New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Salesforce MuleSoft-Platform-Architect-I Salesforce Certified MuleSoft Platform Architect 1 Exam (WI25) Exam Practice Test

Salesforce Certified MuleSoft Platform Architect 1 Exam (WI25) Questions and Answers

Question 1

Which layer in the API-led connectivity focuses on unlocking key systems, legacy systems, data sources etc and exposes the functionality?

Options:

A.

Experience Layer

B.

Process Layer

C.

System Layer

Question 2

What API policy would be LEAST LIKELY used when designing an Experience API that is intended to work with a consumer mobile phone or tablet application?

Options:

A.

OAuth 2.0 access token enforcement

B.

Client ID enforcement

C.

JSON threat protection

D.

IPwhitellst

Question 3

An API implementation is updated. When must the RAML definition of the API also be updated?

Options:

A.

When the API implementation changes the structure of the request or response messages

B.

When the API implementation changes from interacting with a legacy backend system deployed on-premises to a modern, cloud-based (SaaS) system

C.

When the API implementation is migrated from an older to a newer version of the Mule runtime

D.

When the API implementation is optimized to improve its average response time

Question 4

Which statement is true about identity management and client management on Anypoint Platform?

Options:

A.

If an external identity provider is configured, the SAML 2.0 bearer tokens issued by the identity provider cannot be used for invocations of the Anypoint Platform web APIs

B.

If an external client provider is configured, it must be configured at the Anypoint Platform organization level and cannot be assigned to individual business groups and environments

C.

Anypoint Platform supports configuring one external identity provider

D.

Both client management and identity management require an identity provider

Question 5

An Order API triggers a sequence of other API calls to look up details of an order's items in a back-end inventory database. The Order API calls the OrderItems process API, which calls the Inventory system API. The Inventory system API performs database operations in the back-end inventory database.

The network connection between the Inventory system API and the database is known to be unreliable and hang at unpredictable times.

Where should a two-second timeout be configured in the API processing sequence so that the Order API never waits more than two seconds for a response from the Orderltems process API?

Options:

A.

In the Orderltems process API implementation

B.

In the Order API implementation

C.

In the Inventory system API implementation

D.

In the inventory database

Question 6

What is most likely NOT a characteristic of an integration test for a REST API implementation?

Options:

A.

The test needs all source and/or target systems configured and accessible

B.

The test runs immediately after the Mule application has been compiled and packaged

C.

The test is triggered by an external HTTP request

D.

The test prepares a known request payload and validates the response payload

Question 7

A retail company with thousands of stores has an API to receive data about purchases and insert it into a single database. Each individual store sends a batch of purchase data to the API about every 30 minutes. The API implementation uses a database bulk insert command to submit all the purchase data to a database using a custom JDBC driver provided by a data analytics solution provider. The API implementation is deployed to a single CloudHub worker. The JDBC driver processes the data into a set of several temporary disk files on the CloudHub worker, and then the data is sent to an analytics engine using a proprietary protocol. This process usually takes less than a few minutes. Sometimes a request fails. In this case, the logs show a message from the JDBC driver indicating an out-of-file-space message. When the request is resubmitted, it is successful. What is the best way to try to resolve this throughput issue?

Options:

A.

se a CloudHub autoscaling policy to add CloudHub workers

B.

Use a CloudHub autoscaling policy to increase the size of the CloudHub worker

C.

Increase the size of the CloudHub worker(s)

D.

Increase the number of CloudHub workers

Question 8

What is a key requirement when using an external Identity Provider for Client Management in Anypoint Platform?

Options:

A.

Single sign-on is required to sign in to Anypoint Platform

B.

The application network must include System APIs that interact with the Identity Provider

C.

To invoke OAuth 2.0-protected APIs managed by Anypoint Platform, API clients must submit access tokens issued by that same Identity Provider

D.

APIs managed by Anypoint Platform must be protected by SAML 2.0 policies

Question 9

A client has several applications running on the Salesforce service cloud. The business requirement for integration is to get daily data changes from Account and Case

Objects. Data needs to be moved to the client's private cloud AWS DynamoDB instance as a single JSON and the business foresees only wanting five attributes from the

Account object, which has 219 attributes (some custom) and eight attributes from the Case Object.

What design should be used to support the API/ Application data model?

Options:

A.

Create separate entities for Account and Case Objects by mimicking all the attributes in SAPI, which are combined by the PAPI and filtered to provide JSON output containing 13 attributes.

B.

Request client’s AWS project team to replicate all the attributes and create Account and Case JSON table in DynamoDB. Then create separate entities for Account and Case Objects by mimicking all the attributes in SAPI to

transfer ISON data to DynamoD for respective Objects

C.

Start implementing an Enterprise Data Model by defining enterprise Account and Case Objects and implement SAPI and DynamoDB tables based on the Enterprise Data Model,

D.

Create separate entities for Account with five attributes and Case with eight attributes in SAPI, which are combined by the PAPI to provide JSON output containing 13 attributes.

Question 10

An API is protected with a Client ID Enforcement policy and uses the default configuration. Access is requested for the client application to the API, and an approved

contract now exists between the client application and the API

How can a consumer of this API avoid a 401 error "Unauthorized or invalid client application credentials"?

Options:

A.

Send the obtained token as a header in every call

B.

Send the obtained: client_id and client_secret in the request body

C.

Send the obtained clent_id and clent_secret as URI parameters in every call

D.

Send the obtained clent_id and client_secret in the header of every API Request call

Question 11

A customer wants to monitor and gain insights about the number of requests coming in a given time period as well as to measure key performance indicators

(response times, CPU utilization, number of active APIs).

Which tool provides these data insights?

Options:

A.

Anypoint Monitoring

B.

APT Manager

C.

Runtime Alerts

D.

Functional Monitoring

Question 12

A Mule 4 API has been deployed to CloudHub and a Basic Authentication - Simple policy has been applied to all API methods and resources. However, the API is still accessible

by clients without using authentication.

How is this possible?

Options:

A.

The APE Router component is pointing to the incorrect Exchange version of the APT

B.

The Autodiscovery element is not present, in the deployed Mule application

C.

No… for client applications have been created of this API

D.

One of the application’s CloudHub workers restarted

Question 13

A European company has customers all across Europe, and the IT department is migrating from an older platform to MuleSoft. The main requirements are that the

new platform should allow redeployments with zero downtime and deployment of applications to multiple runtime versions, provide security and speed, and utilize Anypoint MQ

as the message service.

Which runtime plane should the company select based on the requirements without additional network configuration?

Options:

A.

Runtime Fabric on VMs / Bare Metal for the runtime plane

B.

Customer-hosted runtime plane

C.

MuleSoft-hosted runtime plane (CloudHub)

D.

Anypoint Runtime Fabric on Self-Managed Kubernetes for the runtime plane

Question 14

Which out-of-the-box key performance indicator measures the success of a typical Center for Enablement and is immediately available in responses from Anypoint Platform APIs?

Options:

A.

Per business group, the ratio of the number of production APT implementations deployed using a C1/CD pipeline to the number of production API implementations deployed manually

B.

Per deployed API implementation, the amount of bandwidth consumed each day

C.

Per published API, the number of developers that downloaded s version of the API specification

D.

Per published API, the number of consumers that requested access to the API and have been approved in the Production environment

Question 15

What condition requires using a CloudHub Dedicated Load Balancer?

Options:

A.

When cross-region load balancing is required between separate deployments of the same Mule application

B.

When custom DNS names are required for API implementations deployed to customer-hosted Mule runtimes

C.

When API invocations across multiple CloudHub workers must be load balanced

D.

When server-side load-balanced TLS mutual authentication is required between API implementations and API clients

Question 16

How can the application of a rate limiting API policy be accurately reflected in the RAML definition of an API?

Options:

A.

By refining the resource definitions by adding a description of the rate limiting policy behavior

B.

By refining the request definitions by adding a remaining Requests query parameter with description, type, and example

C.

By refining the response definitions by adding the out-of-the-box Anypoint Platform rate-limit-enforcement securityScheme with description, type, and example

D.

By refining the response definitions by adding the x-ratelimit-* response headers with description, type, and example

Question 17

What is true about automating interactions with Anypoint Platform using tools such as Anypoint Platform REST APIs, Anypoint CU, or the Mule Maven plugin?

Options:

A.

Access to Anypoint Platform APIs and Anypoint CU can be controlled separately through the roles and permissions in Anypoint Platform, so that specific users can get access to Anypoint CLI white others get access to the platform APIs

B.

Anypoint Platform APIs can ONLY automate interactions with CloudHub, while the Mule Maven plugin is required for deployment to customer-hosted Mule runtimes

C.

By default, the Anypoint CLI and Mule Maven plugin are NOT included in the Mule runtime, so are NOT available to be used by deployed Mule applications

D.

API policies can be applied to the Anypoint Platform APIs so that ONLY certain LOBs have access to specific functions

Question 18

Refer to the exhibits.

Which architectural constraint is compatible with the API-led connectivity architectural style?

Options:

A.

Always use a tiered approach by creating exactly one API for each of the three layers (Experience, Process, and System)

B.

Use a Process API to-orchestrate calls to multiple System APIs but not to other Process APIs:

C.

Allow System APIs to return data that is not currently required by the identified Process or Experience APIs

D.

Handle customizations for the end-user application at the Process layer rather than at the Experience layer

Question 19

Question 10: Skipped

An API implementation returns three X-RateLimit-* HTTP response headers to a requesting API client. What type of information do these response headers indicate to the API client?

Options:

A.

The error codes that result from throttling

B.

A correlation ID that should be sent in the next request

C.

The HTTP response size

D.

The remaining capacity allowed by the API implementation

Question 20

Refer to the exhibit.

Three business processes need to be implemented, and the implementations need to communicate with several different SaaS applications.

These processes are owned by separate (siloed) LOBs and are mainly independent of each other, but do share a few business entities. Each LOB has one development team and their own budget

In this organizational context, what is the most effective approach to choose the API data models for the APIs that will implement these business processes with minimal redundancy of the data models?

A) Build several Bounded Context Data Models that align with coherent parts of the business processes and the definitions of associated business entities

B) Build distinct data models for each API to follow established micro-services and Agile API-centric practices

C) Build all API data models using XML schema to drive consistency and reuse across the organization

D) Build one centralized Canonical Data Model (Enterprise Data Model) that unifies all the data types from all three business processes, ensuring the data model is consistent and non-redundant

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 21

What is the most performant out-of-the-box solution in Anypoint Platform to track transaction state in an asynchronously executing long-running process implemented as a Mule application deployed to multiple CloudHub workers?

Options:

A.

Redis distributed cache

B.

java.util.WeakHashMap

C.

Persistent Object Store

D.

File-based storage

Question 22

What is true about the technology architecture of Anypoint VPCs?

Options:

A.

The private IP address range of an Anypoint VPC is automatically chosen by CloudHub

B.

Traffic between Mule applications deployed to an Anypoint VPC and on-premises systems can stay within a private network

C.

Each CloudHub environment requires a separate Anypoint VPC

D.

VPC peering can be used to link the underlying AWS VPC to an on-premises (non AWS) private network

Question 23

An established communications company is beginning its API-led connectivity journey, The company has been using a successful Enterprise Data Model for many years. The company has identified a self-service account management app as the first effort for API-led, and it has identified the following APIs.

Experience layer: Mobile Account Management EAPI, Browser Account Management EAPI

Process layer: Customer Lookup PAPI, Service Lookup PAPI, Account Lookup PAPI

System layer: Customer SAPI, Account SAPI, Product SAPI, Service SAPI

According to MuleSoft's API-led connectivity approach, which API would not be served by the Enterprise Data Model?

Options:

A.

Customer SAPI

B.

Customer Lookup PAPI

C.

Mobile Account Management EAPI

D.

Service SAPI

Question 24

An IT Security Compliance Auditor is assessing which nonfunctional requirements (NFRs) are already being implemented to meet security measures.

* The Web API has Rate-Limiting SLA

* Basic Authentication - LDAP

* JSON Threat Protection

* TP Allowlist policies applied

Which two NFRs-are enforced?

Options:

A.

The API invocations are coming from a known subnet range

B.

Username/password supported to validate login credentials

C.

Sensitive data is masked to prevent compromising critical information

D.

The API is protected against XML invocation attacks

E.

Performance expectations are to be allowed up to 1,000 requests per second

Question 25

Once an API Implementation is ready and the API is registered on API Manager, who should request the access to the API on Anypoint Exchange?

Options:

A.

None

B.

Both

C.

API Client

D.

API Consumer

Question 26

An API implementation is being designed that must invoke an Order API, which is known to repeatedly experience downtime.

For this reason, a fallback API is to be called when the Order API is unavailable.

What approach to designing the invocation of the fallback API provides the best resilience?

Options:

A.

Search Anypoint Exchange for a suitable existing fallback API, and then implement invocations to this fallback API in addition to the Order API

B.

Create a separate entry for the Order API in API Manager, and then invoke this API as a fallback API if the primary Order API is unavailable

C.

Redirect client requests through an HTTP 307 Temporary Redirect status code to the fallback API whenever the Order API is unavailable

D.

Set an option in the HTTP Requester component that invokes the Order API to instead invoke a fallback API whenever an HTTP 4xx or 5xx response status code is returned from the Order API

Question 27

4 Production environment is running on a dedicated Virtual Private Cloud (VPC) on CloudHub 1,0, and the security team guidelines clearly state no traffic on HTTP.

Which two options support these security guidelines?

Choose 2 answers

Options:

A.

Configure the HTTPS protocol in HTTP listener in the Mule application

B.

Create a custom policy to apply to outgoing and incoming HTTP requests to control access to a configured API endpoint

C.

Remove the entry from the VPC firewall rule

D.

Configure the IP Blocklist policy to control access to a configured API endpoint from either a single IP address or a range of IP addresses.

E.

Add the entry in the VPC firewall rule.

Question 28

Which scenario is suited for MUnit tests instead of integration tests?

Options:

A.

For read-only interactions to any dependencies (such as other web APIs)

B.

When testing does not require knowledge of implementation details

C.

When no mocking is permissible

D.

For tests that are implemented using SoapUI

Question 29

A company is building an application network using MuleSoft's recommendations for various API layers.

What is the main (default) role of a process API in an application network?

Options:

A.

To secure and optimize the data synchronization processing of large data dumps between back-end systems

B.

To manage and process the secure direct communication between a back-end system and an end-user client of mobile device in the application network

C.

To automate parts of business processes by coordinating and orchestrating the invocation of other APIs in the application network

D.

To secure, Manage, and process communication with specific types of end-user client applications or devices in the application network

Question 30

What do the API invocation metrics provided by Anypoint Platform provide?

Options:

A.

ROI metrics from APIs that can be directly shared with business users

B.

Measurements of the effectiveness of the application network based on the level of reuse

C.

Data on past API invocations to help identify anomalies and usage patterns across various APIs

D.

Proactive identification of likely future policy violations that exceed a given threat threshold

Question 31

A developer from the Central IT team has created an initial version of the RAML definition in Design Center for an OAuth 2.0-protected System API and published it

to Exchange. Another developer from LoB IT discovered the System API in Exchange and would like to leverage it in the Process API.

What is the MuleSoft-recommended approach for Process API to invoke the System API?

Options:

A.

The Process API needs to import an CAuth 2.0 module from Exchange first and update it with OAuth 2.0 credentials before the System API can be invoked

B.

The Process API uses property YAML files to store the System API URLs and uses the HTTP Request Connector to invoke the Systerm API

C.

The Process APL uses the REST Connect Connector autogenerated in Exchange for the System API

D.

The Process API manually updates the Process API POM file to include the System API as a dependency

Question 32

An organization has several APIs that accept JSON data over HTTP POST. The APIs are all publicly available and are associated with several mobile applications and web applications.

The organization does NOT want to use any authentication or compliance policies for these APIs, but at the same time, is worried that some bad actor could send payloads that could somehow compromise the applications or servers running the API implementations.

What out-of-the-box Anypoint Platform policy can address exposure to this threat?

Options:

A.

Shut out bad actors by using HTTPS mutual authentication for all API invocations

B.

Apply an IP blacklist policy to all APIs; the blacklist will Include all bad actors

C.

Apply a Header injection and removal policy that detects the malicious data before it is used

D.

Apply a JSON threat protection policy to all APIs to detect potential threat vectors

Question 33

What best describes the Fully Qualified Domain Names (FQDNs), also known as DNS entries, created when a Mule application is deployed to the CloudHub Shared Worker Cloud?

Options:

A.

A fixed number of FQDNs are created, IRRESPECTIVE of the environment and VPC design

B.

The FQDNs are determined by the application name chosen, IRRESPECTIVE of the region

C.

The FQDNs are determined by the application name, but can be modified by an administrator after deployment

D.

The FQDNs are determined by both the application name and the Anypoint Platform organization

Question 34

A new upstream API Is being designed to offer an SLA of 500 ms median and 800 ms maximum (99th percentile) response time. The corresponding API implementation needs to sequentially invoke 3 downstream APIs of very similar complexity.

The first of these downstream APIs offers the following SLA for its response time: median: 100 ms, 80th percentile: 500 ms, 95th percentile: 1000 ms.

If possible, how can a timeout be set in the upstream API for the invocation of the first downstream API to meet the new upstream API's desired SLA?

Options:

A.

Set a timeout of 50 ms; this times out more invocations of that API but gives additional room for retries

B.

Set a timeout of 100 ms; that leaves 400 ms for the other two downstream APIs to complete

C.

No timeout is possible to meet the upstream API's desired SLA; a different SLA must be negotiated with the first downstream API or invoke an alternative API

D.

Do not set a timeout; the Invocation of this API Is mandatory and so we must wait until it responds

Question 35

A customer has an ELA contract with MuleSoft. An API deployed to CloudHub is consistently experiencing performance issues. Based on the root cause analysis, it is

determined that autoscaling needs to be applied.

How can this be achieved?

Options:

A.

Configure a policy so that when the number of HTTP requests reaches a certain threshold the number of workers/replicas increases (horizontal scaling)

B.

Configure two separate policies: When CPU and memory reach certain threshold, increase the worker/replica type (vertical sealing) and the number of workers/replicas (horizontal sealing)

C.

Configure a policy based on CPU usage so that CloudHub auto-adjusts the number of workers/replicas (horizontal scaling)

D.

Configure a policy so that when the response time reaches a certain threshold the worker/replica type increases (vertical scaling)

Question 36

What correctly characterizes unit tests of Mule applications?

Options:

A.

They test the validity of input and output of source and target systems

B.

They must be run in a unit testing environment with dedicated Mule runtimes for the environment

C.

They must be triggered by an external client tool or event source

D.

They are typically written using MUnit to run in an embedded Mule runtime that does not require external connectivity

Question 37

An organization has implemented a Customer Address API to retrieve customer address information. This API has been deployed to multiple environments and has been configured to enforce client IDs everywhere.

A developer is writing a client application to allow a user to update their address. The developer has found the Customer Address API in Anypoint Exchange and wants to use it in their client application.

What step of gaining access to the API can be performed automatically by Anypoint Platform?

Options:

A.

Approve the client application request for the chosen SLA tier

B.

Request access to the appropriate API Instances deployed to multiple environments using the client application's credentials

C.

Modify the client application to call the API using the client application's credentials

D.

Create a new application in Anypoint Exchange for requesting access to the API

Question 38

Traffic is routed through an API proxy to an API implementation. The API proxy is managed by API Manager and the API implementation is deployed to a CloudHub VPC using Runtime Manager. API policies have been applied to this API. In this deployment scenario, at what point are the API policies enforced on incoming API client requests?

Options:

A.

At the API proxy

B.

At the API implementation

C.

At both the API proxy and the API implementation

D.

At a MuleSoft-hosted load balancer

Question 39

Which component monitors APIs and endpoints at scheduled intervals, receives reports about whether tests pass or fail, and displays statistics about API and endpoint

performance?

Options:

A.

API Analytics

B.

Anypoint Monitoring dashboards

C.

APT Functional Monitoring

D.

Anypoint Runtime Manager alerts

Question 40

A REST API is being designed to implement a Mule application.

What standard interface definition language can be used to define REST APIs?

Options:

A.

Web Service Definition Language(WSDL)

B.

OpenAPI Specification (OAS)

C.

YAML

D.

AsyncAPI Specification

Question 41

When designing an upstream API and its implementation, the development team has been advised to NOT set timeouts when invoking a downstream API, because that downstream API has no SLA that can be relied upon. This is the only downstream API dependency of that upstream API.

Assume the downstream API runs uninterrupted without crashing. What is the impact of this advice?

Options:

A.

An SLA for the upstream API CANNOT be provided

B.

The invocation of the downstream API will run to completion without timing out

C.

A default timeout of 500 ms will automatically be applied by the Mule runtime in which the upstream API implementation executes

D.

A toad-dependent timeout of less than 1000 ms will be applied by the Mule runtime in which the downstream API implementation executes

Question 42

An API has been updated in Anypoint Exchange by its API producer from version 3.1.1 to 3.2.0 following accepted semantic versioning practices and the changes have been communicated via the API's public portal.

The API endpoint does NOT change in the new version.

How should the developer of an API client respond to this change?

Options:

A.

The update should be identified as a project risk and full regression testing of the functionality that uses this API should be run

B.

The API producer should be contacted to understand the change to existing functionality

C.

The API producer should be requested to run the old version in parallel with the new one

D.

The API client code ONLY needs to be changed if it needs to take advantage of new features

Question 43

What Anypoint Connectors support transactions?

Options:

A.

Database, JMS, VM

B.

Database, 3MS, HTTP

C.

Database, JMS, VM, SFTP

D.

Database, VM, File

Question 44

Refer to the exhibit. An organization needs to enable access to their customer data from both a mobile app and a web application, which each need access to common fields as well as certain unique fields.

The data is available partially in a database and partially in a 3rd-party CRM system.

What APIs should be created to best fit these design requirements?

A) A Process API that contains the data required by both the web and mobile apps, allowing these applications to invoke it directly and access the data they need thereby providing the flexibility to add more fields in the future without needing API changes

B) One set of APIs (Experience API, Process API, and System API) for the web app, and another set for the mobile app

C) Separate Experience APIs for the mobile and web app, but a common Process API that invokes separate System APIs created for the database and CRM system

D) A common Experience API used by both the web and mobile apps, but separate Process APIs for the web and mobile apps that interact with the database and the CRM System

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 45

When could the API data model of a System API reasonably mimic the data model exposed by the corresponding backend system, with minimal improvements over the backend system's data model?

Options:

A.

When there is an existing Enterprise Data Model widely used across the organization

B.

When the System API can be assigned to a bounded context with a corresponding data model

C.

When a pragmatic approach with only limited isolation from the backend system is deemed appropriate

D.

When the corresponding backend system is expected to be replaced in the near future