Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Salesforce MuleSoft-Integration-Architect-I Actual Questions

Salesforce Certified MuleSoft Integration Architect 1 (SU24) Exam Questions and Answers

Question 13

An organization has several APIs that accept JSON data over HTTP POST. The APIs are all publicly available and are associated with several mobile applications and web applications. The organization does NOT want to use any authentication or compliance policies for these APIs, but at the same time, is worried that some bad actor could send payloads that could somehow compromise the applications or servers running the API implementations. What out-of-the-box Anypoint Platform policy can address exposure to this threat?

Options:

A.

Apply a Header injection and removal policy that detects the malicious data before it is used

B.

Apply an IP blacklist policy to all APIs; the blacklist will Include all bad actors

C.

Shut out bad actors by using HTTPS mutual authentication for all API invocations

D.

Apply a JSON threat protection policy to all APIs to detect potential threat vectors

Question 14

In a Mule Application, a flow contains two (2) JMS consume operations that are used to connect to a JMS broker and consume messages from two(2) JMS destination. The Mule application then joins the two JMS messages together.

The JMS broker does not implement high availability (HA) and periodically experiences scheduled outages of upto 10 mins for routine maintenance.

What is the most idiomatic (used for its intented purpose) way to build the mule flow so it can best recover from the expected outages?

Options:

A.

Configure a reconnection strategy for the JMS connector

B.

Enclose the two(2) JMS operation in an Until Successful scope

C.

Consider a transaction for the JMS connector

D.

Enclose the two(2) JMS operations in a Try scope with an Error Continue error handler

Question 15

According to MuleSoft, which major benefit does a Center for Enablement (C4E) provide for an enterprise and its lines of business?

Options:

A.

Enabling Edge security between the lines of business and public devices

B.

Centralizing project management across the lines of business

C.

Centrally managing return on investment (ROI) reporting from lines of business to leadership

D.

Accelerating self-service by the lines of business

Question 16

What is maximum vCores can be allocated to application deployed to CloudHub?

Options:

A.

1 vCores

B.

2 vCores

C.

4 vCores

D.

16 vCores