Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium MuleSoft MCIA-Level-1-Maintenance Dumps Questions Answers

MuleSoft Certified Integration Architect - Level 1 MAINTENANCE Questions and Answers

Question 1

A company is planning to extend its Mule APIs to the Europe region. Currently all new applications are deployed to Cloudhub in the US region following this naming convention

{API name}-{environment}. for example, Orders-SAPI-dev, Orders-SAPI-prod etc.

Considering there is no network restriction to block communications between API's, what strategy should be implemented in order to apply the same new API's running in the EU region of CloudHub as well to minimize latency between API's and target users and systems in Europe?

Options:

A.

Set region property to Europe (eu-de) in API manager for all the mule application

No need to change the naming convention

B.

Set region property to Europe (eu-de) in API manager for all the mule application

Change the naming convention to {API name}-{environment}-{region} and communicate this change to the consuming applications and users

C.

Set region property to Europe (eu-de) in runtime manager for all the mule application

No need to change the naming convention

D.

Set region property to Europe (eu-de) in runtime manager for all the mule application

Change the naming convention to {API name}-{environment}-{region} and communicate this change to the consuming applications and users

Buy Now
Question 2

What is not true about Mule Domain Project?

Options:

A.

This allows Mule applications to share resources

B.

Expose multiple services within the Mule domain on the same port

C.

Only available Anypoint Runtime Fabric

D.

Send events (messages) to other Mule applications using VM queues

Question 3

What is true about automating interactions with Anypoint Platform using tools such as Anypoint Platform REST API's, Anypoint CLI or the Mule Maven plugin?

Options:

A.

By default, the Anypoint CLI and Mule Maven plugin are not included in the Mule runtime

B.

Access to Anypoint Platform API;s and Anypoint CLI can be controlled separately thruough the roles and permissions in Anypoint platform, so that specific users can get access to Anypoint CLI while others get access to the platform API's

C.

Anypoint Platform API's can only automate interactions with CloudHub while the Mule maven plugin is required for deployment to customer hosted Mule runtimes

D.

API policies can be applied to the Anypoint platform API's so that only certain LOS's has access to specific functions

Question 4

An automation engineer needs to write scripts to automate the steps of the API lifecycle, including steps to create, publish, deploy and manage APIs and their implementations in Anypoint Platform.

What Anypoint Platform feature can be used to automate the execution of all these actions in scripts in the easiest way without needing to directly invoke the Anypoint Platform REST APIs?

Options:

A.

Automated Policies in API Manager

B.

Runtime Manager agent

C.

The Mule Maven Plugin

D.

Anypoint CLI

Question 5

A stock broking company makes use of CloudHub VPC to deploy Mule applications. Mule application needs to connect to a database application in the customers on-premises corporate data center and also to a Kafka cluster running in AWS VPC.

How is access enabled for the API to connect to the database application and Kafka cluster securely?

Options:

A.

Set up a transit gateway to the customers on-premises corporate datacenter to AWS VPC

B.

Setup AnyPoint VPN to the customer's on-premise corporate data

center and VPC peering with AWS VPC

C.

Setup VPC peering with AWS VPC and the customers devices corporate data center

D.

Setup VPC peering with the customers onto my service corporate data center and Anypoint VPN to AWS VPC

Question 6

An organization is evaluating using the CloudHub shared Load Balancer (SLB) vs creating a CloudHub dedicated load balancer (DLB). They are evaluating how this choice affects the various types of certificates used by CloudHub deplpoyed Mule applications, including MuleSoft-provided, customer-provided, or Mule application-provided certificates.

What type of restrictions exist on the types of certificates that can be exposed by the CloudHub Shared Load Balancer (SLB) to external web clients over the public internet?

Options:

A.

Only MuleSoft-provided certificates are exposed.

B.

Only customer-provided wildcard certificates are exposed.

C.

Only customer-provided self-signed certificates are exposed.

D.

Only underlying Mule application certificates are exposed (pass-through)

Question 7

A company is designing a mule application to consume batch data from a partner's ftps server The data files have been compressed and then digitally signed using PGP.

What inputs are required for the application to securely consumed these files?

Options:

A.

ATLS context Key Store requiring the private key and certificate for the company

PGP public key of partner

PGP private key for the company

B.

ATLS context first store containing a public certificate for partner ftps server and the PGP public key of the partner

TLS contact Key Store containing the FTP credentials

C.

TLS context trust or containing a public certificate for the ftps server The FTP username and password The PGP public key of the partner

D.

The PGP public key of the partner

The PGP private key for the company

The FTP username and password

Question 8

An organization is building a test suite for their applications using m-unit. The integration architect has recommended using test recorder in studio to record the processing flows and then configure unit tests based on the capture events

What are the two considerations that must be kept in mind while using test recorder

(Choose two answers)

Options:

A.

Tests for flows cannot be created with Mule errors raised inside

the flow or already existing in the incoming event

B.

Recorder supports smoking a message before or inside a ForEach processor

C.

The recorder support loops where the structure of the data been tested

changes inside the iteration

D.

A recorded flow execution ends successfully but the result does

not reach its destination because the application is killed

E.

Mocking values resulting from parallel processes are possible and will not affect the execution of the processes that follow in the test

Question 9

How does timeout attribute help inform design decisions while using JMS connector listening for incoming messages in an extended architecture (XA) transaction?

Options:

A.

After the timeout is exceeded, stale JMS consumer threads are destroyed and new threads are created

B.

The timeout specifies the time allowed to pass between receiving JMS messages on the same JMS connection and then after the timeout new JMS connection is established

C.

The time allowed to pass between committing the transaction and the completion of the mule flow and then after the timeout flow processing triggers an error

D.

The timeout defines the time that is allowed to pass without the transaction ending explicitly and after the timeout expires, the transaction rolls back

Question 10

A company is implementing a new Mule application that supports a set of critical functions driven by a rest API enabled, claims payment rules engine hosted on oracle ERP. As designed the mule application requires many data transformation operations as it performs its batch processing logic.

The company wants to leverage and reuse as many of its existing java-based capabilities (classes, objects, data model etc.) as possible

What approach should be considered when implementing required data mappings and transformations between Mule application and Oracle ERP in the new Mule application?

Options:

A.

Create a new metadata RAML classes in Mule from the appropriate Java objects and then perform transformations via Dataweave

B.

From the mule application, transform via theXSLT model

C.

Transform by calling any suitable Java class from Dataweave

D.

Invoke any of the appropriate Java methods directly, create metadata RAML classes and then perform required transformations via Dataweave

Question 11

Customer has deployed mule applications to different customer hosted mule run times. Mule applications are managed from Anypoint platform.

What needs to be configured to monitor these Mule applications from Anypoint monitoring and what sends monitoring data to Anypoint monitoring?

Options:

A.

Enable monitoring of individual applications from runtime manager application settings

Runtime manager agent sends monitoring data from the mule applications to Anypoint monitoring

B.

Install runtime manager agent on each mule runtime

Runtime manager agent since monitoring data from the mule applications to Anypoint monitoring

C.

Anypoint monitoring agent on each mule runtime

Anypoint monitoring agent sends monitoring data from the mule applications to Anypoint monitoring

D.

By default, Anypoint monitoring agent will be installed on each Mule run time

Anypoint Monitoring agent automatically sends monitoring data from the Mule applications to Anypoint monitoring

Question 12

Organization wants to achieve high availability goal for Mule applications in customer hosted runtime plane. Due to the complexity involved, data cannot be shared among of different instances of same Mule application. What option best suits to this requirement considering high availability is very much critical to the organization?

Options:

A.

The cluster can be configured

B.

Use third party product to implement load balancer

C.

High availability can be achieved only in CloudHub

D.

Use persistent object store

Question 13

An organization is designing Mule application which connects to a legacy backend. It has been reported that backend services are not highly available and experience downtime quite often. As an integration architect which of the below approach you would propose to achieve high reliability goals?

Options:

A.

Alerts can be configured in Mule runtime so that backend team can be communicated when services are down

B.

Until Successful scope can be implemented while calling backend API's

C.

On Error Continue scope to be used to call in case of error again

D.

Create a batch job with all requests being sent to backend using that job as per the availability of backend API's

Question 14

A leading e-commerce giant will use Mulesoft API's on runtime fabric (RTF) to process customer orders. Some customer's sensitive information such as credit card information is also there as a part of a API payload.

What approach minimizes the risk of matching sensitive data to the original and can convert back to the original value whenever and wherever required?

Options:

A.

Apply masking to hide the sensitive information and then use API

B.

manager to detokenize the masking format to return the original value

C.

create a tokenization format and apply a tokenization policy to the API Gateway

D.

Used both masking and tokenization

E.

Apply a field level encryption policy in the API Gateway

Question 15

A Mule application is being designed for deployment to a single CloudHub worker. The Mule application will have a flow that connects to a SaaS system to perform some operations each time the flow is invoked.

The SaaS system connector has operations that can be configured to request a short-lived token (fifteen minutes) that can be reused for subsequent connections within the fifteen minute time window. After the token expires, a new token must be requested and stored.

What is the most performant and idiomatic (used for its intended purpose) Anypoint Platform component or service to use to support persisting and reusing tokens in the Mule application to help speed up reconnecting the Mule application to the SaaS application?

Options:

A.

Nonpersistent object store

B.

Persistent object store

C.

Variable

D.

Database

Question 16

An organization is creating a Mule application that will be deployed to CloudHub. The Mule application has a property named dbPassword that stores a database user’s password.

The organization's security standards indicate that the dbPassword property must be hidden from every Anypoint Platform user after the value is set in the Runtime Manager Properties tab.

What configuration in the Mule application helps hide the dbPassword property value in Runtime Manager?

Options:

A.

Use secure::dbPassword as the property placeholder name and store the cleartext (unencrypted) value in a secure properties placeholder file

B.

Use secure::dbPassword as the property placeholder name and store the property encrypted value in a secure properties placeholder file

C.

Add the dbPassword property to the secureProperties section of the pom.xml file

D.

Add the dbPassword property to the secureProperties section of the mule-artifact.json file