Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

MuleSoft MCIA-Level-1 MuleSoft Certified Integration Architect - Level 1 Exam Practice Test

Demo: 79 questions
Total 273 questions

MuleSoft Certified Integration Architect - Level 1 Questions and Answers

Question 1

A manufacturing company is planning to deploy Mule applications to its own Azure Kubernetes Service infrastructure.

The organization wants to make the Mule applications more available and robust by deploying each Mule application to an isolated Mule runtime in a Docker container while managing all the Mule applications from the MuleSoft-hosted control plane.

What is the most idiomatic (used for its intended purpose) choice of runtime plane to meet these organizational requirements?

Options:

A.

Anypoint Platform Private Cloud Edition

B.

Anypoint Runtime Fabric

C.

CloudHub

D.

Anypoint Service Mesh

Question 2

Additional nodes are being added to an existing customer-hosted Mule runtime cluster to improve performance. Mule applications deployed to this cluster are invoked by API clients through a load balancer.

What is also required to carry out this change?

Options:

A.

A new load balancer must be provisioned to allow traffic to the new nodes in a round-robin fashion

B.

External monitoring tools or log aggregators must be configured to recognize the new nodes

C.

API implementations using an object store must be adjusted to recognize the new nodes and persist to them

D.

New firewall rules must be configured to accommodate communication between API clients and the new nodes

Question 3

According to MuleSoft's IT delivery and operating model, which approach can an organization adopt in order to reduce the frequency of IT project delivery failures?

Options:

A.

Decouple central IT projects from the innovation that happens within each line of business

B.

Adopt an enterprise data model

C.

Prevent technology sprawl by reducing production of API assets

D.

Stop scope creep by centralizing requirements-gathering

Question 4

A project uses Jenkins to implement CI/CD process. It was observed that each Mule package contains some of the Jenkins files and folders for configurations of CI/CD jobs.

As these files and folders are not part of the actual package, expectation is that these should not be part of deployed archive.

Which file can be used to exclude these files and folders from the deployed archive?

Options:

A.

muleignore

B.

_unTrackMule

C.

mulelnclude

D.

_muleExclude

Question 5

A leading e-commerce giant will use Mulesoft API's on runtime fabric (RTF) to process customer orders. Some customer's sensitive information such as credit card information is also there as a part of a API payload.

What approach minimizes the risk of matching sensitive data to the original and can convert back to the original value whenever and wherever required?

Options:

A.

Apply masking to hide the sensitive information and then use API

B.

manager to detokenize the masking format to return the original value

C.

create a tokenization format and apply a tokenization policy to the API Gateway

D.

Used both masking and tokenization

E.

Apply a field level encryption policy in the API Gateway

Question 6

Refer to the exhibit.

A Mule application is being designed to expose a SOAP web service to its clients.

What language is typically used inside the web service's interface definition to define the data structures that the web service Is expected to exchange with its clients?

Options:

A.

WSDL

B.

XSD

C.

JSON Schema

D.

RAMI

Question 7

Refer to the exhibit.

A Mule application is deployed to a multi-node Mule runtime cluster. The Mule application uses the competing consumer pattern among its cluster replicas to receive JMS messages from a JMS queue. To process each received JMS message, the following steps are performed in a flow:

Step l: The JMS Correlation ID header is read from the received JMS message.

Step 2: The Mule application invokes an idempotent SOAP webservice over HTTPS, passing the JMS Correlation ID as one parameter in the SOAP request.

Step 3: The response from the SOAP webservice also returns the same JMS Correlation ID.

Step 4: The JMS Correlation ID received from the SOAP webservice is validated to be identical to the JMS Correlation ID received in Step 1.

Step 5: The Mule application creates a response JMS message, setting the JMS Correlation ID message header to the validated JMS Correlation ID and publishes that message to a response JMS queue.

Where should the Mule application store the JMS Correlation ID values received in Step 1 and Step 3 so that the validation in Step 4 can be performed, while also making the overall Mule application highly available, fault-tolerant, performant, and maintainable?

Options:

A.

Both Correlation ID values should be stored in a persistent object store

B.

Both Correlation ID values should be stored In a non-persistent object store

C.

The Correlation ID value in Step 1 should be stored in a persistent object store

The Correlation ID value in step 3 should be stored as a Mule event variable/attribute

D.

Both Correlation ID values should be stored as Mule event variable/attribute

Question 8

An organization has deployed both Mule and non-Mule API implementations to integrate its customer and order management systems. All the APIs are available to REST clients on the public internet.

The organization wants to monitor these APIs by running health checks: for example, to determine if an API can properly accept and process requests. The organization does not have subscriptions to any external monitoring tools and also does not want to extend its IT footprint.

What Anypoint Platform feature provides the most idiomatic (used for its intended purpose) way to monitor the availability of both the Mule and the non-Mule API implementations?

Options:

A.

API Functional Monitoring

B.

Runtime Manager

C.

API Manager

D.

Anypoint Visualizer

Question 9

What is a key difference between synchronous and asynchronous logging from Mule applications?

Options:

A.

Synchronous logging writes log messages in a single logging thread but does not block the Mule event being processed by the next event processor

B.

Asynchronous logging can improve Mule event processing throughput while also reducing the processing time for each Mule event

C.

Asynchronous logging produces more reliable audit trails with more accurate timestamps

D.

Synchronous logging within an ongoing transaction writes log messages in the same thread that processes the current Mule event

Question 10

A Mule application is built to support a local transaction for a series of operations on a single database. The mule application has a Scatter-Gather scope that participates in the local transaction.

What is the behavior of the Scatter-Gather when running within this local transaction?

Options:

A.

Execution of all routes within Scatter-Gather occurs in parallel Any error that occurs inside Scatter-Gather will result in a roll back of all the database operations

B.

Execution of all routes within Scatter-Gather occurs sequentially Any error that occurs inside Scatter-Gather will be handled by error handler and will not result in roll back

C.

Execution of all routes within Scatter-Gather occurs sequentially Any error that occurs inside Scatter-Gather will result in a roll back of all the database operations

D.

Execution of all routes within Scatter-Gather occurs in parallel Any error that occurs inside Scatter-Gather will be handled by error handler and will not result in roll back

Question 11

A high-volume eCommerce retailer receives thousands of orders per hour and requires notification of its order management, warehouse, and billing system for subsequent processing within 15 minutes of order submission through its website.

Which integration technology, when used for its typical and intended purpose, meets the retailer’s requirements for this use case?

Options:

A.

Managed File Transfer (MFT)

B.

Publish/Subscriber Messaging Bus (Pub/Sub)

C.

Enterprise Data Warehouse (EDW)

D.

Extract Transform Load (ETL)

Question 12

An organization is evaluating using the CloudHub shared Load Balancer (SLB) vs creating a CloudHub dedicated load balancer (DLB). They are evaluating how this choice affects the various types of certificates used by CloudHub deployed Mule applications, including MuleSoft-provided, customer-provided, or Mule application-provided certificates. What type of restrictions exist on the types of certificates for the service that can be exposed by the CloudHub Shared Load Balancer (SLB) to external web clients over the public internet?

Options:

A.

Underlying Mule applications need to implement own certificates

B.

Only MuleSoft provided certificates can be used for server side certificate

C.

Only self signed certificates can be used

D.

All certificates which can be used in shared load balancer need to get approved by raising support ticket

Question 13

An insurance provider is implementing Anypoint platform to manage its application infrastructure and is using the customer hosted runtime for its business due to certain financial requirements it must meet. It has built a number of synchronous API's and is currently hosting these on a mule runtime on one server

These applications make use of a number of components including heavy use of object stores and VM queues.

Business has grown rapidly in the last year and the insurance provider is starting to receive reports of reliability issues from its applications.

The DevOps team indicates that the API's are currently handling too many requests and this is over loading the server. The team has also mentioned that there is a significant downtime when the server is down for maintenance.

As an integration architect, which option would you suggest to mitigate these issues?

Options:

A.

Add a load balancer and add additional servers in a server group configuration

B.

Add a load balancer and add additional servers in a cluster configuration

C.

Increase physical specifications of server CPU memory and network

D.

Change applications by use an event-driven model

Question 14

An Order microservice and a Fulfillment microservice are being designed to communicate with their dients through message-based integration (and NOT through API invocations).

The Order microservice publishes an Order message (a kind of command message) containing the details of an order to be fulfilled. The intention is that Order messages are only consumed by one Mute application, the Fulfillment microservice.

The Fulfilment microservice consumes Order messages, fulfills the order described therein, and then publishes an OrderFulfilted message (a kind of event message). Each OrderFulfilted message can be consumed by any interested Mule application, and the Order microservice is one such Mute application.

What is the most appropriate choice of message broker(s) and message destination(s) in this scenario?

Options:

A.

Order messages are sent to an Anypoint MQ exchange OrderFulfilled messages are sent to an Anypoint MQ queue Both microservices interact with Anypoint MQ as the message broker, which must therefore scale to support the load of both microservices

B.

Order messages are sent to a JMS queue. OrderFulfilled messages are sent to a JMS topic Both microservices interact with the same JMS provider (message broker) instance, which must therefore scale to support the load of both microservices

C.

Order messages are sent directly to the Fulfillment microservices. OrderFulfilled messages are sent directly to the Order microservice The Order microservice interacts with one AMQP-compatible message broker and the Fulfillment microservice interacts with a different AMQP-compatible message broker, so that both message brokers can be chosen and scaled to best support the load of each microservice

D.

Order messages are sent to a JMS queue. OrderFulfilled messages are sent to a JMS topic The Order microservice interacts with one JMS provider (message broker) and the Fulfillment microservice interacts with a different JMS provider, so that both message brokers can be chosen and scaled to best support the load of each microservice

Question 15

What is true about the network connections when a Mule application uses a JMS connector to interact with a JMS provider (message broker)?

Options:

A.

To complete sending a JMS message, the JMS connector must establish a network connection with the JMS message recipient

B.

To receive messages into the Mule application, the JMS provider initiates a network connection to the JMS connector and pushes messages along this connection

C.

The JMS connector supports both sending and receiving of JMS messages over the protocol determined by the JMS provider

D.

The AMQP protocol can be used by the JMS connector to portably establish connections to various types of JMS providers

Question 16

A manufacturing company is developing a new set of APIs for its retail business. One of the APIs is a Master Look Up API, which is a System API,

The API uses a persistent object-store. This API will be used by almost all other APIs to provide master lookup data.

The Master Look Up API is deployed on two CloudHub workers of 0.1 vCore each because there is a lot of master data to be cached. Most of the master

lookup data is stored as a key-value pair. The cache gets refreshed if the key is not found in the cache.

During performance testing, it was determined that the Master Look Up API has a high response time due to the latency of database queries executed to fetch the master lookup data.

What two methods can be used to resolve these performance issues?

Choose 2 answers

Options:

A.

Implement the HTTP caching policy for all GET endpoints for the Master Look Up API

B.

Implement an HTTP caching policy for all GET endpoints in the Master Look Up API

C.

Implement locking to synchronize access to the Object Store

D.

Upgrade the vCore size from 0.1 vCore to 0.2 vCore

Question 17

An ABC Farms project team is planning to build a new API that is required to work with data from different domains across the organization.

The organization has a policy that all project teams should leverage existing investments by reusing existing APIs and related resources and documentation that other project teams have already developed and deployed.

To support reuse, where on Anypoint Platform should the project team go to discover and read existing APIs, discover related resources and documentation, and interact with mocked versions of those APIs?

Options:

A.

Design Center

B.

API Manager

C.

Runtime Manager

D.

Anypoint Exchange

Question 18

What is a core pillar of the MuleSoft Catalyst delivery approach?

Options:

A.

Business outcomes

B.

Technology centralization

C.

Process thinking

D.

Scope reduction

Question 19

A manufacturing company plans to deploy Mule applications to its own

Azure Kubernetes service infrastructure.The organization wants to make

the Mule applications more available and robust by deploying each Mule

application to an isolated Mule runtime in a Docker container while

managing all the Mule applications from the MuleSoft-hosted control plane.

What choice of runtime plane meets these organizational requirements?

Options:

A.

CloudHub 2.0

B.

Customer-hosted self-provisioned runtime plane

C.

Anypoint Service Mesh

D.

Anypoint Runtime Fabric

Question 20

An organization is creating a set of new services that are critical for their business. The project team prefers using REST for all services but is willing to use SOAP with common WS-" standards if a particular service requires it.

What requirement would drive the team to use SOAP/WS-* for a particular service?

Options:

A.

Must use XML payloads for the service and ensure that it adheres to a specific schema

B.

Must publish and share the service specification (including data formats) with the consumers of the service

C.

Must support message acknowledgement and retry as part of the protocol

D.

Must secure the service, requiring all consumers to submit a valid SAML token

Question 21

Which Exchange asset type represents a complete API specification in RAML or OAS format?

Options:

A.

Connectors

B.

REST APIs

C.

API Spec Fragments

D.

SOAP APIs

Question 22

A REST API is being designed to implement a Mule application.

What standard interface definition language can be used to define REST APIs?

Options:

A.

Web Service Definition Language(WSDL)

B.

OpenAPI Specification (OAS)

C.

YAML

D.

AsyncAPI Specification

Question 23

Refer to the exhibit.

What is the type data format shown in the exhibit?

Options:

A.

JSON

B.

XML

C.

YAML

D.

CSV

Question 24

A company is using Mulesoft to develop API's and deploy them to Cloudhub and on premises targets. Recently it has decided to enable Runtime Fabric deployment option as well and infrastructure is set up for this option.

What can be used to deploy Runtime Fabric?

Options:

A.

AnypointCLI

B.

Anypoint platform REST API's

C.

Directly uploading ajar file from the Runtime manager

D.

Mule maven plug-in

Question 25

A company is implementing a new Mule application that supports a set of critical functions driven by a rest API enabled, claims payment rules engine hosted on oracle ERP. As designed the mule application requires many data transformation operations as it performs its batch processing logic.

The company wants to leverage and reuse as many of its existing java-based capabilities (classes, objects, data model etc.) as possible

What approach should be considered when implementing required data mappings and transformations between Mule application and Oracle ERP in the new Mule application?

Options:

A.

Create a new metadata RAML classes in Mule from the appropriate Java objects and then perform transformations via Dataweave

B.

From the mule application, transform via theXSLT model

C.

Transform by calling any suitable Java class from Dataweave

D.

Invoke any of the appropriate Java methods directly, create metadata RAML classes and then perform required transformations via Dataweave

Question 26

What is the MuleSoft-recommended best practice to share the connector and configuration information among the APIs?

Options:

A.

Build a Mule domain project, add the Database connector and configuration to it, and reference this one domain project from each System API

B.

Build a separate Mule domain project for each API, and configure each of them to use a file on a shared file store to load the configuration information dynamically

C.

Build another System API that connects to the database, and refactor all the other APIs to make requests through the new System API to access the database

D.

Create an API proxy for each System API and share the Database connector configuration with all the API proxies via an automated policy

Question 27

What limits if a particular Anypoint Platform user can discover an asset in Anypoint Exchange?

Options:

A.

Design Center and RAML were both used to create the asset

B.

The existence of a public Anypoint Exchange portal to which the asset has been published

C.

The type of the asset in Anypoint Exchange

D.

The business groups to which the user belongs

Question 28

A banking company is developing a new set of APIs for its online business. One of the critical API's is a master lookup API which is a system API. This master lookup API uses persistent object store. This API will be used by all other APIs to provide master lookup data.

Master lookup API is deployed on two cloudhub workers of 0.1 vCore each because there is a lot of master data to be cached. Master lookup data is stored as a key value pair. The cache gets refreshed if they key is not found in the cache.

Doing performance testing it was observed that the Master lookup API has a higher response time due to database queries execution to fetch the master lookup data.

Due to this performance issue, go-live of the online business is on hold which could cause potential financial loss to Bank.

As an integration architect, which of the below option you would suggest to resolve performance issue?

Options:

A.

Implement HTTP caching policy for all GET endpoints for the master lookup API and implement locking to synchronize access to object store

B.

Upgrade vCore size from 0.1 vCore to 0,2 vCore

C.

Implement HTTP caching policy for all GET endpoints for master lookup API

D.

Add an additional Cloudhub worker to provide additional capacity

Question 29

What Mule application can have API policies applied by Anypoint Platform to the endpoint exposed by that Mule application?

Options:

A.

A Mule application that accepts requests over HTTP/1x

B.

A Mule application that accepts JSON requests over TCP but is NOT required to provide a response.

C.

A Mule application that accepts JSON requests over WebSocket

D.

A Mule application that accepts gRPC requests over HTTP/2

Question 30

An integration team uses Anypoint Platform and follows MuleSoft's recommended approach to full lifecycle API development.

Which step should the team's API designer take before the API developers implement the AP! Specification?

Options:

A.

Generate test cases using MUnit so the API developers can observe the results of running the API

B.

Use the scaffolding capability of Anypoint Studio to create an API portal based on the API specification

C.

Publish the API specification to Exchange and solicit feedback from the API's consumers

D.

Use API Manager to version the API specification

Question 31

An integration Mute application consumes and processes a list of rows from a CSV file. Each row must be read from the CSV file, validated, and the row data sent to a JMS queue, in the exact order as in the CSV file.

If any processing step for a row falls, then a log entry must be written for that row, but processing of other rows must not be affected.

What combination of Mute components is most idiomatic (used according to their intended purpose) when Implementing the above requirements?

Options:

A.

Scatter-Gather component On Error Continue scope

B.

VM connector first Successful scope On Error Propagate scope

C.

For Each scope On Error Continue scope

D.

Async scope On Error Propagate scope

Question 32

An organization if struggling frequent plugin version upgrades and external plugin project dependencies. The team wants to minimize the impact on applications by creating best practices that will define a set of default dependencies across all new and in progress projects.

How can these best practices be achieved with the applications having the least amount of responsibility?

Options:

A.

Create a Mule plugin project with all the dependencies and add it as a dependency in each application's POM.xml file

B.

Create a mule domain project with all the dependencies define in its POM.xml file and add each application to the domain Project

C.

Add all dependencies in each application's POM.xml file

D.

Create a parent POM of all the required dependencies and reference each in each application's POM.xml file

Question 33

The AnyAirline organization's passenger reservations center is designing an integration solution that combines invocations of three different System APIs (bookFlight, bookHotel, and bookCar) in a business transaction. Each System API makes calls to a single database.

The entire business transaction must be rolled back when at least one of the APIs fails.

What is the most idiomatic (used for its intended purpose) way to integrate these APIs in near real-time that provides the best balance of consistency, performance, and reliability?

Options:

A.

Implement eXtended Architecture (XA) transactions between the API implementations

Coordinate between the API implementations using a Saga pattern

Implement caching in each API implementation to improve performance

B.

Implement local transactions within each API implementation

Configure each API implementation to also participate in the same eXtended Architecture (XA) transaction

Implement caching in each API implementation to improve performance

C.

Implement local transactions in each API implementation

Coordinate between the API implementations using a Saga pattern

Apply various compensating actions depending on where a failure occurs

D.

Implement an eXtended Architecture (XA) transaction manager in a Mule application using a Saga pattern

Connect each API implementation with the Mule application using XA transactions

Apply various compensating actions depending on where a failure occurs

Question 34

What is an advantage that Anypoint Platform offers by providing universal API management and Integration-Platform-as-a-Service (iPaaS) capabilities in a unified platform?

Options:

A.

Ability to use a single iPaaS to manage and integrate all API gateways

B.

Ability to use a single connector to manage and integrate all APis

C.

Ability to use a single control plane for both full-lifecycle AP] management and integration

D.

Ability to use a single iPaaS to manage all API developer portals

Question 35

An insurance company has an existing API which is currently used by customers. API is deployed to customer hosted Mule runtime cluster. The load balancer that is used to access any APIs on the mule cluster is only configured to point to applications hosted on the server at port 443.

Mule application team of a company attempted to deploy a second API using port 443 but the application will not start and checking logs shows an error indicating the address is already in use.

Which steps must the organization take to resolve this error and allow customers to access both the API's?

Options:

A.

Change the base path of the HTTP listener configuration in the second API to a different one from the first API

B.

Set HTTP listener configuration in both API's to allow for connections from multiple ports

C.

Move the HTTP listener configurations from the API's and package them in a mule domain project using port 443

D.

Set the HTTP listener of the second API to use different port than the one used in the first API

Question 36

According to MuleSoft's API development best practices, which type of API development approach starts with writing and approving an API contract?

Options:

A.

Implement-first

B.

Catalyst

C.

Agile

D.

Design-first

Question 37

What is true about automating interactions with Anypoint Platform using tools such as Anypoint Platform REST API's, Anypoint CLI or the Mule Maven plugin?

Options:

A.

By default, the Anypoint CLI and Mule Maven plugin are not included in the Mule runtime

B.

Access to Anypoint Platform API;s and Anypoint CLI can be controlled separately thruough the roles and permissions in Anypoint platform, so that specific users can get access to Anypoint CLI while others get access to the platform API's

C.

Anypoint Platform API's can only automate interactions with CloudHub while the Mule maven plugin is required for deployment to customer hosted Mule runtimes

D.

API policies can be applied to the Anypoint platform API's so that only certain LOS's has access to specific functions

Question 38

An organization's security policies mandate complete control of the login credentials used to log in to Anypoint Platform. What feature of Anypoint Platform should be used to meet this requirement?

Options:

A.

Enterprise Security Module

B.

Client ID Secret

C.

Federated Identity Management

D.

Federated Client Management

Question 39

Refer to the exhibit.

An organization uses a 2-node Mute runtime cluster to host one stateless API implementation. The API is accessed over HTTPS through a load balancer that uses round-robin for load distribution.

Two additional nodes have been added to the cluster and the load balancer has been configured to recognize the new nodes with no other change to the load balancer.

What average performance change is guaranteed to happen, assuming all cluster nodes are fully operational?

Options:

A.

50% reduction in the response time of the API

B.

100% increase in the throughput of the API

C.

50% reduction In the JVM heap memory consumed by each node

D.

50% reduction In the number of requests being received by each node

Question 40

An Integration Mule application is being designed to synchronize customer data between two systems. One system is an IBM Mainframe and the other system is a Salesforce Marketing Cloud (CRM) instance. Both systems have been deployed in their typical configurations, and are to be invoked using the native protocols provided by Salesforce and IBM.

What interface technologies are the most straightforward and appropriate to use in this Mute application to interact with these systems, assuming that Anypoint Connectors exist that implement these interface technologies?

Options:

A.

IBM: DB access CRM: gRPC

B.

IBM: REST CRM:REST

C.

IBM: Active MQ CRM: REST

D.

IBM: CICS CRM: SOAP

Question 41

An organization is using Mulesoft cloudhub and develops API's in the latest version. As a part of requirements for one of the API's, third party API needs to be called. The security team has made it clear that calling any external API needs to have include listing

As an integration architect please suggest the best way to accomplish the design plan to support these requirements?

Options:

A.

Implement includelist IP on the cloudhub VPC firewall to allow the traffic

B.

Implement the validation of includelisted IP operation

C.

Implement the Any point filter processor to implement the include list IP

D.

Implement a proxy for the third party API and enforce the IPinclude list policy and call this proxy from the flow of the API

Question 42

An API implementation is being designed that must invoke an Order API which is known to repeatedly experience downtime. For this reason a fallback API is to be called when the Order API is unavailable. What approach to designing invocation of the fallback API provides the best resilience?

Options:

A.

Redirect client requests through an HTTP 303 temporary redirect status code to the fallback API whenever the Order API is unavailable

B.

Set an option in the HTTP Requester component that invokes the order API to instead invoke a fallback API whenever an HTTP 4XX or 5XX response status code is received from Order API

C.

Create a separate entry for the order API in API manager and then invoke this API as a fallback API if the primary Order API is unavailable

D.

Search Anypoint Exchange for a suitable existing fallback API and them implement invocations to their fallback API in addition to the Order API

Question 43

An organization designing a hybrid, load balanced, single cluster production environment. Due to performance service level agreement goals, it is looking into running the Mule applications in an active-active multi node cluster configuration.

What should be considered when running its Mule applications in this type of environment?

Options:

A.

All event sources, regardless of time , can be configured as the target source by the primary node in the cluster

B.

An external load balancer is required to distribute incoming requests throughout the cluster nodes

C.

A Mule application deployed to multiple nodes runs in an isolation from the other nodes in the cluster

D.

Although the cluster environment is fully installed configured and running, it will not process any requests until an outage condition is detected by the primary node in the cluster.

Question 44

An XA transaction Is being configured that involves a JMS connector listening for Incoming JMS messages. What is the meaning of the timeout attribute of the XA transaction, and what happens after the timeout expires?

Options:

A.

The time that is allowed to pass between committing the transaction and the completion of the Mule flow After the timeout, flow processing triggers an error

B.

The time that Is allowed to pass between receiving JMS messages on the same JMS connection After the timeout, a new JMS connection Is established

C.

The time that Is allowed to pass without the transaction being ended explicitly After the timeout, the transaction Is forcefully rolled-back

D.

The time that Is allowed to pass for state JMS consumer threads to be destroyed After the timeout, a new JMS consumer thread is created

Question 45

Which Anypoint Platform component helps integration developers discovers and share reusable APIs, connectors, and templates?

Options:

A.

Anypoint Exchange

B.

API Manager

C.

Anypoint Studio

D.

Design Center

Question 46

A company is designing a mule application to consume batch data from a partner's ftps server The data files have been compressed and then digitally signed using PGP.

What inputs are required for the application to securely consumed these files?

Options:

A.

ATLS context Key Store requiring the private key and certificate for the company

PGP public key of partner

PGP private key for the company

B.

ATLS context first store containing a public certificate for partner ftps server and the PGP public key of the partner

TLS contact Key Store containing the FTP credentials

C.

TLS context trust or containing a public certificate for the ftps server The FTP username and password The PGP public key of the partner

D.

The PGP public key of the partner

The PGP private key for the company

The FTP username and password

Question 47

A Mule application uses the Database connector.

What condition can the Mule application automatically adjust to or recover from without needing to restart or redeploy the Mule application?

Options:

A.

One of the stored procedures being called by the Mule application has been renamed

B.

The database server was unavailable for four hours due to a major outage but is now fully operational again

C.

The credentials for accessing the database have been updated and the previous credentials are no longer valid

D.

The database server has been updated and hence the database driver library/JAR needs a minor version upgrade

Question 48

Refer to the exhibit.

An organization deploys multiple Mule applications to the same customer -hosted Mule runtime. Many of these Mule applications must expose an HTTPS endpoint on the same port using a server-side certificate that rotates often.

What is the most effective way to package the HTTP Listener and package or store the server-side certificate when deploying these Mule applications, so the disruption caused by certificate rotation is minimized?

Options:

A.

Package the HTTPS Listener configuration in a Mule DOMAIN project, referencing it from all Mule applications that need to expose an HTTPS endpoint Package the server-side certificate in ALL Mule APPLICATIONS that need to expose an HTTPS endpoint

B.

Package the HTTPS Listener configuration in a Mule DOMAIN project, referencing it from all Mule applications that need to expose an HTTPS endpoint. Store the server-side certificate in a shared filesystem location in the Mule runtime's classpath, OUTSIDE the Mule DOMAIN or any Mule APPLICATION

C.

Package an HTTPS Listener configuration In all Mule APPLICATIONS that need to expose an HTTPS endpoint Package the server-side certificate in a NEW Mule DOMAIN project

D.

Package the HTTPS Listener configuration in a Mule DOMAIN project, referencing It from all Mule applications that need to expose an HTTPS endpoint. Package the server-side certificate in the SAME Mule DOMAIN project Go to Set

Question 49

An IT integration delivery team begins a project by gathering all of the requirements, and proceeds to execute the remaining project activities as sequential, non-repeating phases.

Which IT project delivery methodology is this team following?

Options:

A.

Kanban

B.

Scrum

C.

Waterfall

D.

Agile

Question 50

Refer to the exhibit.

A Mule application is deployed to a cluster of two customer-hosted Mute runtimes. The Mute application has a flow that polls a database and another flow with an HTTP Listener.

HTTP clients send HTTP requests directly to individual cluster nodes.

What happens to database polling and HTTP request handling in the time after the primary (master) node of the cluster has railed, but before that node is restarted?

Options:

A.

Database polling continues Only HTTP requests sent to the remaining node continue to be accepted

B.

Database polling stops All HTTP requests continue to be accepted

C.

Database polling continues All HTTP requests continue to be accepted, but requests to the failed node Incur increased latency

D.

Database polling stops All HTTP requests are rejected

Question 51

An integration team follows MuleSoft’s recommended approach to full lifecycle API development.

Which activity should this team perform during the API implementation phase?

Options:

A.

Validate the API specification

B.

Use the API specification to build the MuleSoft application

C.

Design the API specification

D.

Use the API specification to monitor the MuleSoft application

Question 52

As a part of project requirement, Java Invoke static connector in a mule 4 application needs to invoke a static method in a dependency jar file. What are two ways to add the dependency to be visible by the connectors class loader?

(Choose two answers)

Options:

A.

In the Java Invoke static connector configuration, configure a path and name of the dependency jar file

B.

Add the dependency jar file to the java classpath by setting the JVM parameters

C.

Use Maven command to include the dependency jar file when packaging the application

D.

Configure the dependency as a shared library in the project POM

E.

Update mule-artefact.json to export the Java package

Question 53

A system administrator needs to determine when permissions were last changed for an Anypoint Platform user.

Which Anypoint Platform component should the administrator use to obtain this information?

Options:

A.

Audit Logging

B.

Anypoint Monitoring

C.

Anypiont Studio

D.

Mule Stack Traces

Question 54

When a Mule application using VM queues is deployed to a customer-hosted cluster or multiple CloudHub v1.0 workers/replicas, how are messages consumed across the nodes?

Options:

A.

Sequentially, from a dedicated Anypoint MQ queue

B.

Sequentially, only from the primary node

C.

In a non-deterministic way

D.

Round-robin, within an XA transaction

Question 55

A DevOps team has adequate observability of individual system behavior and performance, but it struggles to track the entire lifecycle of each request across different microservices.

Which additional observability approach should this team consider adopting?

Options:

A.

Analytics

B.

Metrics

C.

Tracing

D.

Data mining

Question 56

Cloud Hub is an example of which cloud computing service model?

Options:

A.

Platform as a Service (PaaS)

B.

Software as a Service (SaaS)

C.

Monitoring as a Service (MaaS)

D.

Infrastructure as a Service (laaS)

Question 57

A project team uses RAML specifications to document API functional requirements and deliver API definitions. As per the current legal requirement, all designed API definitions to be augmented with an additional non-functional requirement to protect the services from a high rate of requests according to define service level agreements.

Assuming that the project is following Mulesoft API governance and policies, how should the project team convey the necessary non-functional requirement to stakeholders?

Options:

A.

Create proxies in API manager for the non functional requirement and publish to exchange

B.

Add all non functional requirements as comments to RAML specification and publish to exchange

C.

Create various SLA's in API manager for the non functional requirement and publish to exchange

D.

Update API definitions with the fragment for the appropriate policy and publish to exchange

Question 58

An organization is building a test suite for their applications using m-unit. The integration architect has recommended using test recorder in studio to record the processing flows and then configure unit tests based on the capture events

What are the two considerations that must be kept in mind while using test recorder

(Choose two answers)

Options:

A.

Tests for flows cannot be created with Mule errors raised inside

the flow or already existing in the incoming event

B.

Recorder supports smoking a message before or inside a ForEach processor

C.

The recorder support loops where the structure of the data been tested

changes inside the iteration

D.

A recorded flow execution ends successfully but the result does

not reach its destination because the application is killed

E.

Mocking values resulting from parallel processes are possible and will not affect the execution of the processes that follow in the test

Question 59

Refer to the exhibit.

The HTTP Listener and the Logger are being handled from which thread pools respectively?

Options:

A.

CPU_INTENSIVE and Dedicated Selector pool

B.

UBER and NONBLOCKING

C.

Shared Selector Pool and CPU LITE

D.

BLOCKING _IO and UBER

Question 60

As a part of project , existing java implementation is being migrated to Mulesoft. Business is very tight on the budget and wish to complete the project in most economical way possible.

Canonical object model using java is already a part of existing implementation. Same object model is required by mule application for a business use case. What is the best way to achieve this?

Options:

A.

Make use of Java module

B.

Create similar model for Mule applications

C.

Create a custom application to read Java code and make it available for Mule application

D.

Use Anypoint exchange

Question 61

A platform architect includes both an API gateway and a service mesh in the architect of a distributed application for communication management.

Which type of communication management does a service mesh typically perform in this architecture?

Options:

A.

Between application services and the firewall

B.

Between the application and external API clients

C.

Between services within the application

D.

Between the application and external API implementations.

Question 62

An organization is creating a Mule application that will be deployed to CloudHub. The Mule application has a property named dbPassword that stores a database user’s password.

The organization's security standards indicate that the dbPassword property must be hidden from every Anypoint Platform user after the value is set in the Runtime Manager Properties tab.

What configuration in the Mule application helps hide the dbPassword property value in Runtime Manager?

Options:

A.

Use secure::dbPassword as the property placeholder name and store the cleartext (unencrypted) value in a secure properties placeholder file

B.

Use secure::dbPassword as the property placeholder name and store the property encrypted value in a secure properties placeholder file

C.

Add the dbPassword property to the secureProperties section of the pom.xml file

D.

Add the dbPassword property to the secureProperties section of the mule-artifact.json file

Question 63

What is an advantage of using OAuth 2.0 client credentials and access tokens over only API keys for API authentication?

Options:

A.

If the access token is compromised, the client credentials do not to be reissued.

B.

If the access token is compromised, I can be exchanged for an API key.

C.

If the client ID is compromised, it can be exchanged for an API key

D.

If the client secret is compromised, the client credentials do not have to be reissued.

Question 64

A developer is examining the responses from a RESTful web service that is compliant with the Mypertext Transfer Protocol (HTTP/1.1) a8 defined by the Internet Engineering Task Force (IETF).

In this HTTP/1.1-compliant web service, which class of HTTP response status codes should be specified to indicate when client requests are successfully received, understood, and accepted by the web service?

Options:

A.

3xx

B.

2xx

C.

4xx

D.

5xx

Question 65

An organization plans to use the Anypoint Platform audit logging service to log Anypoint MQ actions.

What consideration must be kept in mind when leveraging Anypoint MQ Audit Logs?

Options:

A.

Anypoint MQ Audit Logs include logs for sending, receiving, or browsing messages

B.

Anypoint MQ Audit Logs include fogs for failed Anypoint MQ operations

C.

Anypoint MQ Audit Logs include logs for queue create, delete, modify, and purge operations

Question 66

A Kubernetes controller automatically adds another pod replica to the resource pool in response to increased application load.

Which scalability option is the controller implementing?

Options:

A.

Down

B.

Diagonal

C.

Vertical

D.

Horizontal

Question 67

An organization has defined a common object model in Java to mediate the communication between different Mule applications in a consistent way. A Mule application is being built to use this common object model to process responses from a SOAP API and a REST API and then write the processed results to an order management system.

The developers want Anypoint Studio to utilize these common objects to assist in creating mappings for various transformation steps in the Mule application.

What is the most idiomatic (used for its intended purpose) and performant way to utilize these common objects to map between the inbound and outbound systems in the Mule application?

Options:

A.

Use JAXB (XML) and Jackson (JSON) data bindings

B.

Use the WSS module

C.

Use the Java module

D.

Use the Transform Message component

Question 68

An organization has strict unit test requirement that mandate every mule application must have an MUnit test suit with a test case defined for each flow and a minimum test coverage of 80%.

A developer is building Munit test suit for a newly developed mule application that sends API request to an external rest API.

What is the effective approach for successfully executing the Munit tests of this new application while still achieving the required test coverage for the Munit tests?

Options:

A.

Invoke the external endpoint of the rest API from the mule floors

B.

Mark the rest API invocations in the Munits and then call the mocking service flow that simulates standard responses from the REST API

C.

Mock the rest API invocation in the Munits and return a mock response for those invocations

D.

Create a mocking service flow to simulate standard responses from the rest API and then configure the mule flows to call the marking service flow

Question 69

An organization is implementing a Quote of the Day API that caches today's quote. What scenario can use the CloudHub Object Store connector to persist the cache's state?

Options:

A.

When there is one deployment of the API implementation to CloudHub and another one to customer hosted mule runtime that must share the cache state.

B.

When there are two CloudHub deployments of the API implementation by two Anypoint Platform business groups to the same CloudHub region that must share the cache state.

C.

When there is one CloudHub deployment of the API implementation to three workers that must share the cache state.

D.

When there are three CloudHub deployments of the API implementation to three separate CloudHub regions that must share the cache state.

Question 70

An organization currently uses a multi-node Mule runtime deployment model within their datacenter, so each Mule runtime hosts several Mule applications. The organization is planning to transition to a deployment model based on Docker containers in a Kubernetes cluster. The organization has already created a standard Docker image containing a Mule runtime and all required dependencies (including a JVM), but excluding the Mule application itself.

What is an expected outcome of this transition to container-based Mule application deployments?

Options:

A.

Required redesign of Mule applications to follow microservice architecture principles

B.

Required migration to the Docker and Kubernetes-based Anypoint Platform - Private Cloud Edition

C.

Required change to the URL endpoints used by clients to send requests to the Mule applications

D.

Guaranteed consistency of execution environments across all deployments of a Mule application

Question 71

As a part of business requirement , old CRM system needs to be integrated using Mule application. CRM system is capable of exchanging data only via SOAP/HTTP protocol. As an integration architect who follows API led approach , what is the the below step you will perform so that you can share document with CRM team?

Options:

A.

Create RAML specification using Design Center

B.

Create SOAP API specification using Design Center

C.

Create WSDL specification using text editor

D.

Create WSDL specification using Design Center

Question 72

An organization has an HTTPS-enabled Mule application named Orders API that receives requests from another Mule application named Process Orders.

The communication between these two Mule applications must be secured by TLS mutual authentication (two-way TLS).

At a minimum, what must be stored in each truststore and keystore of these two Mule applications to properly support two-way TLS between the two Mule applications while properly protecting each Mule application's keys?

Options:

A.

Orders API truststore: The Orders API public key

Process Orders keystore: The Process Orders private key and public key

B.

Orders API truststore: The Orders API private key and public key

Process Orders keystore: The Process Orders private key public key

C.

Orders API truststore: The Process Orders public key

Orders API keystore: The Orders API private key and public key

Process Orders truststore: The Orders API public key

Process Orders keystore: The Process Orders private key and public key

D.

Orders API truststore: The Process Orders public key

Orders API keystore: The Orders API private key

Process Orders truststore: The Orders API public key

Process Orders keystore: The Process Orders private key

Question 73

A stock trading company handles millions of trades a day and requires excellent performance and reliability within its stock trading system. The company operates a number of event-driven APIs Implemented as Mule applications that are hosted on various customer-hosted Mule clusters and needs to enable message exchanges between the APIs within their internal network using shared message queues.

What is an effective way to meet the cross-cluster messaging requirements of its event-driven APIs?

Options:

A.

Non-transactional JMS operations with a reliability pattern and manual acknowledgements

B.

Persistent VM queues with automatic acknowledgements

C.

JMS transactions with automatic acknowledgements

D.

extended Architecture (XA) transactions and XA connected components with manual acknowledgements

Question 74

A company wants its users to log in to Anypoint Platform using the company's own internal user credentials. To achieve this, the company needs to integrate an external identity provider (IdP) with the company's Anypoint Platform master organization, but SAML 2.0 CANNOT be used. Besides SAML 2.0, what single-sign-on standard can the company use to integrate the IdP with their Anypoint Platform master organization?

Options:

A.

SAML 1.0

B.

OAuth 2.0

C.

Basic Authentication

D.

OpenID Connect

Question 75

What Is a recommended practice when designing an integration Mule 4 application that reads a large XML payload as a stream?

Options:

A.

The payload should be dealt with as a repeatable XML stream, which must only be traversed (iterated-over) once and CANNOT be accessed randomly from DataWeave expressions and scripts

B.

The payload should be dealt with as an XML stream, without converting it to a single Java object (POJO)

C.

The payload size should NOT exceed the maximum available heap memory of the Mute runtime on which the Mule application executes

D.

The payload must be cached using a Cache scope If It Is to be sent to multiple backend systems

Question 76

How are the API implementation , API client, and API consumer combined to invoke and process an API ?

Options:

A.

The API consumer creates an API implementation , which receives API invocations from an API such that they are processed for an API client

B.

The API consumer creates an API client which sends API invocations to an API such that they are processed by an API implementation

C.

An API client creates an API consumer, which receives API invocation from an API such that they are processed for an API implementation

D.

The API client creates an API consumer which sends API invocations to an API such that they are processed by API implementation

Question 77

In one of the critical payment related mule application, transaction is being used . As an enhancement to implementation , scatter gather route is introduced which is also the part of transaction group. Scatter gather route has 4 routes.

What will be the behavior of the Mule application in case of error occurs in 4th route of the scatter-gather router and transaction needs to be rolled back?

Options:

A.

Only errored route will be rolled back

B.

All routes will be rolled back

C.

Scatter Gather router cannot be part of transaction

Question 78

A Mule application is built to support a local transaction for a series of operations on a single database. The Mule application has a Scatter-Gather that participates in the local transaction.

What is the behavior of the Scatter-Gather when running within this local transaction?

Options:

A.

Execution of each route within the Scatter-Gather occurs sequentially

Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations

B.

Execution of all routes within the Scatter-Gather occurs in parallel

Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations

C.

Execution of each route within the Scatter-Gather occurs sequentially

Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations

D.

Execution of each route within the Scatter-Gather occurs in parallel

Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations

Question 79

An auto mobile company want to share inventory updates with dealers Dl and D2 asynchronously and concurrently via queues Q1 and Q2. Dealer Dl must consume the message from the queue Q1 and dealer D2 to must consume a message from the queue Q2.

Dealer D1 has implemented a retry mechanism to reprocess the transaction in case of any errors while processing the inventers updates. Dealer D2 has not implemented any retry mechanism.

How should the dealers acknowledge the message to avoid message loss and minimize impact on the current implementation?

Options:

A.

Dealer D1 must use auto acknowledgement and dealer D2 can use manual acknowledgement and acknowledge the message after successful processing

B.

Dealer D1 can use auto acknowledgement and dealer D2 can use IMMEDIATE acknowledgement and acknowledge the message of successful processing

C.

Dealer D1 and dealer D2 must use AUTO acknowledgement and acknowledge the message after successful processing

D.

Dealer D1 can use AUTO acknowledgement and dealer D2 must use manual acknowledgement and acknowledge the message

after successful processing

Demo: 79 questions
Total 273 questions