under the base URL https://api.acme.com

As part of the migration strategy, the organization plans to migrate all of its Mule applications and load balancer to cloudhub

What is the most straight-forward and cost effective approach to the Mule applications deployment and load balancing that preserves the public URLs?

A.

Deploy the Mule applications to Cloudhub

Update the CNAME record for an api.acme.com in the organizations DNS server pointing to the A record of a cloudhub dedicated load balancer(DLB)

Apply mapping rules in the DLB to map URLs to their corresponding Mule applications

B.

For each migrated Mule application, deploy an API proxy Mule application to Cloudhub with all applications under the control of a dedicated load balancer(CLB)

Update the CNAME record for api.acme.com in the organization DNS server pointing to the A record of a cloudhub dedicated load balancer(DLB)

Apply mapping rules in the DLB to map each API proxy application to its corresponding Mule applications

C.

Deploy the Mule applications to Cloudhub

Create CNAME record for api.acme.com in the Cloudhub Shared load balancer (SLB) pointing to the A record of the on-premise load balancer

Apply mapping rules in the SLB to map URLs to their corresponding Mule applications

D.

Deploy the Mule applications to Cloudhub

Update the CNAME record for api.acme.com in the organization DNS server pointing to the A record of the cloudhub shared load balancer(SLB)

Apply mapping rules in the SLB to map URLs to their corresponding Mule applications.

Full Access
Question # 23

An integration team follows MuleSoft’s recommended approach to full lifecycle API development.

Which activity should this team perform during the API implementation phase?

A.

Validate the API specification

B.

Use the API specification to build the MuleSoft application

C.

Design the API specification

D.

Use the API specification to monitor the MuleSoft application

Full Access
Question # 24

Refer to the exhibit.

A Mule 4 application has a parent flow that breaks up a JSON array payload into 200 separate items, then sends each item one at a time inside an Async scope to a VM queue.

A second flow to process orders has a VM Listener on the same VM queue. The rest of this flow processes each received item by writing the item to a database.

This Mule application is deployed to four CloudHub workers with persistent queues enabled.

What message processing guarantees are provided by the VM queue and the CloudHub workers, and how are VM messages routed among the CloudHub workers for each invocation of the parent flow under normal operating conditions where all the CloudHub workers remain online?

A.

EACH item VM message is processed AT MOST ONCE by ONE CloudHub worker, with workers chosen in a deterministic round-robin fashion Each of the four CloudHub workers can be expected to process 1/4 of the Item VM messages (about 50 items)

B.

EACH item VM message is processed AT LEAST ONCE by ONE ARBITRARY CloudHub worker Each of the four CloudHub workers can be expected to process some item VM messages

C.

ALL Item VM messages are processed AT LEAST ONCE by the SAME CloudHub worker where the parent flow was invoked

This one CloudHub worker processes ALL 200 item VM messages

D.

ALL item VM messages are processed AT MOST ONCE by ONE ARBITRARY CloudHub worker

This one CloudHub worker processes ALL 200 item VM messages

Full Access
Question # 25

An automation engineer needs to write scripts to automate the steps of the API lifecycle, including steps to create, publish, deploy and manage APIs and their implementations in Anypoint Platform.

What Anypoint Platform feature can be used to automate the execution of all these actions in scripts in the easiest way without needing to directly invoke the Anypoint Platform REST APIs?

A.

Automated Policies in API Manager

B.

Runtime Manager agent

C.

The Mule Maven Plugin

D.

Anypoint CLI

Full Access
Question # 26

A DevOps team has adequate observability of individual system behavior and performance, but it struggles to track the entire lifecycle of each request across different microservices.

Which additional observability approach should this team consider adopting?

A.

Analytics

B.

Metrics

C.

Tracing

D.

Data mining

Full Access
Question # 27

An organization is migrating all its Mule applications to Runtime Fabric (RTF). None of the Mule applications use Mule domain projects.

Currently, all the Mule applications have been manually deployed to a server group among several customer hosted Mule runtimes.

Port conflicts between these Mule application deployments are currently managed by the DevOps team who carefully manage Mule application properties files.

When the Mule applications are migrated from the current customer-hosted server group to Runtime Fabric (RTF), fo the Mule applications need to be rewritten and what DevOps port configuration responsibilities change or stay the same?

A.

Yes, the Mule applications Must be rewritten

DevOps No Longer needs to manage port conflicts between the Mule applications

B.

Yes, the Mule applications Must be rewritten

DevOps Must Still Manage port conflicts.

C.

NO, The Mule applications do NOT need to be rewritten

DevOps MUST STILL manage port conflicts

D.

NO, the Mule applications do NO need to be rewritten

DevOps NO LONGER needs to manage port conflicts between the Mule applications.

Full Access
Question # 28

What is an example of data confidentiality?

A.

Signing a file digitally and sending it using a file transfer mechanism

B.

Encrypting a file containing personally identifiable information (PV)

C.

Providing a server's private key to a client for secure decryption of data during a two-way SSL handshake

D.

De-masking a person's Social Security number while inserting it into a database

Full Access
Question # 29

As an enterprise architect, what are the two reasons for which you would use a canonical data model in the new integration project using Mulesoft Anypoint platform ( choose two answers )

A.

To have consistent data structure aligned in processes

B.

To isolate areas within a bounded context

C.

To incorporate industry standard data formats

D.

There are multiple canonical definitions of each data type

E.

Because the model isolates the back and systems and support mule applications from change

Full Access
Question # 30

An organization has several APIs that accept JSON data over HTTP POST. The APIs are all publicly available and are associated with several mobile applications and web applications. The organization does NOT want to use any authentication or compliance policies for these APIs, but at the same time, is worried that some bad actor could send payloads that could somehow compromise the applications or servers running the API implementations. What out-of-the-box Anypoint Platform policy can address exposure to this threat?

A.

Apply a Header injection and removal policy that detects the malicious data before it is used

B.

Apply an IP blacklist policy to all APIs; the blacklist will Include all bad actors

C.

Shut out bad actors by using HTTPS mutual authentication for all API invocations

D.

Apply a JSON threat protection policy to all APIs to detect potential threat vectors

Full Access
Question # 31

An organization plans to use the Anypoint Platform audit logging service to log Anypoint MQ actions.

What consideration must be kept in mind when leveraging Anypoint MQ Audit Logs?

A.

Anypoint MQ Audit Logs include logs for sending, receiving, or browsing messages

B.

Anypoint MQ Audit Logs include fogs for failed Anypoint MQ operations

C.

Anypoint MQ Audit Logs include logs for queue create, delete, modify, and purge operations

Full Access
Question # 32

An insurance company has an existing API which is currently used by customers. API is deployed to customer hosted Mule runtime cluster. The load balancer that is used to access any APIs on the mule cluster is only configured to point to applications hosted on the server at port 443.

Mule application team of a company attempted to deploy a second API using port 443 but the application will not start and checking logs shows an error indicating the address is already in use.

Which steps must the organization take to resolve this error and allow customers to access both the API's?

A.

Change the base path of the HTTP listener configuration in the second API to a different one from the first API

B.

Set HTTP listener configuration in both API's to allow for connections from multiple ports

C.

Move the HTTP listener configurations from the API's and package them in a mule domain project using port 443

D.

Set the HTTP listener of the second API to use different port than the one used in the first API

Full Access
Question # 33

An Organization has previously provisioned its own AWS VPC hosting various servers. The organization now needs to use Cloudhub to host a Mule application that will implement a REST API once deployed to Cloudhub, this Mule application must be able to communicate securely with the customer-provisioned AWS VPC resources within the same region, without being interceptable on the public internet.

What Anypoint Platform features should be used to meet these network communication requirements between Cloudhub and the existing customer-provisioned AWS VPC?

A.

Add a Mulesoft hosted Anypoint VPC configured and with VPC Peering to the AWS VPC

B.

Configure an external identity provider (IDP) in Anypoint Platform with certificates from the customer provisioned AWS VPC

C.

Add a default API Whitelisting policy to API Manager to automatically whitelist the customer provisioned AWS VPC IP ranges needed by the Mule applicaton

D.

Use VM queues in the Mule application to allow any non-mule assets within the customer provisioned AWS VPC to subscribed to and receive messages

Full Access
Question # 34

An organization uses a set of customer-hosted Mule runtimes that are managed using the Mulesoft-hosted control plane. What is a condition that can be alerted on from Anypoint Runtime Manager without any custom components or custom coding?

A.

When a Mule runtime on a given customer-hosted server is experiencing high memory consumption during certain periods

B.

When an SSL certificate used by one of the deployed Mule applications is about to expire

C.

When the Mute runtime license installed on a Mule runtime is about to expire

D.

When a Mule runtime's customer-hosted server is about to run out of disk space

Full Access
Question # 35

An organization has implemented a continuous integration (CI) lifecycle that promotes Mule applications through code, build, and test stages. To standardize the organization's CI journey, a new dependency control approach is being designed to store artifacts that include information such as dependencies, versioning, and build promotions.

To implement these process improvements, the organization will now require developers to maintain all dependencies related to Mule application code in a shared location.

What is the most idiomatic (used for its intended purpose) type of system the organization should use in a shared location to standardize all dependencies related to Mule application code?

A.

A MuleSoft-managed repository at repository.mulesoft.org

B.

A binary artifact repository

C.

API Community Manager

D.

The Anypoint Object Store service at cloudhub.io

Full Access
Question # 36

A rale limiting policy has been applied to a soap VI.2 API published in Clondhub. The API implementation catches errors in a global error handler on error propagate in the main flow for HTTP: RETRY_EXHAUSTED with HTTP status set to 429 and any with the HTTP status set to 500.

What is the expected H1TP status when the client exceeds the quota of the API calls?

A.

HTTP status 429 as defined in the HTTP:RETRY EXHAUSTED error handler in the API B. HTTP status 500 as defined in the ANY error handler in the API since an API:RETRY_EXHAUSTED will be generated

B.

HTTP status 401 unauthorized for policy violation

C.

HTTP status 400 from the rate-limiting policy violation since the call does not reach the back-end

Full Access
Question # 37

A Mule application is built to support a local transaction for a series of operations on a single database. The Mule application has a Scatter-Gather that participates in the local transaction.

What is the behavior of the Scatter-Gather when running within this local transaction?

A.

Execution of each route within the Scatter-Gather occurs sequentially

Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations

B.

Execution of all routes within the Scatter-Gather occurs in parallel

Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations

C.

Execution of each route within the Scatter-Gather occurs sequentially

Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations

D.

Execution of each route within the Scatter-Gather occurs in parallel

Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations

Full Access
Question # 38

A Mule application contains a Batch Job scope with several Batch Step scopes. The Batch Job scope is configured with a batch block size of 25.

A payload with 4,000 records is received by the Batch Job scope.

When there are no errors, how does the Batch Job scope process records within and between the Batch Step scopes?

A.

The Batch Job scope processes multiple record blocks in parallel, and a block of 25 records can jump ahead to the next Batch Step scope over an earlier block of records

Each Batch Step scope is invoked with one record in the payload of the received Mule event

For each Batch Step scope, all 25 records within a block are processed in parallel

All the records in a block must be completed before the block of 25 records is avai

B.

The Batch Job scope processes each record block sequentially, one at a time

Each Batch Step scope is invoked with one record in the payload of the received Mule event

For each Batch Step scope, all 25 records within a block are processed sequentially, one at a time

All 4000 records must be completed before the blocks of records are available to the next Batch Step scope

C.

The Batch Job scope processes multiple record blocks in parallel, and a block of 25 records can jump ahead to the next Batch Step scope over an earlier block of records

Each Batch Step scope is invoked with one record in the payload of the received Mule event

For each Batch Step scope, all 25 records within a block are processed sequentially, one record at a time

All the records in a block must be completed before the bloc

D.

The Batch Job scope processes multiple record blocks in parallel

Each Batch Step scope is invoked with a batch of 25 records in the payload of the received Mule event

For each Batch Step scope, all 4000 records are processed in parallel

Individual records can jump ahead to the next Batch Step scope before the rest of the records finish processing in the current Batch Step scope

Full Access
Question # 39

The retrieveBalances flow in the Mule application is designed to use an operation in a connector to the Finance system (the Finance operation) that

can only look up one account record at a time, and a operation from a different connector to the Audit system (the Audit operation) that can only

insert one account record at a time.

To best meet the performance-related requirements, what scope or scopes should be used and how should they be used to incorporate the Finance

operation and Audit operation into the retrieveBalances flow?

A.

Wrap the Finance operation in a Parallel For-Each scope. Wrap the Audit operation in a Async scope.

B.

Wrap the Finance operation in a Until-Successful scope. Wrap the Audit operation in a Try-Catch scope.

C.

Wrap both connector operations in a Async scope.

D.

Wrap both connector operations in a For-Each scope.

Full Access
Question # 40

A set of integration Mule applications, some of which expose APIs, are being created to enable a new business process. Various stakeholders may be impacted by this. These stakeholders are a combination of semi-technical users (who understand basic integration terminology and concepts such as JSON and XML) and technically skilled potential consumers of the Mule applications and APIs.

What Is an effective way for the project team responsible for the Mule applications and APIs being built to communicate with these stakeholders using Anypoint Platform and its supplied toolset?

A.

Use Anypoint Design Center to implement the Mule applications and APIs and give the various stakeholders access to these Design Center projects, so they can collaborate and provide feedback

B.

Create Anypoint Exchange entries with pages elaborating the integration design, including API notebooks (where applicable) to help the stakeholders understand and interact with the Mule applications and APIs at various levels of technical depth

C.

Use Anypoint Exchange to register the various Mule applications and APIs and share the RAML definitions with the stakeholders, so they can be discovered

D.

Capture documentation about the Mule applications and APIs inline within the Mule integration flows and use Anypoint Studio's Export Documentation feature to provide an HTML version of this documentation to the stakeholders

Full Access
Question # 41

An organization is building out a test suite for their application using MUnit.

The Integration Architect has recommended using Test Recorder in Anypoint Studio to record the processing flows and then configure unit tests based on the captured events.

What Is a core consideration that must be kept In mind while using Test Recorder?

A.

The Recorder supports loops where the structure of the data being tested changes inside the Iteration

B.

Mocking values resulting from parallel processes are possible and will not affect theexecution of the processors that follow in the test

C.

The Recorder supports mocking a message before or inside a Foreach processor

D.

Tests for flows cannot be created if Mule errors are raised Inside the flows, even if the errors are handled by On-Error Continue error handlers

Full Access
Question # 42

Mule application is deployed to Customer Hosted Runtime. Asynchronous logging was implemented to improved throughput of the system. But it was observed over the period of time that few of the important exception log messages which were used to rollback transactions are not working as expected causing huge loss to the Organization. Organization wants to avoid these losses. Application also has constraints due to which they cant compromise on throughput much. What is the possible option in this case?

A.

Logging needs to be changed from asynchronous to synchronous

B.

External log appender needs to be used in this case

C.

Persistent memory storage should be used in such scenarios

D.

Mixed configuration of asynchronous or synchronous loggers should be used to log exceptions via synchronous way

Full Access
Question # 43

Which type of communication is managed by a service mesh in a microservices architecture?

A.

Communication between microservices runtime administrators

B.

Communication between microservices developers

C.

Communication between microservices

D.

Communication between trading partner services

Full Access
Question # 44

What is a defining characteristic of an integration-Platform-as-a-Service (iPaaS)?

A.

A Cloud-based

B.

No-code

C.

Code-first

D.

On-premises

Full Access
Question # 45

What is maximum vCores can be allocated to application deployed to CloudHub?

A.

1 vCores

B.

2 vCores

C.

4 vCores

D.

16 vCores

Full Access
Question # 46

An organization will deploy Mule applications to Cloudhub, Business requirements mandate that all application logs be stored ONLY in an external splunk consolidated logging service and NOT in Cloudhub.

In order to most easily store Mule application logs ONLY in Splunk, how must Mule application logging be configured in Runtime Manager, and where should the log4j2 splunk appender be defined?

A.

Keep the default logging configuration in RuntimeManager

Define the splunk appender in ONE global log4j.xml file that is uploaded once to Runtime Manager to support at Mule application deployments.

B.

Disable Cloudhub logging in Runtime Manager

Define the splunk appender in EACH Mule application’s log4j2.xml file

C.

Disable Cloudhub logging in Runtime Manager

Define the splunk appender in ONE global log4j.xml file that is uploaded once to Runtime Manger to support at Mule application deployments.

D.

Keep the default logging configuration in Runtime Manager

Define the Splunk appender in EACH Mule application log4j2.xml file

Full Access
Question # 47

A system API EmployeeSAPI is used to fetch employee's data from an underlying SQL database.

The architect must design a caching strategy to query the database only when there is an update to the employees stable or else return a cached response in order to minimize the number of redundant transactions being handled by the database.

What must the architect do to achieve the caching objective?

A.

Use an On Table Row on employees table and call invalidate cache

Use an object store caching strategy and expiration interval to empty

B.

Use a Scheduler with a fixed frequency every hour triggering an invalidate cache flow

Use an object store caching strategy and expiration interval to empty

C.

Use a Scheduler with a fixed frequency every hour triggering an invalidate cache flow

Use an object store caching strategy and set expiration interval to 1-hour

D.

Use an on table rule on employees table call invalidate cache and said new employees data to cache

Use an object store caching strategy and set expiration interval to 1-hour

Full Access
Question # 48

An organization is sizing an Anypoint VPC to extend their internal network to Cloudhub.

For this sizing calculation, the organization assumes 150 Mule applications will be deployed among three(3) production environments and will use Cloudhub’s default zero-downtime feature. Each Mule application is expected to be configured with two(2) Cloudhub workers.This is expected to result in several Mule application deployments per hour.

A.

10.0.0.0/21(2048 IPs)

B.

10.0.0.0/22(1024IPs)

C.

10.0.0.0/23(512 IPs)

D.

10.0.0.0/24(256 IPs)

Full Access
Question # 49

An API client makes an HTTP request to an API gateway with an Accept header containing the value’’ application’’.

What is a valid HTTP response payload for this request in the client requested data format?

A.

healthy

B.

{"status" "healthy"}

C.

status(‘healthy")

D.

status: healthy

Full Access
Question # 50

An organization's security requirements mandate centralized control at all times over authentication and authorization of external applications when invoking web APIs managed on Anypoint Platform.

What Anypoint Platform feature is most idiomatic (used for its intended purpose), straightforward, and maintainable to use to meet this requirement?

A.

Client management configured in access management

B.

Identity management configured in access management

C.

Enterprise Security module coded in Mule applications

D.

External access configured in API Manager

Full Access
Question # 51

What limits if a particular Anypoint Platform user can discover an asset in Anypoint Exchange?

A.

Design Center and RAML were both used to create the asset

B.

The existence of a public Anypoint Exchange portal to which the asset has been published

C.

The type of the asset in Anypoint Exchange

D.

The business groups to which the user belongs

Full Access
Question # 52

An organization is in the process of building automated deployments using a CI/CD process. As a part of automated deployments, it wants to apply policies to API Instances.

What tool can the organization use to promote and deploy API Manager policies?

A.

Anypoint CLI

B.

MUnit Maven plugin

C.

Mule Maven plugin

D.

Runtime Manager agent

Full Access
Question # 53

A mule application is being designed to perform product orchestration. The Mule application needs to join together the responses from an inventory API and a Product Sales History API with the least latency.

To minimize the overall latency. What is the most idiomatic (used for its intended purpose) design to call each API request in the Mule application?

A.

Call each API request in a separate lookup call from Dataweave reduce operator

B.

Call each API request in a separate route of a Scatter-Gather

C.

Call each API request in a separate route of a Parallel For Each scope

D.

Call each API request in a separate Async scope

Full Access
Question # 54

An organization is not meeting its growth and innovation objectives because IT cannot deliver projects last enough to keep up with the pace of change required by the business.

According to MuleSoft’s IT delivery and operating model, which step should the organization lake to solve this problem?

A.

Modify IT governance and security controls so that line of business developers can have direct access to the organization's systems of record

B.

Switch from a design-first to a code-first approach for IT development

C.

Adopt a new approach that decouples core IT projects from the innovation that happens within each line of business

D.

Hire more |T developers, architects, and project managers to increase IT delivery

Full Access
Question # 55

Additional nodes are being added to an existing customer-hosted Mule runtime cluster to improve performance. Mule applications deployed to this cluster are invoked by API clients through a load balancer.

What is also required to carry out this change?

A.

A new load balancer must be provisioned to allow traffic to the new nodes in a round-robin fashion

B.

External monitoring tools or log aggregators must be configured to recognize the new nodes

C.

API implementations using an object store must be adjusted to recognize the new nodes and persist to them

D.

New firewall rules must be configured to accommodate communication between API clients and the new nodes

Full Access
Question # 56

In preparation for a digital transformation initiative, an organization is reviewing related IT integration projects that failed for various for reason.

According to MuleSoft’s surveys of global IT leaders, what is a common cause of IT project failure that this organization may likely discover in its assessment?

A.

Following an Agile delivery methodology

B.

Reliance on an Integration-Platform-as-a-Service (iPaaS)

C.

Spending too much time on enablement

D.

Lack of alignment around business outcomes

Full Access
Question # 57

Refer to the exhibit.

A Mule application is being designed to be deployed to several CIoudHub workers. The Mule application's integration logic is to replicate changed Accounts from Satesforce to a backend system every 5 minutes.

A watermark will be used to only retrieve those Satesforce Accounts that have been modified since the last time the integration logic ran.

What is the most appropriate way to implement persistence for the watermark in order to support the required data replication integration logic?

A.

Persistent Anypoint MQ Queue

B.

Persistent Object Store

C.

Persistent Cache Scope

D.

Persistent VM Queue

Full Access
Question # 58

A stock broking company makes use of CloudHub VPC to deploy Mule applications. Mule application needs to connect to a database application in the customers on-premises corporate data center and also to a Kafka cluster running in AWS VPC.

How is access enabled for the API to connect to the database application and Kafka cluster securely?

A.

Set up a transit gateway to the customers on-premises corporate datacenter to AWS VPC

B.

Setup AnyPoint VPN to the customer's on-premise corporate data

center and VPC peering with AWS VPC

C.

Setup VPC peering with AWS VPC and the customers devices corporate data center

D.

Setup VPC peering with the customers onto my service corporate data center and Anypoint VPN to AWS VPC

Full Access
Question # 59

What comparison is true about a CloudHub Dedicated Load Balancer (DLB) vs. the CloudHub Shared Load Balancer (SLB)?

A.

Only a DLB allows the configuration of a custom TLS server certificate

B.

Only the SLB can forward HTTP traffic to the VPC-internal ports of the CloudHub workers

C.

Both a DLB and the SLB allow the configuration of access control via IP whitelists

D.

Both a DLB and the SLB implement load balancing by sending HTTP requests to workers with the lowest workloads

Full Access
Question # 60

Refer to the exhibit.

This Mule application is deployed to multiple Cloudhub workers with persistent queue enabled. The retrievefile flow event source reads a CSV file from a remote SFTP server and then publishes each record in the CSV file to a VM queue. The processCustomerRecords flow’s VM Listner receives messages from the same VM queue and then processes each message separately.

How are messages routed to the cloudhub workers as messages are received by the VM Listener?

A.

Each message is routed to ONE of the Cloudhub workers in a DETERMINSTIC round robin fashion thereby EXACTLY BALANCING messages among the cloudhub workers

B.

Each messages routes to ONE of the available Clouhub workers in a NON- DETERMINSTIC non round-robin fashion thereby APPROXIMATELY BALANCING messages among the cloudhub workers

C.

Each message is routed to the SAME Cloudhub worker that retrieved the file, thereby BINDING ALL messages to ONLY that ONE Cloudhub worker

D.

Each message is duplicated to ALL of the Cloudhub workers, thereby SHARING EACH message with ALL the Cloudhub workers.

Full Access
Question # 61

Which role is primarily responsible for building API implementation as part of a typical MuleSoft integration project?

A.

API Developer

B.

API Designer

C.

Integration Architect

D.

Operations

Full Access
Question # 62

A Mule application uses APIkit for SOAP to implement a SOAP web service. The Mule application has been deployed to a CloudHub worker in a testing environment.

The integration testing team wants to use a SOAP client to perform Integration testing. To carry out the integration tests, the integration team must obtain the interface definition for the SOAP web service.

What is the most idiomatic (used for its intended purpose) way for the integration testing team to obtain the interface definition for the deployed SOAP web service in order to perform integration testing with the SOAP client?

A.

Retrieve the OpenAPI Specification file(s) from API Manager

B.

Retrieve the WSDL file(s) from the deployed Mule application

C.

Retrieve the RAML file(s) from the deployed Mule application

D.

Retrieve the XML file(s) from Runtime Manager

Full Access
Question # 63

An organization is using Mulesoft cloudhub and develops API's in the latest version. As a part of requirements for one of the API's, third party API needs to be called. The security team has made it clear that calling any external API needs to have include listing

As an integration architect please suggest the best way to accomplish the design plan to support these requirements?

A.

Implement includelist IP on the cloudhub VPC firewall to allow the traffic

B.

Implement the validation of includelisted IP operation

C.

Implement the Any point filter processor to implement the include list IP

D.

Implement a proxy for the third party API and enforce the IPinclude list policy and call this proxy from the flow of the API

Full Access
Question # 64

An organization is designing the following two Mule applications that must share data via a common persistent object store instance:

- Mule application P will be deployed within their on-premises datacenter.

- Mule application C will run on CloudHub in an Anypoint VPC.

The object store implementation used by CloudHub is the Anypoint Object Store v2 (OSv2).

what type of object store(s) should be used, and what design gives both Mule applications access to the same object store instance?

A.

Application P uses the Object Store connector to access a persistent object store Application C accesses this persistent object store via the Object Store REST API through an IPsec tunnel

B.

Application C and P both use the Object Store connector to access the Anypoint Object Store v2

C.

Application C uses the Object Store connector to access a persistent object Application P accesses the persistent object store via the Object Store REST API

D.

Application C and P both use the Object Store connector to access a persistent object store

Full Access
Question # 65

A manufacturing company is developing a new set of APIs for its retail business. One of the APIs is a Master Look Up API, which is a System API,

The API uses a persistent object-store. This API will be used by almost all other APIs to provide master lookup data.

The Master Look Up API is deployed on two CloudHub workers of 0.1 vCore each because there is a lot of master data to be cached. Most of the master

lookup data is stored as a key-value pair. The cache gets refreshed if the key is not found in the cache.

During performance testing, it was determined that the Master Look Up API has a high response time due to the latency of database queries executed to fetch the master lookup data.

What two methods can be used to resolve these performance issues?

Choose 2 answers

A.

Implement the HTTP caching policy for all GET endpoints for the Master Look Up API

B.

Implement an HTTP caching policy for all GET endpoints in the Master Look Up API

C.

Implement locking to synchronize access to the Object Store

D.

Upgrade the vCore size from 0.1 vCore to 0.2 vCore

Full Access
Question # 66

How are the API implementation , API client, and API consumer combined to invoke and process an API ?

A.

The API consumer creates an API implementation , which receives API invocations from an API such that they are processed for an API client

B.

The API consumer creates an API client which sends API invocations to an API such that they are processed by an API implementation

C.

An API client creates an API consumer, which receives API invocation from an API such that they are processed for an API implementation

D.

The API client creates an API consumer which sends API invocations to an API such that they are processed by API implementation

Full Access
Question # 67

An architect is designing a Mule application to meet the following two requirements:

1. The application must process files asynchronously and reliably from an FTPS server to a back-end database using VM intermediary queues for

load-balancing Mule events.

2. The application must process a medium rate of records from a source to a target system using a Batch Job scope.

To make the Mule application more reliable, the Mule application will be deployed to two CloudHub 1.0 workers.

Following MuleSoft-recommended best practices, how should the Mule application deployment typically be configured in Runtime Manger to best

support the performance and reliability goals of both the Batch Job scope and the file processing VM queues?

A.

Check the Persistent VM queues checkbox in the application deployment configuration

B.

Check the Non-persistent VM queues checkbox in the application deployment configuration

C.

In the Runtime Manager Properties tab, disable persistent VM queues for Batch Job scopes

D.

In the Runtime Manager Properties tab, enable persistent VM queues for the FTPS connector

Full Access
Question # 68

A system administrator needs to determine when permissions were last changed for an Anypoint Platform user.

Which Anypoint Platform component should the administrator use to obtain this information?

A.

Audit Logging

B.

Anypoint Monitoring

C.

Anypiont Studio

D.

Mule Stack Traces

Full Access
Question # 69

A mule application designed to fulfil two requirements

a) Processing files are synchronously from an FTPS server to a back-end database using VM intermediary queues for load balancing VM events

b) Processing a medium rate of records from a source to a target system using batch job scope

Considering the processing reliability requirements for FTPS files, how should VM queues be configured for processing files as well as for the batch job scope if the application is deployed to Cloudhub workers?

A.

Use Cloud hub persistent queues for FTPS files processing

There is no need to configure VM queues for the batch jobs scope as it uses by default the worker's disc for VM queueing

B.

Use Cloud hub persistent VM queue for FTPS file processing

There is no need to configure VM queues for the batch jobs scope as it uses by default the worker's JVM memory for VM queueing

C.

Use Cloud hub persistent VM queues for FTPS file processing

Disable VM queue for the batch job scope

D.

Use VM connector persistent queues for FTPS file processing Disable VM queue for the batch job scope

Full Access
Question # 70

An ABC Farms project team is planning to build a new API that is required to work with data from different domains across the organization.

The organization has a policy that all project teams should leverage existing investments by reusing existing APIs and related resources and documentation that other project teams have already developed and deployed.

To support reuse, where on Anypoint Platform should the project team go to discover and read existing APIs, discover related resources and documentation, and interact with mocked versions of those APIs?

A.

Design Center

B.

API Manager

C.

Runtime Manager

D.

Anypoint Exchange

Full Access
Question # 71

Refer to the exhibit.

A Mule application has an HTTP Listener that accepts HTTP DELETE requests. This Mule application Is deployed to three CloudHub workers under the control of the CloudHub Shared Load Balancer.

A web client makes a sequence of requests to the Mule application's public URL.

How is this sequence of web client requests distributed among the HTTP Listeners running in the three CloudHub workers?

A.

Each request is routed to the PRIMARY CloudHub worker in the PRIMARY Availability Zone (AZ)

B.

Each request is routed to ONE ARBiTRARY CloudHub worker in the PRIMARY Availability Zone (AZ)

C.

Each request Is routed to ONE ARBiTRARY CloudHub worker out of ALL three CloudHub workers

D.

Each request is routed (scattered) to ALL three CloudHub workers at the same time

Full Access
Question # 72

An integration architect is designing an API that must accept requests from API clients for both XML and JSON content over HTTP/1.1 by default.

Which API architectural style, when used for its intended and typical purposes, should the architect choose to meet these requirements?

A.

SOAP

B.

GraphQL

C.

REST

D.

grRPC

Full Access
Question # 73

An organization is designing a mule application to support an all or nothing transaction between serval database operations and some other connectors so that they all roll back if there is a problem with any of the connectors

Besides the database connector , what other connector can be used in the transaction.

A.

VM

B.

Anypoint MQ

C.

SFTP

D.

ObjectStore

Full Access
Question # 74

As a part of project requirement, Java Invoke static connector in a mule 4 application needs to invoke a static method in a dependency jar file. What are two ways to add the dependency to be visible by the connectors class loader?

(Choose two answers)

A.

In the Java Invoke static connector configuration, configure a path and name of the dependency jar file

B.

Add the dependency jar file to the java classpath by setting the JVM parameters

C.

Use Maven command to include the dependency jar file when packaging the application

D.

Configure the dependency as a shared library in the project POM

E.

Update mule-artefact.json to export the Java package

Full Access
Question # 75

Refer to the exhibit.

A Mule application is being designed to expose a SOAP web service to its clients.

What language is typically used inside the web service's interface definition to define the data structures that the web service Is expected to exchange with its clients?

A.

WSDL

B.

XSD

C.

JSON Schema

D.

RAMI

Full Access
Question # 76

Refer to the exhibit.

A business process involves two APIs that interact with each other asynchronously over HTTP. Each API is implemented as a Mule application. API 1 receives the initial HTTP request and invokes API 2 (in a fire and forget fashion) while API 2, upon completion of the processing, calls back into API l to notify about completion of the asynchronous process.

Each API Is deployed to multiple redundant Mule runtimes and a separate load balancer, and is deployed to a separate network zone.

In the network architecture, how must the firewall rules be configured to enable the above Interaction between API 1 and API 2?

A.

To authorize the certificate to be used both APIs

B.

To enable communication from each API’s Mule Runtimes and Network zone to the load balancer of the other API

C.

To open direct two-way communication between the Mule Runtimes of both API’s

D.

To allow communication between load balancers used by each API

Full Access
Question # 77

A high-volume eCommerce retailer receives thousands of orders per hour and requires notification of its order management, warehouse, and billing system for subsequent processing within 15 minutes of order submission through its website.

Which integration technology, when used for its typical and intended purpose, meets the retailer’s requirements for this use case?

A.

Managed File Transfer (MFT)

B.

Publish/Subscriber Messaging Bus (Pub/Sub)

C.

Enterprise Data Warehouse (EDW)

D.

Extract Transform Load (ETL)

Full Access
Question # 78

An organization's IT team follows an API-led connectivity approach and must use Anypoint Platform to implement a System AP\ that securely accesses customer data. The organization uses Salesforce as the system of record for all customer data, and its most important objective is to reduce the overall development time to release the System API.

The team's integration architect has identified four different approaches to access the customer data from within the implementation of the System API by using different Anypoint Connectors that all meet the technical requirements of the project.

A.

Use the Anypoint Connector for Database to connect to a MySQL database to access a copy of the customer data

B.

Use the Anypoint Connector for HTTP to connect to the Salesforce APIs to directly access the customer data

C.

Use the Anypoint Connector for Salesforce to connect to the Salesforce APIs to directly access the customer data

D.

Use the Anypoint Connector tor FTP to download a file containing a recent near-real time extract of the customer data

Full Access
Question # 79

Why would an Enterprise Architect use a single enterprise-wide canonical data model (CDM) when designing an integration solution using Anypoint Platform?

A.

To reduce dependencies when integrating multiple systems that use different data formats

B.

To automate Al-enabled API implementation generation based on normalized backend databases from separate vendors

C.

To leverage a data abstraction layer that shields existing Mule applications from nonbackward compatible changes to the model's data structure

D.

To remove the need to perform data transformation when processing message payloads in Mule applications

Full Access
Question # 80

Refer to the exhibit.

A shopping cart checkout process consists of a web store backend sending a sequence of API invocations to an Experience API, which in turn invokes a Process API. All API invocations are over HTTPS POST. The Java web store backend executes in a Java EE application server, while all API implementations are Mule applications executing in a customer -hosted Mule runtime.

End-to-end correlation of all HTTP requests and responses belonging to each individual checkout Instance is required. This is to be done through a common correlation ID, so that all log entries written by the web store backend, Experience API implementation, and Process API implementation include the same correlation ID for all requests and responses belonging to the same checkout instance.

What is the most efficient way (using the least amount of custom coding or configuration) for the web store backend and the implementations of the Experience API and Process API to participate in end-to-end correlation of the API invocations for each checkout instance?

A)

The web store backend, being a Java EE application, automatically makes use of the thread-local correlation ID generated by the Java EE application server and automatically transmits that to the Experience API using HTTP-standard headers

No special code or configuration is included in the web store backend, Experience API, and Process API implementations to generate and manage the correlation ID

B)

The web store backend generates a new correlation ID value at the start of checkout and sets it on the X-CORRELATlON-lt HTTP request header In each API invocation belonging to that checkout

No special code or configuration is included in the Experience API and Process API implementations to generate and manage the correlation ID

C)

The Experience API implementation generates a correlation ID for each incoming HTTP request and passes it to the web store backend in the HTTP response, which includes it in all subsequent API invocations to the Experience API.

The Experience API implementation must be coded to also propagate the correlation ID to the Process API in a suitable HTTP request header

D)

The web store backend sends a correlation ID value in the HTTP request body In the way required by the Experience API

The Experience API and Process API implementations must be coded to receive the custom correlation ID In the HTTP requests and propagate It in suitable HTTP request headers

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 81

A retailer is designing a data exchange interface to be used by its suppliers. The interface must support secure communication over the public internet. The interface must also work with a wide variety of programming languages and IT systems used by suppliers.

What are suitable interface technologies for this data exchange that are secure, cross-platform, and internet friendly, assuming that Anypoint Connectors exist for these interface technologies?

A.

EDJFACT XML over SFTP JSON/REST over HTTPS

B.

SOAP over HTTPS HOP over TLS gRPC over HTTPS

C.

XML over ActiveMQ XML over SFTP XML/REST over HTTPS

D.

CSV over FTP YAML over TLS JSON over HTTPS

Full Access