New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Pass Using MCIA-Level-1 Exam Dumps

Page: 6 / 20
Total 273 questions

MuleSoft Certified Integration Architect - Level 1 Questions and Answers

Question 21

A company is modernizing its legal systems lo accelerate access lo applications and data while supporting the adoption of new technologies. The key to achieving this business goal is unlocking the companies' key systems and dala including microservices miming under Docker and kubernetes containers using apis.

Considering the current aggressive backlog and project delivery requirements the company wants to take a strategic approach in the first phase of its transformation projects by quickly deploying API's in mule runtime that are able lo scale, connect to on premises systems and migrate as needed.

Which runtime deployment option supports company's goals?

Options:

A.

Customer hosted self provisioned runtimes

B.

Cloudhub runtimes

C.

Runtime fabric on self managed Kubernetes

D.

Runtime fabric on Vmware metal

Question 22

What is an example of data confidentiality?

Options:

A.

Signing a file digitally and sending it using a file transfer mechanism

B.

Encrypting a file containing personally identifiable information (PV)

C.

Providing a server's private key to a client for secure decryption of data during a two-way SSL handshake

D.

De-masking a person's Social Security number while inserting it into a database

Question 23

According to MuleSoft, which deployment characteristic applies to a microservices application architecture?

Options:

A.

Services exist as independent deployment artifacts and can be scaled -independently of other services

B.

All services of an application can be deployed together as single Java WAR file

C.

A deployment to enhance one capability requires a redeployment of all capabilities

D.

Core business capabilities are encapsulated in a single, deployable application

Question 24

A Mule application is deployed to a cluster of two(2) cusomter-hosted Mule runtimes. Currently the node name Alice is the primary node and node named bob is the secondary node. The mule application has a flow that polls a directory on a file system for new files.

The primary node Alice fails for an hour and then restarted.

After the Alice node completely restarts, from what node are the files polled, and what node is now the primary node for the cluster?

Options:

A.

Files are polled from Alice node

Alice is now the primary node

B.

Files are polled form Bob node

Alice is now the primary node

C.

Files are polled from Alice node

Bob is the now the primary node

D.

Files are polled form Bob node

Bob is now the primary node

Page: 6 / 20
Total 273 questions