New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Salesforce MuleSoft-Integration-Architect-I Dumps Questions Answers

Salesforce Certified MuleSoft Platform Integration Architect (Mule-Arch-202) Questions and Answers

Question 1

Which type of communication is managed by a service mesh in a microservices architecture?

Options:

A.

Communication between microservices runtime administrators

B.

Communication between microservices developers

C.

Communication between microservices

D.

Communication between trading partner services

Buy Now
Question 2

A company is modernizing its legal systems lo accelerate access lo applications and data while supporting the adoption of new technologies. The key to achieving this business goal is unlocking the companies' key systems and dala including microservices miming under Docker and kubernetes containers using apis.

Considering the current aggressive backlog and project delivery requirements the company wants to take a strategic approach in the first phase of its transformation projects by quickly deploying API's in mule runtime that are able lo scale, connect to on premises systems and migrate as needed.

Which runtime deployment option supports company's goals?

Options:

A.

Customer hosted self provisioned runtimes

B.

Cloudhub runtimes

C.

Runtime fabric on self managed Kubernetes

D.

Runtime fabric on Vmware metal

Question 3

An automation engineer needs to write scripts to automate the steps of the API lifecycle, including steps to create, publish, deploy and manage APIs and their implementations in Anypoint Platform.

What Anypoint Platform feature can be used to automate the execution of all these actions in scripts in the easiest way without needing to directly invoke the Anypoint Platform REST APIs?

Options:

A.

Automated Policies in API Manager

B.

Runtime Manager agent

C.

The Mule Maven Plugin

D.

Anypoint CLI

Question 4

A finance giant is planning to migrate all its Mule applications to Runtime fabric (RTF). Currently all Mule applications are deployed cloud hub using automated CI/CD scripts.

As an integration architect, which of the below step would you suggest to ensure that the applications from cloudhub are migrated properly to Runtime Fabric (RTF) with an assumption that organization is keen on keeping the same deployment strategy.

Options:

A.

No changes need to be made to POM.xml file and CI/CD script should be modified as per the RTF configurations

B.

runtimeFabric dependency should be added as a mule plug-in to POM.xml file and CI/CD script should be modified as per the RTF configurations

C.

runtimeFabric deployment should be added to POM.xml file in allthe mule applications and CI/CD script should be modified as per the RTF configurations

D.

runtimeFabric profile should be added mule configuration files in the mule applications and CI/CD script should be modified as per the RTF configurations

Question 5

A mule application designed to fulfil two requirements

a) Processing files are synchronously from an FTPS server to a back-end database using VM intermediary queues for load balancing VM events

b) Processing a medium rate of records from a source to a target system using batch job scope

Considering the processing reliability requirements for FTPS files, how should VM queues be configured for processing files as well as for the batch job scope if the application is deployed to Cloudhub workers?

Options:

A.

Use Cloud hub persistent queues for FTPS files processingThere is no need to configure VM queues for the batch jobs scope as it uses by default the worker's disc for VM queueing

B.

Use Cloud hub persistent VM queue for FTPS file processingThere is no need to configure VM queues for the batch jobs scope as it uses by default the worker's JVM memory for VM queueing

C.

Use Cloud hub persistent VM queues for FTPS file processingDisable VM queue for the batch job scope

D.

Use VM connector persistent queues for FTPS file processing Disable VM queue for the batch job scope

Question 6

A stock broking company makes use of CloudHub VPC to deploy Mule applications. Mule application needs to connect to a database application in the customers on-premises corporate data center and also to a Kafka cluster running in AWS VPC.

How is access enabled for the API to connect to the database application and Kafka cluster securely?

Options:

A.

Set up a transit gateway to the customers on-premises corporate datacenter to AWS VPC

B.

Setup AnyPoint VPN to the customer's on-premise corporate datacenter and VPC peering with AWS VPC

C.

Setup VPC peering with AWS VPC and the customers devices corporate data center

D.

Setup VPC peering with the customers onto my service corporate data center and Anypoint VPN to AWS VPC

Question 7

The AnyAirline organization's passenger reservations center is designing an integration solution that combines invocations of three different System APIs (bookFlight, bookHotel, and bookCar) in a business transaction. Each System API makes calls to a single database.

The entire business transaction must be rolled back when at least one of the APIs fails.

What is the most idiomatic (used for its intended purpose) way to integrate these APIs in near real-time that provides the best balance of consistency, performance, and reliability?

Options:

A.

Implement eXtended Architecture (XA) transactions between the API implementationsCoordinate between the API implementations using a Saga patternImplement caching in each API implementation to improve performance

B.

Implement local transactions within each API implementationConfigure each API implementation to also participate in the same eXtended Architecture (XA) transactionImplement caching in each API implementation to improve performance

C.

Implement local transactions in each API implementationCoordinate between the API implementations using a Saga patternApply various compensating actions depending on where a failure occurs

D.

Implement an eXtended Architecture (XA) transaction manager in a Mule application using a Saga patternConnect each API implementation with the Mule application using XA transactionsApply various compensating actions depending on where a failure occurs

Question 8

A bank is implementing a REST API in a Mule application to receive an array of accounts from an online banking platform user interface (UI),retrieve account balances for those accounts from a backend Finance system, and then return the account balances so they can be displayed inthe online banking platform UI. As part of the processing, the MuleSoft API also needs to insert the retrieved account data into an AuditDatabase for auditing purposes. the auditing process should not add latency to the account balance retrieval response back to the onlinebanking platform UI.

The retrieveBalances flow in the Mule application is designed to use an operation in a connector to the Finance system (the Finance operation) that

can only look up one account record at a time, and a operation from a different connector to the Audit system (the Audit operation) that can only

insert one account record at a time.

To best meet the performance-related requirements, what scope or scopes should be used and how should they be used to incorporate the Finance

operation and Audit operation into the retrieveBalances flow?

Options:

A.

Wrap the Finance operation in a Parallel For-Each scope. Wrap the Audit operation in a Async scope.

B.

Wrap the Finance operation in a Until-Successful scope. Wrap the Audit operation in a Try-Catch scope.

C.

Wrap both connector operations in a Async scope.

D.

Wrap both connector operations in a For-Each scope.

Question 9

What is not true about Mule Domain Project?

Options:

A.

This allows Mule applications to share resources

B.

Expose multiple services within the Mule domain on the same port

C.

Only available Anypoint Runtime Fabric

D.

Send events (messages) to other Mule applications using VM queues

Question 10

According to MuleSoft, what is a major distinguishing characteristic of an application network in relation to the integration of systems, data, and devices?

Options:

A.

It uses a well-organized monolithic approach with standards

B.

It is built for change and self-service

C.

It leverages well-accepted internet standards like HTTP and JSON

D.

It uses CI/CD automation for real-time project delivery

Question 11

An external REST client periodically sends an array of records in a single POST request to a Mule application API endpoint.

The Mule application must validate each record of the request against a JSON schema before sending it to a downstream system in the same order that it was received in the array

Record processing will take place inside a router or scope that calls a child flow. The child flow has its own error handling defined. Any validation or communication failures should not prevent further processing of the remaining records.

To best address these requirements what is the most idiomatic(used for it intended purpose) router or scope to used in the parent flow, and what type of error handler should be used in the child flow?

Options:

A.

First Successful router in the parent flowOn Error Continue error handler in the child flow

B.

For Each scope in the parent flowOn Error Continue error handler in the child flow

C.

Parallel For Each scope in the parent flowOn Error Propagate error handler in the child flow

D.

Until Successful router in the parent flowOn Error Propagate error handler in the child flow

Question 12

Customer has deployed mule applications to different customer hosted mule run times. Mule applications are managed from Anypoint platform.

What needs to be configured to monitor these Mule applications from Anypoint monitoring and what sends monitoring data to Anypoint monitoring?

Options:

A.

Enable monitoring of individual applications from runtime manager application settingsRuntime manager agent sends monitoring data from the mule applications to Anypoint monitoring

B.

Install runtime manager agent on each mule runtimeRuntime manager agent since monitoring data from the mule applications to Anypoint monitoring

C.

Anypoint monitoring agent on each mule runtimeAnypoint monitoring agent sends monitoring data from the mule applications to Anypoint monitoring

D.

By default, Anypoint monitoring agent will be installed on each Mule run timeAnypoint Monitoring agent automatically sends monitoring data from the Mule applications to Anypoint monitoring

Question 13

The company's FTPS server login username and password

Options:

A.

TLS context trust store containing a public certificate for the company. The company's PGP public key that was used to sign the files

B.

The partner's PGP public key used by the company to login to the FTPS server. A TLS context key store containing the private key for the companyThe partner's PGP private key that was used to sign the files

C.

The company's FTPS server login username and password. A TLS context trust store containing a public certificate for ftps.partner.comThe partner's PGP public key that was used to sign the files

D.

The partner's PGP public key used by the company to login to the FTPS server. A TLS context key store containing the private key for ftps.partner.comThe company's PGP private key that was used to sign the files

Question 14

A REST API is being designed to implement a Mule application.

What standard interface definition language can be used to define REST APIs?

Options:

A.

Web Service Definition Language(WSDL)

B.

OpenAPI Specification (OAS)

C.

YAML

D.

AsyncAPI Specification

Question 15

An organization’s IT team must secure all of the internal APIs within an integration solution by using an API proxy to apply required authentication and authorization policies.

Which integration technology, when used for its intended purpose, should the team choose to meet these requirements if all other relevant factors are equal?

Options:

A.

API Management (APIM)

B.

Robotic Process Automation (RPA)

C.

Electronic Data Interchange (EDI)

D.

Integration Platform-as-a-service (PaaS)

Question 16

An organization is building a test suite for their applications using m-unit. The integration architect has recommended using test recorder in studio to record the processing flows and then configure unit tests based on the capture events

What are the two considerations that must be kept in mind while using test recorder

(Choose two answers)

Options:

A.

Tests for flows cannot be created with Mule errors raised insidethe flow or already existing in the incoming event

B.

Recorder supports smoking a message before or inside a ForEach processor

C.

The recorder support loops where the structure of the data been testedchanges inside the iteration

D.

A recorded flow execution ends successfully but the result doesnot reach its destination because the application is killed

E.

Mocking values resulting from parallel processes are possible and will not affect the execution of the processes that follow in the test

Question 17

Mule application is deployed to Customer Hosted Runtime. Asynchronous logging was implemented to improved throughput of the system. But it was observed over the period of time that few of the important exception log messages which were used to rollback transactions are not working as expected causing huge loss to the Organization. Organization wants to avoid these losses. Application also has constraints due to which they cant compromise on throughput much. What is the possible option in this case?

Options:

A.

Logging needs to be changed from asynchronous to synchronous

B.

External log appender needs to be used in this case

C.

Persistent memory storage should be used in such scenarios

D.

Mixed configuration of asynchronous or synchronous loggers should be used to log exceptions via synchronous way

Question 18

According to MuleSoft's IT delivery and operating model, which approach can an organization adopt in order to reduce the frequency of IT project delivery failures?

Options:

A.

Decouple central IT projects from the innovation that happens within each line of business

B.

Adopt an enterprise data model

C.

Prevent technology sprawl by reducing production of API assets

D.

Stop scope creep by centralizing requirements-gathering

Question 19

An organization is migrating all its Mule applications to Runtime Fabric (RTF). None of the Mule applications use Mule domain projects.

Currently, all the Mule applications have been manually deployed to a server group among several customer hosted Mule runtimes.

Port conflicts between these Mule application deployments are currently managed by the DevOps team who carefully manage Mule application properties files.

When the Mule applications are migrated from the current customer-hosted server group to Runtime Fabric (RTF), fo the Mule applications need to be rewritten and what DevOps port configuration responsibilities change or stay the same?

Options:

A.

Yes, the Mule applications Must be rewrittenDevOps No Longer needs to manage port conflicts between the Mule applications

B.

Yes, the Mule applications Must be rewrittenDevOps Must Still Manage port conflicts.

C.

NO, The Mule applications do NOT need to be rewrittenDevOps MUST STILL manage port conflicts

D.

NO, the Mule applications do NO need to be rewrittenDevOps NO LONGER needs to manage port conflicts between the Mule applications.

Question 20

An integration team follows MuleSoft’s recommended approach to full lifecycle API development.

Which activity should this team perform during the API implementation phase?

Options:

A.

Validate the API specification

B.

Use the API specification to build the MuleSoft application

C.

Design the API specification

D.

Use the API specification to monitor the MuleSoft application

Question 21

A company is planning to extend its Mule APIs to the Europe region. Currently all new applications are deployed to Cloudhub in the US region following this naming convention

{API name}-{environment}. for example, Orders-SAPI-dev, Orders-SAPI-prod etc.

Considering there is no network restriction to block communications between API's, what strategy should be implemented in order to apply the same new API's running in the EU region of CloudHub as well to minimize latency between API's and target users and systems in Europe?

Options:

A.

Set region property to Europe (eu-de) in API manager for all the mule applicationNo need to change the naming convention

B.

Set region property to Europe (eu-de) in API manager for all the mule applicationChange the naming convention to {API name}-{environment}-{region} and communicate this change to the consuming applications and users

C.

Set region property to Europe (eu-de) in runtime manager for all the mule applicationNo need to change the naming convention

D.

Set region property to Europe (eu-de) in runtime manager for all the mule applicationChange the naming convention to {API name}-{environment}-{region} and communicate this change to the consuming applications and users

Question 22

An organization plans to migrate all its Mule applications to Runtime Fabric (RTF). Currently, all Mule applications have been deployed to CloudHub using automated CI/CD scripts.

What steps should be taken to properly migrate the applications from CloudHub to RTF, while keeping the same automated CI/CD deployment strategy?

Options:

A.

A runtimefabric dependency should be added as a mule-plugin to the pom.xml file in all the Mule applications.

B.

runtimeFabric command-line parameter should be added to the CI/CD deployment scripts.

C.

A runtimefFabricDeployment profile should be added to Mule configuration properties YAML files in all the Mule applications.CI/CD scripts must be modified to use the new configuration properties.

D.

runtimefabricDeployment profile should be added to the pom.xml file in all the Mule applications. CI/CD scripts must be modified to use the new RTF profile.

E.

- The pom.xml and Mule configuration YAML files can remain unchanged in each Mule application.A --runtimeFabric command-line parameter should be added to the CI/CD deployment scripts

Question 23

A system API EmployeeSAPI is used to fetch employee's data from an underlying SQL database.

The architect must design a caching strategy to query the database only when there is an update to the employees stable or else return a cached response in order to minimize the number of redundant transactions being handled by the database.

What must the architect do to achieve the caching objective?

Options:

A.

Use an On Table Row on employees table and call invalidate cacheUse an object store caching strategy and expiration interval to empty

B.

Use a Scheduler with a fixed frequency every hour triggering an invalidate cache flowUse an object store caching strategy and expiration interval to empty

C.

Use a Scheduler with a fixed frequency every hour triggering an invalidate cache flowUse an object store caching strategy and set expiration interval to 1-hour

D.

Use an on table rule on employees table call invalidate cache and said new employees data to cacheUse an object store caching strategy and set expiration interval to 1-hour

Question 24

Refer to the exhibit.

An organization is sizing an Anypoint VPC for the non-production deployments of those Mule applications that connect to the organization's on-premises systems. This applies to approx. 60 Mule applications. Each application is deployed to two CloudHub i workers. The organization currently has three non-production environments (DEV, SIT and UAT) that share this VPC. The AWS region of the VPC has two AZs.

The organization has a very mature DevOps approach which automatically progresses each application through all non-production environments before automatically deploying to production. This process results in several Mule application deployments per hour, using CloudHub's normal zero-downtime deployment feature.

What is a CIDR block for this VPC that results in the smallest usable private IP address range?

Options:

A.

10.0.0.0/26 (64 IPS)

B.

10.0.0.0/25 (128 IPs)

C.

10.0.0.0/24 (256 IPs)

D.

10.0.0.0/22 (1024 IPs)

Question 25

During a planning session with the executive leadership, the development team director presents plans for a new API to expose the data in the company’s order database. An earlier effort to build an API on top of this data failed, so the director is recommending a design-first approach.

Which characteristics of a design-first approach will help make this API successful?

Options:

A.

Building MUnit tests so administrators can confirm code coverage percentage during deployment

B.

Publishing the fully implemented API to Exchange so all developers can reuse the API

C.

Adding global policies to the API so all developers automatically secure the implementation before coding anything

D.

Developing a specification so consumers can test before the implementation is built

Question 26

A mule application is required to periodically process large data set from a back-end database to Salesforce CRM using batch job scope configured properly process the higher rate of records.

The application is deployed to two cloudhub workers with no persistence queues enabled.

What is the consequence if the worker crashes during records processing?

Options:

A.

Remaining records will be processed by a new replacement worker

B.

Remaining records be processed by second worker

C.

Remaining records will be left and processed

D.

All the records will be processed from scratch by the second worker leading to duplicate processing

Question 27

An organization designing a hybrid, load balanced, single cluster production environment. Due to performance service level agreement goals, it is looking into running the Mule applications in an active-active multi node cluster configuration.

What should be considered when running its Mule applications in this type of environment?

Options:

A.

All event sources, regardless of time , can be configured as the target source by the primary node in the cluster

B.

An external load balancer is required to distribute incoming requests throughout the cluster nodes

C.

A Mule application deployed to multiple nodes runs in an isolation from the other nodes in the cluster

D.

Although the cluster environment is fully installed configured and running, it will not process any requests until an outage condition is detected by the primary node in the cluster.

Question 28

What is true about the network connections when a Mule application uses a JMS connector to interact with a JMS provider (message broker)?

Options:

A.

To complete sending a JMS message, the JMS connector must establish a network connection with the JMS message recipient

B.

To receive messages into the Mule application, the JMS provider initiates a network connection to the JMS connector and pushes messages along this connection

C.

The JMS connector supports both sending and receiving of JMS messages over the protocol determined by the JMS provider

D.

The AMQP protocol can be used by the JMS connector to portably establish connections to various types of JMS providers

Question 29

Refer to the exhibit.

An organization uses a 2-node Mute runtime cluster to host one stateless API implementation. The API is accessed over HTTPS through a load balancer that uses round-robin for load distribution.

Two additional nodes have been added to the cluster and the load balancer has been configured to recognize the new nodes with no other change to the load balancer.

What average performance change is guaranteed to happen, assuming all cluster nodes are fully operational?

Options:

A.

50% reduction in the response time of the API

B.

100% increase in the throughput of the API

C.

50% reduction In the JVM heap memory consumed by each node

D.

50% reduction In the number of requests being received by each node

Question 30

A retail company is implementing a MuleSoft API to get inventory details from two vendors by Invoking each vendor's online applications. Due to network issues, the invocations to the vendor applications are timing out intermittently, but the requests are successful after re-invoking each

vendor application.

What is the most performant way of implementing the API to invoke each vendor application and to retry invocations that generate timeout errors?

Options:

A.

Use a For-Each scope to invoke the two vendor applications in series, one after the other.Place the For-Each scope inside an Until-Successful scope to retry requests that raise timeout errors.

B.

Use a Choice scope to Invoke each vendor application on a separate route.Place the Choice scope inside an Until-Successful scope to retry requests that raisetimeout errors.

C.

Use a Scatter-Gather scope to invoke each vendor application on a separate route.Use an Until-Successful scope in each route to retry requests that raise timeout errors.

D.

Use a Round-Robin scope to invoke each vendor application on a separate route.Use a Try-Catch scope in each route to retry requests that raise timeout errors.

Question 31

Refer to the exhibit.

A Mule application is deployed to a cluster of two customer-hosted Mute runtimes. The Mute application has a flow that polls a database and another flow with an HTTP Listener.

HTTP clients send HTTP requests directly to individual cluster nodes.

What happens to database polling and HTTP request handling in the time after the primary (master) node of the cluster has railed, but before that node is restarted?

Options:

A.

Database polling continues Only HTTP requests sent to the remaining node continue to be accepted

B.

Database polling stops All HTTP requests continue to be accepted

C.

Database polling continues All HTTP requests continue to be accepted, but requests to the failed node Incur increased latency

D.

Database polling stops All HTTP requests are rejected

Question 32

An organization has several APIs that accept JSON data over HTTP POST. The APIs are all publicly available and are associated with several mobile applications and web applications. The organization does NOT want to use any authentication or compliance policies for these APIs, but at the same time, is worried that some bad actor could send payloads that could somehow compromise the applications or servers running the API implementations. What out-of-the-box Anypoint Platform policy can address exposure to this threat?

Options:

A.

Apply a Header injection and removal policy that detects the malicious data before it is used

B.

Apply an IP blacklist policy to all APIs; the blacklist will Include all bad actors

C.

Shut out bad actors by using HTTPS mutual authentication for all API invocations

D.

Apply a JSON threat protection policy to all APIs to detect potential threat vectors

Question 33

A leading eCommerce giant will use MuleSoft APIs on Runtime Fabric (RTF) to process customer orders. Some customer-sensitive information, such as credit card information, is required in request payloads or is included in response payloads in some of the APIs. Other API requests and responses are not authorized to access some of this customer-sensitive information but have been implemented to validate and transform based on the structure and format of this customer-sensitive information (such as account IDs, phone numbers, and postal codes).

What approach configures an API gateway to hide sensitive data exchanged between API consumers and API implementations, but can convert tokenized fields back to their original value for other API requests or responses, without having to recode the API implementations?

Later, the project team requires all API specifications to be augmented with an additional non-functional requirement (NFR) to protect the backend services from a high rate of requests, according to defined service-level

agreements (SLAs). The NFR's SLAs are based on a new tiered subscription level "Gold", "Silver", or "Platinum" that must be tied to a new parameter that is being added to the Accounts object in their enterprise data model.

Following MuleSoft's recommended best practices, how should the project team now convey the necessary non-functional requirement to stakeholders?

Options:

A.

Create and deploy API proxies in API Manager for the NFR, change the baseurl in eachAPI specification to the corresponding API proxy implementation endpoint, and publish each modified API specification to Exchange

B.

Update each API specification with comments about the NFR's SLAs and publish each modified API specification to Exchange

C.

Update each API specification with a shared RAML fragment required to implement the NFR and publish the RAML fragment and each modified API specification to Exchange

D.

Create a shared RAML fragment required to implement the NFR, list each API implementation endpoint in the RAML fragment, and publish the RAML fragment to Exchange

Question 34

An organization currently uses a multi-node Mule runtime deployment model within their datacenter, so each Mule runtime hosts several Mule applications. The organization is planning to transition to a deployment model based on Docker containers in a Kubernetes cluster. The organization has already created a standard Docker image containing a Mule runtime and all required dependencies (including a JVM), but excluding the Mule application itself.

What is an expected outcome of this transition to container-based Mule application deployments?

Options:

A.

Required redesign of Mule applications to follow microservice architecture principles

B.

Required migration to the Docker and Kubernetes-based Anypoint Platform - Private Cloud Edition

C.

Required change to the URL endpoints used by clients to send requests to the Mule applications

D.

Guaranteed consistency of execution environments across all deployments of a Mule application

Question 35

According to MuleSoft, a synchronous invocation of a RESTful API using HTTP to get an individual customer record from a single system is an example of which system integration interaction pattern?

Options:

A.

Request-Reply

B.

Multicast

C.

Batch

D.

One-way

Question 36

An organization is evaluating using the CloudHub shared Load Balancer (SLB) vs creating a CloudHub dedicated load balancer (DLB). They are evaluating how this choice affects the various types of certificates used by CloudHub deplpoyed Mule applications, including MuleSoft-provided, customer-provided, or Mule application-provided certificates.

What type of restrictions exist on the types of certificates that can be exposed by the CloudHub Shared Load Balancer (SLB) to external web clients over the public internet?

Options:

A.

Only MuleSoft-provided certificates are exposed.

B.

Only customer-provided wildcard certificates are exposed.

C.

Only customer-provided self-signed certificates are exposed.

D.

Only underlying Mule application certificates are exposed (pass-through)

Question 37

An organization uses Mule runtimes which are managed by Anypoint Platform - Private Cloud Edition. What MuleSoft component is responsible for feeding analytics data to non-MuleSoft analytics platforms?

Options:

A.

Anypoint Exchange

B.

The Mule runtimes

C.

Anypoint API Manager

D.

Anypoint Runtime Manager

Question 38

As a part of design , Mule application is required call the Google Maps API to perform a distance computation. The application is deployed to cloudhub.

At the minimum what should be configured in the TLS context of the HTTP request configuration to meet these requirements?

Options:

A.

The configuration is built-in and nothing extra is required for the TLS context

B.

Request a private key from Google and create a PKCS12 file with it and add it in keyStore as a part of TLS context

C.

Download the Google public certificate from a browser, generate JKS file from it and add it in key store as a part of TLS context

D.

Download the Google public certificate from a browser, generate a JKS file from it and add it in Truststore as part of the TLS context

Question 39

A mule application must periodically process a large dataset which varies from 6 GB lo 8 GB from a back-end database and write transform data lo an FTPS server using a properly configured bad job scope.

The performance requirements of an application are approved to run in the cloud hub 0.2 vCore with 8 GB storage capacity and currency requirements are met.

How can the high rate of records be effectively managed in this application?

Options:

A.

Use streaming with a file storage repeatable strategy for reading records from the database and batch aggregator with streaming to write to FTPS

B.

Use streaming with an in-memory reputable store strategy for reading records from the database and batch aggregator with streaming to write to FTPS

C.

Use streaming with a file store repeatable strategy for reading records from the database and batch aggregator with an optimal size

D.

Use streaming with a file store repeatable strategy reading records from the database and batch aggregator without any required configuration

Question 40

A new Mule application has been deployed through Runtime Manager to CloudHub 1.0 using a CI/CD pipeline with sensitive properties set as cleartext. The Runtime Manager Administrator opened a high priority incident ticket about this violation of their security requirements indicating

these sensitive properties values must not be stored or visible in Runtime Manager but should be changeable in Runtime Manager by Administrators with proper permissions.

How can the Mule application be deployed while safely hiding the sensitive properties?

Options:

A.

Add an ArrayList of all the sensitive properties’ names in the mule-artifact.json file ofthe application

B.

Add encrypted versions of the sensitive properties as global configuration properties inthe Mule application

C.

Add a new wrapper.java.additional.xx parameter for each sensitive property in thewrapper.conf file used by the CI/CD pipeline scripts

D.

Create a variable for each sensitive property and declare them as hidden in the CI/CDpipeline scripts

Question 41

A DevOps team has adequate observability of individual system behavior and performance, but it struggles to track the entire lifecycle of each request across different microservices.

Which additional observability approach should this team consider adopting?

Options:

A.

Analytics

B.

Metrics

C.

Tracing

D.

Data mining

Question 42

As a part of project , existing java implementation is being migrated to Mulesoft. Business is very tight on the budget and wish to complete the project in most economical way possible.

Canonical object model using java is already a part of existing implementation. Same object model is required by mule application for a business use case. What is the best way to achieve this?

Options:

A.

Make use of Java module

B.

Create similar model for Mule applications

C.

Create a custom application to read Java code and make it available for Mule application

D.

Use Anypoint exchange

Question 43

Which Mulesoft feature helps users to delegate their access without sharing sensitive credentials or giving full control of accounts to 3rd parties?

Options:

A.

Secure Scheme

B.

client id enforcement policy

C.

Connected apps

D.

Certificates

Question 44

A Mule application is being designed To receive nightly a CSV file containing millions of records from an external vendor over SFTP, The records from the file need to be validated, transformed. And then written to a database. Records can be inserted into the database in any order.

In this use case, what combination of Mule components provides the most effective and performant way to write these records to the database?

Options:

A.

Use a Parallel for Each scope to Insert records one by one into the database

B.

Use a Scatter-Gather to bulk insert records into the database

C.

Use a Batch job scope to bulk insert records into the database.

D.

Use a DataWeave map operation and an Async scope to insert records one by one into the database.

Question 45

An organization is designing Mule application which connects to a legacy backend. It has been reported that backend services are not highly available and experience downtime quite often. As an integration architect which of the below approach you would propose to achieve high reliability goals?

Options:

A.

Alerts can be configured in Mule runtime so that backend team can be communicated when services are down

B.

Until Successful scope can be implemented while calling backend API's

C.

On Error Continue scope to be used to call in case of error again

D.

Create a batch job with all requests being sent to backend using that job as per the availability of backend API's

Question 46

An organization has deployed both Mule and non-Mule API implementations to integrate its customer and order management systems. All the APIs are available to REST clients on the public internet.

The organization wants to monitor these APIs by running health checks: for example, to determine if an API can properly accept and process requests. The organization does not have subscriptions to any external monitoring tools and also does not want to extend its IT footprint.

What Anypoint Platform feature provides the most idiomatic (used for its intended purpose) way to monitor the availability of both the Mule and the non-Mule API implementations?

Options:

A.

API Functional Monitoring

B.

Runtime Manager

C.

API Manager

D.

Anypoint Visualizer

Question 47

An organization will deploy Mule applications to Cloudhub, Business requirements mandate that all application logs be stored ONLY in an external splunk consolidated logging service and NOT in Cloudhub.

In order to most easily store Mule application logs ONLY in Splunk, how must Mule application logging be configured in Runtime Manager, and where should the log4j2 splunk appender be defined?

Options:

A.

Keep the default logging configuration in RuntimeManagerDefine the splunk appender in ONE global log4j.xml file that is uploaded once to Runtime Manager to support at Mule application deployments.

B.

Disable Cloudhub logging in Runtime ManagerDefine the splunk appender in EACH Mule application’s log4j2.xml file

C.

Disable Cloudhub logging in Runtime ManagerDefine the splunk appender in ONE global log4j.xml file that is uploaded once to Runtime Manger to support at Mule application deployments.

D.

Keep the default logging configuration in Runtime ManagerDefine the Splunk appender in EACH Mule application log4j2.xml file

Question 48

A Mule application is built to support a local transaction for a series of operations on a single database. The Mule application has a Scatter-Gather that participates in the local transaction.

What is the behavior of the Scatter-Gather when running within this local transaction?

Options:

A.

Execution of each route within the Scatter-Gather occurs sequentiallyAny error that occurs inside the Scatter-Gather will result in a rollback of all the database operations

B.

Execution of all routes within the Scatter-Gather occurs in parallelAny error that occurs inside the Scatter-Gather will result in a rollback of all the database operations

C.

Execution of each route within the Scatter-Gather occurs sequentiallyAny error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations

D.

Execution of each route within the Scatter-Gather occurs in parallelAny error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations

Question 49

What aspects of a CI/CD pipeline for Mule applications can be automated using MuleSoft-provided Maven plugins?

Options:

A.

Compile, package, unit test, validate unit test coverage, deploy

B.

Compile, package, unit test, deploy, integration test (Incorrect)

C.

Compile, package, unit test, deploy, create associated API instances in API Manager

D.

Import from API designer, compile, package, unit test, deploy, publish to Anypoint Exchange

Question 50

An API implementation is being developed to expose data from a production database via HTTP requests. The API implementation executes a database SELECT statement that is dynamically created based upon data received from each incoming HTTP request. The developers are planning to use various types of testing to make sure the Mule application works as expected, can handle specific workloads, and behaves correctly from an API consumer perspective. What type of testing would typically mock the results from each SELECT statement rather than actually execute it in the production database?

Options:

A.

Unit testing (white box)

B.

Integration testing

C.

Functional testing (black box)

D.

Performance testing

Question 51

When using Anypoint Platform across various lines of business with their own Anypoint Platform business groups, what configuration of Anypoint Platform is always performed at the organization level as opposed to at the business group level?

Options:

A.

Environment setup

B.

Identity management setup

C.

Role and permission setup

D.

Dedicated Load Balancer setup

Question 52

A Mule application is built to support a local transaction for a series of operations on a single database. The mule application has a Scatter-Gather scope that participates in the local transaction.

What is the behavior of the Scatter-Gather when running within this local transaction?

Options:

A.

Execution of all routes within Scatter-Gather occurs in parallel Any error that occurs inside Scatter-Gather will result in a roll back of all the database operations

B.

Execution of all routes within Scatter-Gather occurs sequentially Any error that occurs inside Scatter-Gather will be handled by error handler and will not result in roll back

C.

Execution of all routes within Scatter-Gather occurs sequentially Any error that occurs inside Scatter-Gather will result in a roll back of all the database operations

D.

Execution of all routes within Scatter-Gather occurs in parallel Any error that occurs inside Scatter-Gather will be handled by error handler and will not result in roll back

Question 53

In which order are the API Client, API Implementation, and API interface components called in a typical REST request?

Options:

A.

API Client > API implementation > API Interface

B.

API interface > API Client > API Implementation

C.

API Client > API Interface > API implementation

D.

API Implementation > API Interface > API Client

Question 54

What are two reasons why a typical MuleSoft customer favors a MuleSoft-hosted Anypoint Platform runtime plane over a customer-hosted runtime for its Mule application deployments? (Choose two.)

Options:

A.

Reduced application latency

B.

Increased application isolation

C.

Reduced time-to-market for the first application

D.

Increased application throughput

E.

Reduced IT operations effort

Question 55

A Mule application is being designed for deployment to a single CloudHub worker. The Mule application will have a flow that connects to a SaaS system to perform some operations each time the flow is invoked.

The SaaS system connector has operations that can be configured to request a short-lived token (fifteen minutes) that can be reused for subsequent connections within the fifteen minute time window. After the token expires, a new token must be requested and stored.

What is the most performant and idiomatic (used for its intended purpose) Anypoint Platform component or service to use to support persisting and reusing tokens in the Mule application to help speed up reconnecting the Mule application to the SaaS application?

Options:

A.

Nonpersistent object store

B.

Persistent object store

C.

Variable

D.

Database

Question 56

Refer to the exhibit.

An organization is designing a Mule application to receive data from one external business partner. The two companies currently have no shared IT infrastructure and do not want to establish one. Instead, all communication should be over the public internet (with no VPN).

What Anypoint Connector can be used in the organization's Mule application to securely receive data from this external business partner?

Options:

A.

File connector

B.

VM connector

C.

SFTP connector

D.

Object Store connector

Question 57

Which component of Anypoint platform belongs to the platform control plane?

Options:

A.

Runtime Fabric

B.

Runtime Replica

C.

Anypoint Connectors

D.

API Manager

Question 58

An integration team uses Anypoint Platform and follows MuleSoft's recommended approach to full lifecycle API development.

Which step should the team's API designer take before the API developers implement the AP! Specification?

Options:

A.

Generate test cases using MUnit so the API developers can observe the results of running the API

B.

Use the scaffolding capability of Anypoint Studio to create an API portal based on the API specification

C.

Publish the API specification to Exchange and solicit feedback from the API's consumers

D.

Use API Manager to version the API specification

Question 59

A rale limiting policy has been applied to a soap VI.2 API published in Clondhub. The API implementation catches errors in a global error handler on error propagate in the main flow for HTTP: RETRY_EXHAUSTED with HTTP status set to 429 and any with the HTTP status set to 500.

What is the expected H1TP status when the client exceeds the quota of the API calls?

Options:

A.

HTTP status 429 as defined in the HTTP:RETRY EXHAUSTED error handler in the API B. HTTP status 500 as defined in the ANY error handler in the API since an API:RETRY_EXHAUSTED will be generated

B.

HTTP status 401 unauthorized for policy violation

C.

HTTP status 400 from the rate-limiting policy violation since the call does not reach the back-end

Question 60

A platform architect includes both an API gateway and a service mesh in the architect of a distributed application for communication management.

Which type of communication management does a service mesh typically perform in this architecture?

Options:

A.

Between application services and the firewall

B.

Between the application and external API clients

C.

Between services within the application

D.

Between the application and external API implementations.

Question 61

What aspect of logging is only possible for Mule applications deployed to customer-hosted Mule runtimes, but NOT for Mule applications deployed to CloudHub?

Options:

A.

To send Mule application log entries to Splunk

B.

To change tog4j2 tog levels in Anypoint Runtime Manager without having to restart the Mule application

C.

To log certain messages to a custom log category

D.

To directly reference one shared and customized log4j2.xml file from multiple Mule applications

Question 62

When a Mule application using VM queues is deployed to a customer-hosted cluster or multiple CloudHub v1.0 workers/replicas, how are messages consumed across the nodes?

Options:

A.

Sequentially, from a dedicated Anypoint MQ queue

B.

Sequentially, only from the primary node

C.

In a non-deterministic way

D.

Round-robin, within an XA transaction

Question 63

An organization is creating a Mule application that will be deployed to CloudHub. The Mule application has a property named dbPassword that stores a database user’s password.

The organization's security standards indicate that the dbPassword property must be hidden from every Anypoint Platform user after the value is set in the Runtime Manager Properties tab.

What configuration in the Mule application helps hide the dbPassword property value in Runtime Manager?

Options:

A.

Use secure::dbPassword as the property placeholder name and store the cleartext (unencrypted) value in a secure properties placeholder file

B.

Use secure::dbPassword as the property placeholder name and store the property encrypted value in a secure properties placeholder file

C.

Add the dbPassword property to the secureProperties section of the pom.xml file

D.

Add the dbPassword property to the secureProperties section of the mule-artifact.json file

Question 64

What is an advantage of using OAuth 2.0 client credentials and access tokens over only API keys for API authentication?

Options:

A.

If the access token is compromised, the client credentials do not to be reissued.

B.

If the access token is compromised, I can be exchanged for an API key.

C.

If the client ID is compromised, it can be exchanged for an API key

D.

If the client secret is compromised, the client credentials do not have to be reissued.

Question 65

In one of the critical payment related mule application, transaction is being used . As an enhancement to implementation , scatter gather route is introduced which is also the part of transaction group. Scatter gather route has 4 routes.

What will be the behavior of the Mule application in case of error occurs in 4th route of the scatter-gather router and transaction needs to be rolled back?

Options:

A.

Only errored route will be rolled back

B.

All routes will be rolled back

C.

Scatter Gather router cannot be part of transaction

Question 66

A new upstream API Is being designed to offer an SLA of 500 ms median and 800 ms maximum (99th percentile) response time. The corresponding API implementation needs to sequentially invoke 3 downstream APIs of very similar complexity. The first of these downstream APIs offers the following SLA for its response time: median: 100 ms, 80th percentile: 500 ms, 95th percentile: 1000 ms. If possible, how can a timeout be set in the upstream API for the invocation of the first downstream API to meet the new upstream API's desired SLA?

Options:

A.

Set a timeout of 100 ms; that leaves 400 ms for the other two downstream APIs to complete

B.

Do not set a timeout; the Invocation of this API Is mandatory and so we must wait until it responds

C.

Set a timeout of 50 ms; this times out more invocations of that API but gives additional room for retries

D.

No timeout is possible to meet the upstream API's desired SLA; a different SLA must be negotiated with the first downstream API or invoke an alternative API

Question 67

Mule application muleA deployed in cloudhub uses Object Store v2 to share data across instances. As a part of new requirement , application muleB which is deployed in same region wants to access this Object Store.

Which of the following option you would suggest which will have minimum latency in this scenario?

Options:

A.

Object Store REST API

B.

Object Store connector

C.

Both of the above option will have same latency

D.

Object Store of one mule application cannot be accessed by other mule application.

Question 68

What approach configures an API gateway to hide sensitive data exchanged between API consumers and API implementations, but can convert tokenized fields back to their original value for other API requests or responses, without having to recode the API implementations?

Options:

A.

Create both masking and tokenization formats and use both to apply a tokenization policy in an API gateway to mask sensitive values in message payloads withcharacters, and apply a corresponding detokenization policy to return the originalvalues to other APIs

B.

Create a masking format and use it to apply a tokenization policy in an API gateway to mask sensitive values in message payloads with characters, and apply a corresponding detokenization policy to return the original values to other APIs

C.

Use a field-level encryption policy in an API gateway to replace sensitive fields in message payload with encrypted values, and apply a corresponding field-leveldecryption policy to return the original values to other APIs

D.

Create a tokenization format and use it to apply a tokenization policy in an API gateway to replace sensitive fields in message payload with similarly formattedtokenized values, and apply a corresponding detokenization policy to return the original values to other APIs

Question 69

Refer to the exhibit.

An organization deploys multiple Mule applications to the same customer -hosted Mule runtime. Many of these Mule applications must expose an HTTPS endpoint on the same port using a server-side certificate that rotates often.

What is the most effective way to package the HTTP Listener and package or store the server-side certificate when deploying these Mule applications, so the disruption caused by certificate rotation is minimized?

Options:

A.

Package the HTTPS Listener configuration in a Mule DOMAIN project, referencing it from all Mule applications that need to expose an HTTPS endpoint Package the server-side certificate in ALL Mule APPLICATIONS that need to expose an HTTPS endpoint

B.

Package the HTTPS Listener configuration in a Mule DOMAIN project, referencing it from all Mule applications that need to expose an HTTPS endpoint. Store the server-side certificate in a shared filesystem location in the Mule runtime's classpath, OUTSIDE the Mule DOMAIN or any Mule APPLICATION

C.

Package an HTTPS Listener configuration In all Mule APPLICATIONS that need to expose an HTTPS endpoint Package the server-side certificate in a NEW Mule DOMAIN project

D.

Package the HTTPS Listener configuration in a Mule DOMAIN project, referencing It from all Mule applications that need to expose an HTTPS endpoint. Package the server-side certificate in the SAME Mule DOMAIN project Go to Set

Question 70

When designing an upstream API and its implementation, the development team has been advised to not set timeouts when invoking downstream API. Because the downstream API has no SLA that can be relied upon. This is the only donwstream API dependency of that upstream API. Assume the downstream API runs uninterrupted without crashing. What is the impact of this advice?

Options:

A.

The invocation of the downstream API will run to completion without timing out.

B.

An SLA for the upstream API CANNOT be provided.

C.

A default timeout of 500 ms will automatically be applied by the Mule runtime in which the upstream API implementation executes.

D.

A load-dependent timeout of less than 1000 ms will be applied by the Mule runtime in which the downstream API implementation executes.

Question 71

As a part of project requirement, Java Invoke static connector in a mule 4 application needs to invoke a static method in a dependency jar file. What are two ways to add the dependency to be visible by the connectors class loader?

(Choose two answers)

Options:

A.

In the Java Invoke static connector configuration, configure a path and name of the dependency jar file

B.

Add the dependency jar file to the java classpath by setting the JVM parameters

C.

Use Maven command to include the dependency jar file when packaging the application

D.

Configure the dependency as a shared library in the project POM

E.

Update mule-artefact.json to export the Java package

Question 72

A marketing organization is designing a Mule application to process campaign data. The Mule application will periodically check for a file in a SFTP location and process the records in the file. The size of the file can vary from 10MB to 5GB. Due to the limited availabiltty of vCores, the Mule application is deployed to a single CloudHub worker configured with vCore size 0.2.

The application must transform and send different formats of this file to three different downstream SFTP locations.

What is the most idiomatic (used for its intended purpose) and performant way to configure the SFTP operations or event sources to process the large files to support these deployment requirements?

Options:

A.

Use an in-memory repeatable stream

B.

Use a file-stored non-repeatable stream

C.

Use an in-memory non-repeatable stream

D.

Use a file-stored repeatable stream

Question 73

What limits if a particular Anypoint Platform user can discover an asset in Anypoint Exchange?

Options:

A.

Design Center and RAML were both used to create the asset

B.

The existence of a public Anypoint Exchange portal to which the asset has been published

C.

The type of the asset in Anypoint Exchange

D.

The business groups to which the user belongs

Question 74

A set of integration Mule applications, some of which expose APIs, are being created to enable a new business process. Various stakeholders may be impacted by this. These stakeholders are a combination of semi-technical users (who understand basic integration terminology and concepts such as JSON and XML) and technically skilled potential consumers of the Mule applications and APIs.

What Is an effective way for the project team responsible for the Mule applications and APIs being built to communicate with these stakeholders using Anypoint Platform and its supplied toolset?

Options:

A.

Use Anypoint Design Center to implement the Mule applications and APIs and give the various stakeholders access to these Design Center projects, so they can collaborate and provide feedback

B.

Create Anypoint Exchange entries with pages elaborating the integration design, including API notebooks (where applicable) to help the stakeholders understand and interact with the Mule applications and APIs at various levels of technical depth

C.

Use Anypoint Exchange to register the various Mule applications and APIs and share the RAML definitions with the stakeholders, so they can be discovered

D.

Capture documentation about the Mule applications and APIs inline within the Mule integration flows and use Anypoint Studio's Export Documentation feature to provide an HTML version of this documentation to the stakeholders

Question 75

Refer to the exhibit.

A Mule application is deployed to a multi-node Mule runtime cluster. The Mule application uses the competing consumer pattern among its cluster replicas to receive JMS messages from a JMS queue. To process each received JMS message, the following steps are performed in a flow:

Step l: The JMS Correlation ID header is read from the received JMS message.

Step 2: The Mule application invokes an idempotent SOAP webservice over HTTPS, passing the JMS Correlation ID as one parameter in the SOAP request.

Step 3: The response from the SOAP webservice also returns the same JMS Correlation ID.

Step 4: The JMS Correlation ID received from the SOAP webservice is validated to be identical to the JMS Correlation ID received in Step 1.

Step 5: The Mule application creates a response JMS message, setting the JMS Correlation ID message header to the validated JMS Correlation ID and publishes that message to a response JMS queue.

Where should the Mule application store the JMS Correlation ID values received in Step 1 and Step 3 so that the validation in Step 4 can be performed, while also making the overall Mule application highly available, fault-tolerant, performant, and maintainable?

Options:

A.

Both Correlation ID values should be stored in a persistent object store

B.

Both Correlation ID values should be stored In a non-persistent object store

C.

The Correlation ID value in Step 1 should be stored in a persistent object storeThe Correlation ID value in step 3 should be stored as a Mule event variable/attribute

D.

Both Correlation ID values should be stored as Mule event variable/attribute

Question 76

Which productivity advantage does Anypoint Platform have to both implement and manage an AP?

Options:

A.

Automatic API proxy generation

B.

Automatic API specification generation

C.

Automatic API semantic versioning

D.

Automatic API governance

Question 77

A project uses Jenkins to implement CI/CD process. It was observed that each Mule package contains some of the Jenkins files and folders for configurations of CI/CD jobs.

As these files and folders are not part of the actual package, expectation is that these should not be part of deployed archive.

Which file can be used to exclude these files and folders from the deployed archive?

Options:

A.

muleignore

B.

_unTrackMule

C.

mulelnclude

D.

_muleExclude