Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Salesforce MuleSoft Changed MuleSoft-Platform-Architect-I Questions

Salesforce Certified MuleSoft Platform Architect 1 Exam (WI25) Questions and Answers

Question 33

An API is protected with a Client ID Enforcement policy and uses the default configuration. Access is requested for the client application to the API, and an approved

contract now exists between the client application and the API

How can a consumer of this API avoid a 401 error "Unauthorized or invalid client application credentials"?

Options:

A.

Send the obtained token as a header in every call

B.

Send the obtained: client_id and client_secret in the request body

C.

Send the obtained clent_id and clent_secret as URI parameters in every call

D.

Send the obtained clent_id and client_secret in the header of every API Request call

Question 34

A circuit breaker strategy is planned in order to meet the goal of improved response time and demand on a downstream API.

* Circuit Open: More than 10 errors per minute for three minutes

* Circuit Half-Open: One error per minute

* Circuit Closed: Less than one error per minute for five minutes

Out of several proposals from the engineering team, which option will meet this goal?

Options:

A.

Create a custom policy that implements the circuit breaker and includes policy template expressions for the required settings

B.

Create Anypoint Monitoring alerts for Circuit Open/Closed configurations, and then implement a retry strategy for Circuit Half-Open configuration

C.

Add the Circuit Breaker policy to the API instance, and configure the required settings

D.

Implement the strategy in a Mule application, and provide the settings in the YAML configuration

Question 35

Which out-of-the-box key performance indicator measures the success of a typical Center for Enablement and is immediately available in responses from Anypoint Platform APIs?

Options:

A.

Per business group, the ratio of the number of production APT implementations deployed using a C1/CD pipeline to the number of production API implementations deployed manually

B.

Per deployed API implementation, the amount of bandwidth consumed each day

C.

Per published API, the number of developers that downloaded s version of the API specification

D.

Per published API, the number of consumers that requested access to the API and have been approved in the Production environment

Question 36

An organization has several APIs that accept JSON data over HTTP POST. The APIs are all publicly available and are associated with several mobile applications and web applications.

The organization does NOT want to use any authentication or compliance policies for these APIs, but at the same time, is worried that some bad actor could send payloads that could somehow compromise the applications or servers running the API implementations.

What out-of-the-box Anypoint Platform policy can address exposure to this threat?

Options:

A.

Shut out bad actors by using HTTPS mutual authentication for all API invocations

B.

Apply an IP blacklist policy to all APIs; the blacklist will Include all bad actors

C.

Apply a Header injection and removal policy that detects the malicious data before it is used

D.

Apply a JSON threat protection policy to all APIs to detect potential threat vectors