Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

MuleSoft-Integration-Architect-I Salesforce Certified MuleSoft Integration Architect 1 (SP24) Exam Questions and Answers

Questions 4

What aspects of a CI/CD pipeline for Mule applications can be automated using MuleSoft-provided Maven plugins?

Options:

A.

Compile, package, unit test, validate unit test coverage, deploy

B.

Compile, package, unit test, deploy, integration test (Incorrect)

C.

Compile, package, unit test, deploy, create associated API instances in API Manager

D.

Import from API designer, compile, package, unit test, deploy, publish to Anypoint Exchange

Buy Now
Questions 5

An API has been unit tested and is ready for integration testing. The API is governed by a Client ID Enforcement policy in all environments.

What must the testing team do before they can start integration testing the API in the Staging environment?

Options:

A.

They must access the API portal and create an API notebook using the Client ID and Client Secret supplied by the API portal in the Staging environment

B.

They must request access to the API instance in the Staging environment and obtain a Client ID and Client Secret to be used for testing the API

C.

They must be assigned as an API version owner of the API in the Staging environment

D.

They must request access to the Staging environment and obtain the Client ID and Client Secret for that environment to be used for testing the API

Buy Now
Questions 6

An organization uses Mule runtimes which are managed by Anypoint Platform - Private Cloud Edition. What MuleSoft component is responsible for feeding analytics data to non-MuleSoft analytics platforms?

Options:

A.

Anypoint Exchange

B.

The Mule runtimes

C.

Anypoint API Manager

D.

Anypoint Runtime Manager

Buy Now
Questions 7

What aspect of logging is only possible for Mule applications deployed to customer-hosted Mule runtimes, but NOT for Mule applications deployed to CloudHub?

Options:

A.

To send Mule application log entries to Splunk

B.

To change tog4j2 tog levels in Anypoint Runtime Manager without having to restart the Mule application

C.

To log certain messages to a custom log category

D.

To directly reference one shared and customized log4j2.xml file from multiple Mule applications

Buy Now
Questions 8

Refer to the exhibit.

A business process involves two APIs that interact with each other asynchronously over HTTP. Each API is implemented as a Mule application. API 1 receives the initial HTTP request and invokes API 2 (in a fire and forget fashion) while API 2, upon completion of the processing, calls back into API l to notify about completion of the asynchronous process.

Each API Is deployed to multiple redundant Mule runtimes and a separate load balancer, and is deployed to a separate network zone.

In the network architecture, how must the firewall rules be configured to enable the above Interaction between API 1 and API 2?

Options:

A.

To authorize the certificate to be used both APIs

B.

To enable communication from each API’s Mule Runtimes and Network zone to the load balancer of the other API

C.

To open direct two-way communication between the Mule Runtimes of both API’s

D.

To allow communication between load balancers used by each API

Buy Now
Questions 9

A team has completed the build and test activities for a Mule application that implements a System API for its application network.

Which Anypoint Platform component should the team now use to both deploy and monitor the System AP\ implementation?

Options:

A.

API Manager

B.

Design Center

C.

Anypoint Exchange

D.

Runtime Manager

Buy Now
Questions 10

Which Mulesoft feature helps users to delegate their access without sharing sensitive credentials or giving full control of accounts to 3rd parties?

Options:

A.

Secure Scheme

B.

client id enforcement policy

C.

Connected apps

D.

Certificates

Buy Now
Questions 11

As a part of project requirement, client will send a stream of data to mule application. Payload size can vary between 10mb to 5GB. Mule application is required to transform the data and send across multiple sftp servers. Due to the cost cuttings in the organization, mule application can only be allocated one worker with size of 0.2 vCore.

As an integration architect , which streaming strategy you would suggest to handle this scenario?

Options:

A.

In-memory non repeatable stream

B.

File based non-repeatable stream

C.

In-memory repeatable stream

D.

File based repeatable storage

Buy Now
Questions 12

The AnyAirline organization's passenger reservations center is designing an integration solution that combines invocations of three different System APIs (bookFlight, bookHotel, and bookCar) in a business transaction. Each System API makes calls to a single database.

The entire business transaction must be rolled back when at least one of the APIs fails.

What is the most idiomatic (used for its intended purpose) way to integrate these APIs in near real-time that provides the best balance of consistency, performance, and reliability?

Options:

A.

Implement eXtended Architecture (XA) transactions between the API implementations

Coordinate between the API implementations using a Saga pattern

Implement caching in each API implementation to improve performance

B.

Implement local transactions within each API implementation

Configure each API implementation to also participate in the same eXtended Architecture (XA) transaction

Implement caching in each API implementation to improve performance

C.

Implement local transactions in each API implementation

Coordinate between the API implementations using a Saga pattern

Apply various compensating actions depending on where a failure occurs

D.

Implement an eXtended Architecture (XA) transaction manager in a Mule application using a Saga pattern

Connect each API implementation with the Mule application using XA transactions

Apply various compensating actions depending on where a failure occurs

Buy Now
Questions 13

An organization’s IT team must secure all of the internal APIs within an integration solution by using an API proxy to apply required authentication and authorization policies.

Which integration technology, when used for its intended purpose, should the team choose to meet these requirements if all other relevant factors are equal?

Options:

A.

API Management (APIM)

B.

Robotic Process Automation (RPA)

C.

Electronic Data Interchange (EDI)

D.

Integration Platform-as-a-service (PaaS)

Buy Now
Questions 14

A system administrator needs to determine when permissions were last changed for an Anypoint Platform user.

Which Anypoint Platform component should the administrator use to obtain this information?

Options:

A.

Audit Logging

B.

Anypoint Monitoring

C.

Anypiont Studio

D.

Mule Stack Traces

Buy Now
Questions 15

A team would like to create a project skeleton that developers can use as a starting point when creating API Implementations with Anypoint Studio. This skeleton should help drive consistent use of best practices within the team.

What type of Anypoint Exchange artifact(s) should be added to Anypoint Exchange to publish the project skeleton?

Options:

A.

A custom asset with the default API implementation

B.

A RAML archetype and reusable trait definitions to be reused across API implementations

C.

An example of an API implementation following best practices

D.

a Mule application template with the key components and minimal integration logic

Buy Now
Questions 16

An Order microservice and a Fulfillment microservice are being designed to communicate with their dients through message-based integration (and NOT through API invocations).

The Order microservice publishes an Order message (a kind of command message) containing the details of an order to be fulfilled. The intention is that Order messages are only consumed by one Mute application, the Fulfillment microservice.

The Fulfilment microservice consumes Order messages, fulfills the order described therein, and then publishes an OrderFulfilted message (a kind of event message). Each OrderFulfilted message can be consumed by any interested Mule application, and the Order microservice is one such Mute application.

What is the most appropriate choice of message broker(s) and message destination(s) in this scenario?

Options:

A.

Order messages are sent to an Anypoint MQ exchange OrderFulfilled messages are sent to an Anypoint MQ queue Both microservices interact with Anypoint MQ as the message broker, which must therefore scale to support the load of both microservices

B.

Order messages are sent to a JMS queue. OrderFulfilled messages are sent to a JMS topic Both microservices interact with the same JMS provider (message broker) instance, which must therefore scale to support the load of both microservices

C.

Order messages are sent directly to the Fulfillment microservices. OrderFulfilled messages are sent directly to the Order microservice The Order microservice interacts with one AMQP-compatible message broker and the Fulfillment microservice interacts with a different AMQP-compatible message broker, so that both message brokers can be chosen and scaled to best support the load of each microservice

D.

Order messages are sent to a JMS queue. OrderFulfilled messages are sent to a JMS topic The Order microservice interacts with one JMS provider (message broker) and the Fulfillment microservice interacts with a different JMS provider, so that both message brokers can be chosen and scaled to best support the load of each microservice

Buy Now
Questions 17

An organization needs to enable access to their customer data from both a mobile app and a web application, which each need access to common fields as well as certain unique fields. The data is available partially in a database and partially in a 3rd-party CRM system. What APIs should be created to best fit these design requirements?

Options:

A.

A Process API that contains the data required by both the web and mobile apps, allowing these applications to invoke it directly and access the data they need thereby providing the flexibility to add more fields in the future without needing API changes.

B.

One set of APIs (Experience API, Process API, and System API) for the web app, and another set for the mobile app.

C.

Separate Experience APIs for the mobile and web app, but a common Process API that invokes separate System APIs created for the database and CRM system

D.

A common Experience API used by both the web and mobile apps, but separate Process APIs for the web and mobile apps that interact with the database and the CRM System.

Buy Now
Questions 18

An IT integration tram followed an API-led connectivity approach to implement an order-fulfillment business process. It created an order processing AP that coordinates stateful interactions with a variety of microservices that validate, create, and fulfill new product orders

Which interaction composition pattern did the integration architect who designed this order processing AP| use?

Options:

A.

Orchestration

B.

Streaming

C.

Aggregation

D.

Multicasting

Buy Now
Questions 19

What aspects of a CI/CD pipeline for Mute applications can be automated using MuleSoft-provided Maven plugins?

Options:

A.

Compile, package, unit test, deploy, create associated API instances in API Manager

B Import from API designer, compile, package, unit test, deploy, publish to Am/point Exchange

B.

Compile, package, unit test, validate unit test coverage, deploy

C.

Compile, package, unit test, deploy, integration test

Buy Now
Questions 20

A developer is examining the responses from a RESTful web service that is compliant with the Mypertext Transfer Protocol (HTTP/1.1) a8 defined by the Internet Engineering Task Force (IETF).

In this HTTP/1.1-compliant web service, which class of HTTP response status codes should be specified to indicate when client requests are successfully received, understood, and accepted by the web service?

Options:

A.

3xx

B.

2xx

C.

4xx

D.

5xx

Buy Now
Questions 21

An external API frequently invokes an Employees System API to fetch employee data from a MySQL database. The architect must design a caching strategy to query the database only when there Is an update to the Employees table or else return a cached response in order to minimize the number of redundant transactions being handled by the database.

Options:

A.

Use an On Table Row operation configured with the Employees table, call invalidate cache, and hardcode the new Employees data to cache. Use an object-store-caching-strategy and set the expiration interval to 1 hour.

B.

Use an On Table Row operation configured with the Employees table and cail invalidate cache. Use an object-store-caching-strategy and the default expiration interval.

C.

Use a Scheduler with a fixed frequency set to every hour to trigger an invalidate cache flow. Use an object-store-caching-strategy and the default expiration interval.

D.

Use a Scheduler with a fixed frequency set to every hour, triggering an invalidate cache flow. Use an object-store-caching-strategy and set the expiration interval to 1 hour.

Buy Now
Questions 22

An organization is designing Mule application which connects to a legacy backend. It has been reported that backend services are not highly available and experience downtime quite often. As an integration architect which of the below approach you would propose to achieve high reliability goals?

Options:

A.

Alerts can be configured in Mule runtime so that backend team can be communicated when services are down

B.

Until Successful scope can be implemented while calling backend API's

C.

On Error Continue scope to be used to call in case of error again

D.

Create a batch job with all requests being sent to backend using that job as per the availability of backend API's

Buy Now
Questions 23

Anypoint Exchange is required to maintain the source code of some of the assets committed to it, such as Connectors, Templates, and API specifications.

What is the best way to use an organization's source-code management (SCM) system in this context?

Options:

A.

Organizations should continue to use an SCM system of their choice, in addition to keeping source code for these asset types in Anypoint Exchange, thereby enabling parallel development, branching, and merging

B.

Organizations need to use Anypoint Exchange as the main SCM system to centralize versioning and avoid code duplication

C.

Organizations can continue to use an SCM system of their choice for branching and merging, as long as they follow the branching and merging strategy enforced by Anypoint Exchange

D.

Organizations need to point Anypoint Exchange to their SCM system so Anypoint Exchange can pull source code when requested by developers and provide it to Anypoint Studio

Buy Now
Questions 24

An organization is designing the following two Mule applications that must share data via a common persistent object store instance:

- Mule application P will be deployed within their on-premises datacenter.

- Mule application C will run on CloudHub in an Anypoint VPC.

The object store implementation used by CloudHub is the Anypoint Object Store v2 (OSv2).

what type of object store(s) should be used, and what design gives both Mule applications access to the same object store instance?

Options:

A.

Application P uses the Object Store connector to access a persistent object store Application C accesses this persistent object store via the Object Store REST API through an IPsec tunnel

B.

Application C and P both use the Object Store connector to access the Anypoint Object Store v2

C.

Application C uses the Object Store connector to access a persistent object Application P accesses the persistent object store via the Object Store REST API

D.

Application C and P both use the Object Store connector to access a persistent object store

Buy Now
Questions 25

An application load balancer routes requests to a RESTful web API secured by Anypoint Flex Gateway.

Which protocol is involved in the communication between the load balancer and the Gateway?

Options:

A.

SFTP

B.

HTTPS

C.

LDAP

D.

SMTP

Buy Now
Questions 26

Which Exchange asset type represents configuration modules that extend the functionality of an API and enforce capabilities such as security?

Options:

A.

Rulesets

B.

Policies

C.

RESTAPIs

D.

Connectors

Buy Now
Questions 27

An architect is designing a Mule application to meet the following two requirements:

1. The application must process files asynchronously and reliably from an FTPS server to a back-end database using VM intermediary queues for

load-balancing Mule events.

2. The application must process a medium rate of records from a source to a target system using a Batch Job scope.

To make the Mule application more reliable, the Mule application will be deployed to two CloudHub 1.0 workers.

Following MuleSoft-recommended best practices, how should the Mule application deployment typically be configured in Runtime Manger to best

support the performance and reliability goals of both the Batch Job scope and the file processing VM queues?

Options:

A.

Check the Persistent VM queues checkbox in the application deployment configuration

B.

Check the Non-persistent VM queues checkbox in the application deployment configuration

C.

In the Runtime Manager Properties tab, disable persistent VM queues for Batch Job scopes

D.

In the Runtime Manager Properties tab, enable persistent VM queues for the FTPS connector

Buy Now
Questions 28

What is a key difference between synchronous and asynchronous logging from Mule applications?

Options:

A.

Synchronous logging writes log messages in a single logging thread but does not block the Mule event being processed by the next event processor

B.

Asynchronous logging can improve Mule event processing throughput while also reducing the processing time for each Mule event

C.

Asynchronous logging produces more reliable audit trails with more accurate timestamps

D.

Synchronous logging within an ongoing transaction writes log messages in the same thread that processes the current Mule event

Buy Now
Questions 29

In Anypoint Platform, a company wants to configure multiple identity providers(Idps) for various lines of business (LOBs) Multiple business groups and environments have been defined for the these LOBs. What Anypoint Platform feature can use multiple Idps access the company’s business groups and environment?

Options:

A.

User management

B.

Roles and permissions

C.

Dedicated load balancers

D.

Client Management

Buy Now
Questions 30

An organization has strict unit test requirement that mandate every mule application must have an MUnit test suit with a test case defined for each flow and a minimum test coverage of 80%.

A developer is building Munit test suit for a newly developed mule application that sends API request to an external rest API.

What is the effective approach for successfully executing the Munit tests of this new application while still achieving the required test coverage for the Munit tests?

Options:

A.

Invoke the external endpoint of the rest API from the mule floors

B.

Mark the rest API invocations in the Munits and then call the mocking service flow that simulates standard responses from the REST API

C.

Mock the rest API invocation in the Munits and return a mock response for those invocations

D.

Create a mocking service flow to simulate standard responses from the rest API and then configure the mule flows to call the marking service flow

Buy Now
Questions 31

Which type of communication is managed by a service mesh in a microservices architecture?

Options:

A.

Communication between microservices runtime administrators

B.

Communication between microservices developers

C.

Communication between microservices

D.

Communication between trading partner services

Buy Now
Questions 32

As part of a growth strategy, a supplier signs a trading agreement with a large customer. The customer sends purchase orders to the supplier according to the ANSI X12 EDI standard, and the supplier creates the orders in its ERP system using the information in the EDI document.

The agreement also requires that the supplier provide a new RESTful API to process request from the customer for current product inventory level from the supplier’ s ERP system.

Which two fundamental integration use cases does the supplier need to deliver to provide an end-to-end solution for this business scenario? (Choose two.)

Options:

A.

Synchronized data transfer

B.

Sharing data with external partners

C.

User interface integration

D.

Streaming data ingestion

E.

Data mashups

Buy Now
Questions 33

An organization uses one specific CloudHub (AWS) region for all CloudHub deployments. How are CloudHub workers assigned to availability zones (AZs) when the organization's Mule applications are deployed to CloudHub in that region?

Options:

A.

Workers belonging to a given environment are assigned to the same AZ within that region.

B.

AZs are selected as part of the Mule application's deployment configuration.

C.

Workers are randomly distributed across available AZs within that region.

D.

An AZ is randomly selected for a Mule application, and all the Mule application's CloudHub workers are assigned to that one AZ

Buy Now
Questions 34

During a planning session with the executive leadership, the development team director presents plans for a new API to expose the data in the company’s order database. An earlier effort to build an API on top of this data failed, so the director is recommending a design-first approach.

Which characteristics of a design-first approach will help make this API successful?

Options:

A.

Building MUnit tests so administrators can confirm code coverage percentage during deployment

B.

Publishing the fully implemented API to Exchange so all developers can reuse the API

C.

Adding global policies to the API so all developers automatically secure the implementation before coding anything

D.

Developing a specification so consumers can test before the implementation is built

Buy Now
Questions 35

According to MuteSoft, which principle is common to both Service Oriented Architecture (SOA) and API-led connectivity approaches?

Options:

A.

Service centralization

B.

Service statefulness

C.

Service reusability

D.

Service interdependence

Buy Now
Questions 36

A DevOps team has adequate observability of individual system behavior and performance, but it struggles to track the entire lifecycle of each request across different microservices.

Which additional observability approach should this team consider adopting?

Options:

A.

Analytics

B.

Metrics

C.

Tracing

D.

Data mining

Buy Now
Questions 37

Refer to the exhibit.

An organization uses a 2-node Mute runtime cluster to host one stateless API implementation. The API is accessed over HTTPS through a load balancer that uses round-robin for load distribution.

Two additional nodes have been added to the cluster and the load balancer has been configured to recognize the new nodes with no other change to the load balancer.

What average performance change is guaranteed to happen, assuming all cluster nodes are fully operational?

Options:

A.

50% reduction in the response time of the API

B.

100% increase in the throughput of the API

C.

50% reduction In the JVM heap memory consumed by each node

D.

50% reduction In the number of requests being received by each node

Buy Now
Questions 38

Mule application A receives a request Anypoint MQ message REQU with a payload containing a variable-length list of request objects. Application A uses the For Each scope to split the list into individual objects and sends each object as a message to an Anypoint MQ queue.

Service S listens on that queue, processes each message independently of all other messages, and sends a response message to a response queue.

Application A listens on that response queue and must in turn create and publish a response Anypoint MQ message RESP with a payload containing the list of responses sent by service S in the same order as the request objects originally sent in REQU.

Assume successful response messages are returned by service S for all request messages.

What is required so that application A can ensure that the length and order of the list of objects in RESP and REQU match, while at the same time maximizing message throughput?

Options:

A.

Use a Scatter-Gather within the For Each scope to ensure response message order Configure the Scatter-Gather with a persistent object store

B.

Perform all communication involving service S synchronously from within the For Each scope, so objects in RESP are in the exact same order as request objects in REQU

C.

Use an Async scope within the For Each scope and collect response messages in a second For Each scope in the order In which they arrive, then send RESP using this list of responses

D.

Keep track of the list length and all object indices in REQU, both in the For Each scope and in all communication involving service Use persistent storage when creating RESP

Buy Now
Questions 39

A corporation has deployed multiple mule applications implementing various public and private API's to different cloudhub workers. These API's arc Critical applications that must be highly available and in line with the reliability SLA as defined by stakeholders.

How can API availability (liveliness or readiness) be monitored so that Ops team receives outage notifications?

Options:

A.

Enable monitoring of individual applications from Anypoint monitoring

B.

Configure alerts with failure conditions in runtime manager

C.

Configure alerts failure conditions in API manager

D.

Use any point functional monitoring test API's functional behavior

Buy Now
Questions 40

What is an advantage of using OAuth 2.0 client credentials and access tokens over only API keys for API authentication?

Options:

A.

If the access token is compromised, the client credentials do not to be reissued.

B.

If the access token is compromised, I can be exchanged for an API key.

C.

If the client ID is compromised, it can be exchanged for an API key

D.

If the client secret is compromised, the client credentials do not have to be reissued.

Buy Now
Questions 41

An integration Mute application is being designed to process orders by submitting them to a backend system for offline processing. Each order will be received by the Mute application through an HTTPS POST and must be acknowledged immediately. Once acknowledged, the order will be submitted to a backend system. Orders that cannot be successfully submitted due to rejections from the backend system will need to be processed manually (outside the backend system).

The Mule application will be deployed to a customer-hosted runtime and is able to use an existing ActiveMQ broker if needed.

The backend system has a track record of unreliability both due to minor network connectivity issues and longer outages.

What idiomatic (used for their intended purposes) combination of Mule application components and ActiveMQ queues are required to ensure automatic submission of orders to the backend system, while minimizing manual order processing?

Options:

A.

An On Error scope Non-persistent VM ActiveMQ Dead Letter Queue for manual processing

B.

An On Error scope MuleSoft Object Store ActiveMQ Dead Letter Queue for manual processing

C.

Until Successful component MuleSoft Object Store ActiveMQ is NOT needed or used

D.

Until Successful component ActiveMQ long retry Queue ActiveMQ Dead Letter Queue for manual processing

Buy Now
Questions 42

A platform architect includes both an API gateway and a service mesh in the architect of a distributed application for communication management.

Which type of communication management does a service mesh typically perform in this architecture?

Options:

A.

Between application services and the firewall

B.

Between the application and external API clients

C.

Between services within the application

D.

Between the application and external API implementations.

Buy Now
Questions 43

An organization has implemented the cluster with two customer hosted Mule runtimes is hosting an application.

This application has a flow with a JMS listener configured to consume messages from a queue destination. As an integration architect can you advise which JMS listener configuration must be used to receive messages in all the nodes of the cluster?

Options:

A.

Use the parameter primaryNodeOnly= "false" on the JMS listener

B.

Use the parameter primaryNodeOnly= "false" on the JMS listener with a shared subscription

C.

Use the parameter primaryNodeOnly= "true" on the JMS listener with a non­shared subscription

D.

Use the parameter primaryNodeOnly= "true" on the JMS listener

Buy Now
Questions 44

According to MuleSoft, what Action should an IT organization take regarding its technology assets in order to close the IT delivery.

Options:

A.

Make assets easily discoverable via a central repository

B.

Focus project delivery efforts on custom assets that meet the specific requirements of each individual line of business

C.

Create weekly meetings that all members of IT attend to present justification and request approval to use existing assets

D.

Hire additional staff to meet the demand for asset creation required for approved projects and timelines

Buy Now
Questions 45

A stock trading company handles millions of trades a day and requires excellent performance and reliability within its stock trading system. The company operates a number of event-driven APIs Implemented as Mule applications that are hosted on various customer-hosted Mule clusters and needs to enable message exchanges between the APIs within their internal network using shared message queues.

What is an effective way to meet the cross-cluster messaging requirements of its event-driven APIs?

Options:

A.

Non-transactional JMS operations with a reliability pattern and manual acknowledgements

B.

Persistent VM queues with automatic acknowledgements

C.

JMS transactions with automatic acknowledgements

D.

extended Architecture (XA) transactions and XA connected components with manual acknowledgements

Buy Now
Questions 46

What comparison is true about a CloudHub Dedicated Load Balancer (DLB) vs. the CloudHub Shared Load Balancer (SLB)?

Options:

A.

Only a DLB allows the configuration of a custom TLS server certificate

B.

Only the SLB can forward HTTP traffic to the VPC-internal ports of the CloudHub workers

C.

Both a DLB and the SLB allow the configuration of access control via IP whitelists

D.

Both a DLB and the SLB implement load balancing by sending HTTP requests to workers with the lowest workloads

Buy Now
Questions 47

Refer to the exhibit.

An organization deploys multiple Mule applications to the same customer -hosted Mule runtime. Many of these Mule applications must expose an HTTPS endpoint on the same port using a server-side certificate that rotates often.

What is the most effective way to package the HTTP Listener and package or store the server-side certificate when deploying these Mule applications, so the disruption caused by certificate rotation is minimized?

Options:

A.

Package the HTTPS Listener configuration in a Mule DOMAIN project, referencing it from all Mule applications that need to expose an HTTPS endpoint Package the server-side certificate in ALL Mule APPLICATIONS that need to expose an HTTPS endpoint

B.

Package the HTTPS Listener configuration in a Mule DOMAIN project, referencing it from all Mule applications that need to expose an HTTPS endpoint. Store the server-side certificate in a shared filesystem location in the Mule runtime's classpath, OUTSIDE the Mule DOMAIN or any Mule APPLICATION

C.

Package an HTTPS Listener configuration In all Mule APPLICATIONS that need to expose an HTTPS endpoint Package the server-side certificate in a NEW Mule DOMAIN project

D.

Package the HTTPS Listener configuration in a Mule DOMAIN project, referencing It from all Mule applications that need to expose an HTTPS endpoint. Package the server-side certificate in the SAME Mule DOMAIN project Go to Set

Buy Now
Questions 48

An organization is implementing a Quote of the Day API that caches today's quote. What scenario can use the CloudHub Object Store connector to persist the cache's state?

Options:

A.

When there is one deployment of the API implementation to CloudHub and another one to customer hosted mule runtime that must share the cache state.

B.

When there are two CloudHub deployments of the API implementation by two Anypoint Platform business groups to the same CloudHub region that must share the cache state.

C.

When there is one CloudHub deployment of the API implementation to three workers that must share the cache state.

D.

When there are three CloudHub deployments of the API implementation to three separate CloudHub regions that must share the cache state.

Buy Now
Questions 49

What operation can be performed through a JMX agent enabled in a Mule application?

Options:

A.

View object store entries

B.

Replay an unsuccessful message

C.

Set a particular tog4J2 log level to TRACE

D.

Deploy a Mule application

Buy Now
Questions 50

A finance giant is planning to migrate all its Mule applications to Runtime fabric (RTF). Currently all Mule applications are deployed cloud hub using automated CI/CD scripts.

As an integration architect, which of the below step would you suggest to ensure that the applications from cloudhub are migrated properly to Runtime Fabric (RTF) with an assumption that organization is keen on keeping the same deployment strategy.

Options:

A.

No changes need to be made to POM.xml file and CI/CD script should be modified as per the RTF configurations

B.

runtimeFabric dependency should be added as a mule plug-in to POM.xml file and CI/CD script should be modified as per the RTF configurations

C.

runtimeFabric deployment should be added to POM.xml file in all

the mule applications and CI/CD script should be modified as per the RTF configurations

D.

runtimeFabric profile should be added mule configuration files in the mule applications and CI/CD script should be modified as per the RTF configurations

Buy Now
Questions 51

A leading e-commerce giant will use Mulesoft API's on runtime fabric (RTF) to process customer orders. Some customer's sensitive information such as credit card information is also there as a part of a API payload.

What approach minimizes the risk of matching sensitive data to the original and can convert back to the original value whenever and wherever required?

Options:

A.

Apply masking to hide the sensitive information and then use API

B.

manager to detokenize the masking format to return the original value

C.

create a tokenization format and apply a tokenization policy to the API Gateway

D.

Used both masking and tokenization

E.

Apply a field level encryption policy in the API Gateway

Buy Now
Questions 52

A global, high-volume shopping Mule application is being built and will be deployed to CloudHub. To improve performance, the Mule application uses a Cache scope that maintains cache state in a CloudHub object store. Web clients will access the Mule application over HTTP from all around the world, with peak volume coinciding with business hours in the web client's geographic location. To achieve optimal performance, what Anypoint Platform region should be chosen for the CloudHub object store?

Options:

A.

Choose the same region as to where the Mule application is deployed

B.

Choose the US-West region, the only supported region for CloudHub object stores

C.

Choose the geographically closest available region for each web client

D.

Choose a region that is the traffic-weighted geographic center of all web clients

Buy Now
Questions 53

A company is designing a mule application to consume batch data from a partner's ftps server The data files have been compressed and then digitally signed using PGP.

What inputs are required for the application to securely consumed these files?

Options:

A.

ATLS context Key Store requiring the private key and certificate for the company

PGP public key of partner

PGP private key for the company

B.

ATLS context first store containing a public certificate for partner ftps server and the PGP public key of the partner

TLS contact Key Store containing the FTP credentials

C.

TLS context trust or containing a public certificate for the ftps server The FTP username and password The PGP public key of the partner

D.

The PGP public key of the partner

The PGP private key for the company

The FTP username and password

Buy Now
Questions 54

A leading bank implementing new mule API.

The purpose of API to fetch the customer account balances from the backend application and display them on the online platform the online banking platform. The online banking platform will send an array of accounts to Mule API get the account balances.

As a part of the processing the Mule API needs to insert the data into the database for auditing purposes and this process should not have any performance related implications on the account balance retrieval flow

How should this requirement be implemented to achieve better throughput?

Options:

A.

Implement the Async scope fetch the data from the backend application and to insert records in the Audit database

B.

Implement a for each scope to fetch the data from the back-end application and to insert records into the Audit database

C.

Implement a try-catch scope to fetch the data from the back-end application and use the Async scope to insert records into the Audit database

D.

Implement parallel for each scope to fetch the data from the backend application and use Async scope to insert the records into the Audit database

Buy Now
Questions 55

What approach configures an API gateway to hide sensitive data exchanged between API consumers and API implementations, but can convert tokenized fields back to their original value for other API requests or responses, without having to recode the API implementations?

Options:

A.

Create both masking and tokenization formats and use both to apply a tokenization policy in an API gateway to mask sensitive values in message payloads withcharacters, and apply a corresponding detokenization policy to return the original

values to other APIs

B.

Create a masking format and use it to apply a tokenization policy in an API gateway to mask sensitive values in message payloads with characters, and apply a corresponding detokenization policy to return the original values to other APIs

C.

Use a field-level encryption policy in an API gateway to replace sensitive fields in message payload with encrypted values, and apply a corresponding field-level

decryption policy to return the original values to other APIs

D.

Create a tokenization format and use it to apply a tokenization policy in an API gateway to replace sensitive fields in message payload with similarly formatted

tokenized values, and apply a corresponding detokenization policy to return the original values to other APIs

Buy Now
Questions 56

Refer to the exhibit.

Anypoint Platform supports role-based access control (RBAC) to features of the platform. An organization has configured an external Identity Provider for identity management with Anypoint Platform.

What aspects of RBAC must ALWAYS be controlled from the Anypoint Platform control plane and CANNOT be controlled via the external Identity Provider?

Options:

A.

Controlling the business group within Anypoint Platform to which the user belongs

B.

Assigning Anypoint Platform permissions to a role

C.

Assigning Anypoint Platform role(s) to a user

D.

Removing a user's access to Anypoint Platform when they no longer work for the organization

Buy Now
Questions 57

An integration Mule application is deployed to a customer-hosted multi-node Mule 4 runtime duster. The Mule application uses a Listener operation of a JMS connector to receive incoming messages from a JMS queue.

How are the messages consumed by the Mule application?

Options:

A.

Depending on the JMS provider's configuration, either all messages are consumed by ONLY the primary cluster node or else ALL messages are consumed by ALL cluster nodes

B.

Regardless of the Listener operation configuration, all messages are consumed by ALL cluster nodes

C.

Depending on the Listener operation configuration, either all messages are consumed by ONLY the primary cluster node or else EACH message is consumed by ANY ONE cluster node

D.

Regardless of the Listener operation configuration, all messages are consumed by ONLY the primary cluster node

Buy Now
Questions 58

A trading company handles millions of requests a day. Due to nature of its business, it requires excellent

performance and reliability within its application.

For this purpose, company uses a number of event-based API's hosted on various mule clusters that communicate across a shared message queue sitting within its network.

Which method should be used to meet the company's requirement for its system?

Options:

A.

XA transactions and XA connected components

B.

JMS transactions

C.

JMS manual acknowledgements with a reliability pattern

D.

VM queues with reliability pattern

Buy Now
Questions 59

Which role is primarily responsible for building API implementation as part of a typical MuleSoft integration project?

Options:

A.

API Developer

B.

API Designer

C.

Integration Architect

D.

Operations

Buy Now
Questions 60

An organization will deploy Mule applications to Cloudhub, Business requirements mandate that all application logs be stored ONLY in an external splunk consolidated logging service and NOT in Cloudhub.

In order to most easily store Mule application logs ONLY in Splunk, how must Mule application logging be configured in Runtime Manager, and where should the log4j2 splunk appender be defined?

Options:

A.

Keep the default logging configuration in RuntimeManager

Define the splunk appender in ONE global log4j.xml file that is uploaded once to Runtime Manager to support at Mule application deployments.

B.

Disable Cloudhub logging in Runtime Manager

Define the splunk appender in EACH Mule application’s log4j2.xml file

C.

Disable Cloudhub logging in Runtime Manager

Define the splunk appender in ONE global log4j.xml file that is uploaded once to Runtime Manger to support at Mule application deployments.

D.

Keep the default logging configuration in Runtime Manager

Define the Splunk appender in EACH Mule application log4j2.xml file

Buy Now
Questions 61

In one of the critical payment related mule application, transaction is being used . As an enhancement to implementation , scatter gather route is introduced which is also the part of transaction group. Scatter gather route has 4 routes.

What will be the behavior of the Mule application in case of error occurs in 4th route of the scatter-gather router and transaction needs to be rolled back?

Options:

A.

Only errored route will be rolled back

B.

All routes will be rolled back

C.

Scatter Gather router cannot be part of transaction

Buy Now
Questions 62

A REST API is being designed to implement a Mule application.

What standard interface definition language can be used to define REST APIs?

Options:

A.

Web Service Definition Language(WSDL)

B.

OpenAPI Specification (OAS)

C.

YAML

D.

AsyncAPI Specification

Buy Now
Questions 63

According to the National Institute of Standards and Technology (NIST), which cloud computing deployment model describes a composition of two or more distinct clouds that support data and application portability?

Options:

A.

Private cloud

B.

Hybrid cloud 4

C.

Public cloud

D.

Community cloud

Buy Now
Questions 64

Refer to the exhibit.

A Mule application is being designed to expose a SOAP web service to its clients.

What language is typically used inside the web service's interface definition to define the data structures that the web service Is expected to exchange with its clients?

Options:

A.

WSDL

B.

XSD

C.

JSON Schema

D.

RAMI

Buy Now
Questions 65

What is an advantage that Anypoint Platform offers by providing universal API management and Integration-Platform-as-a-Service (iPaaS) capabilities in a unified platform?

Options:

A.

Ability to use a single iPaaS to manage and integrate all API gateways

B.

Ability to use a single connector to manage and integrate all APis

C.

Ability to use a single control plane for both full-lifecycle AP] management and integration

D.

Ability to use a single iPaaS to manage all API developer portals

Buy Now
Questions 66

An organization plans to use the Anypoint Platform audit logging service to log Anypoint MQ actions.

What consideration must be kept in mind when leveraging Anypoint MQ Audit Logs?

Options:

A.

Anypoint MQ Audit Logs include logs for sending, receiving, or browsing messages

B.

Anypoint MQ Audit Logs include fogs for failed Anypoint MQ operations

C.

Anypoint MQ Audit Logs include logs for queue create, delete, modify, and purge operations

Buy Now
Questions 67

Refer to the exhibit.

A shopping cart checkout process consists of a web store backend sending a sequence of API invocations to an Experience API, which in turn invokes a Process API. All API invocations are over HTTPS POST. The Java web store backend executes in a Java EE application server, while all API implementations are Mule applications executing in a customer -hosted Mule runtime.

End-to-end correlation of all HTTP requests and responses belonging to each individual checkout Instance is required. This is to be done through a common correlation ID, so that all log entries written by the web store backend, Experience API implementation, and Process API implementation include the same correlation ID for all requests and responses belonging to the same checkout instance.

What is the most efficient way (using the least amount of custom coding or configuration) for the web store backend and the implementations of the Experience API and Process API to participate in end-to-end correlation of the API invocations for each checkout instance?

A)

The web store backend, being a Java EE application, automatically makes use of the thread-local correlation ID generated by the Java EE application server and automatically transmits that to the Experience API using HTTP-standard headers

No special code or configuration is included in the web store backend, Experience API, and Process API implementations to generate and manage the correlation ID

B)

The web store backend generates a new correlation ID value at the start of checkout and sets it on the X-CORRELATlON-lt HTTP request header In each API invocation belonging to that checkout

No special code or configuration is included in the Experience API and Process API implementations to generate and manage the correlation ID

C)

The Experience API implementation generates a correlation ID for each incoming HTTP request and passes it to the web store backend in the HTTP response, which includes it in all subsequent API invocations to the Experience API.

The Experience API implementation must be coded to also propagate the correlation ID to the Process API in a suitable HTTP request header

D)

The web store backend sends a correlation ID value in the HTTP request body In the way required by the Experience API

The Experience API and Process API implementations must be coded to receive the custom correlation ID In the HTTP requests and propagate It in suitable HTTP request headers

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 68

As a part of project , existing java implementation is being migrated to Mulesoft. Business is very tight on the budget and wish to complete the project in most economical way possible.

Canonical object model using java is already a part of existing implementation. Same object model is required by mule application for a business use case. What is the best way to achieve this?

Options:

A.

Make use of Java module

B.

Create similar model for Mule applications

C.

Create a custom application to read Java code and make it available for Mule application

D.

Use Anypoint exchange

Buy Now
Questions 69

An organization is using Mulesoft cloudhub and develops API's in the latest version. As a part of requirements for one of the API's, third party API needs to be called. The security team has made it clear that calling any external API needs to have include listing

As an integration architect please suggest the best way to accomplish the design plan to support these requirements?

Options:

A.

Implement includelist IP on the cloudhub VPC firewall to allow the traffic

B.

Implement the validation of includelisted IP operation

C.

Implement the Any point filter processor to implement the include list IP

D.

Implement a proxy for the third party API and enforce the IPinclude list policy and call this proxy from the flow of the API

Buy Now
Questions 70

Refer to the exhibit.

One of the backend systems invoked by an API implementation enforces rate limits on the number of requests a particular client can make. Both the backend system and the API implementation are deployed to several non-production environments in addition to production.

Rate limiting of the backend system applies to all non-production environments. The production environment, however, does NOT have any rate limiting.

What is the most effective approach to conduct performance tests of the API implementation in a staging (non-production) environment?

Options:

A.

Create a mocking service that replicates the backend system's production performance characteristics. Then configure the API implementation to use the mocking service and conduct the performance tests

B.

Use MUnit to simulate standard responses from the backend system then conduct performance tests to identify other bottlenecks in the system

C.

Include logic within the API implementation that bypasses invocations of the backend system in a performance test situation. Instead invoking local stubs that replicate typical backend system responses then conduct performance tests using this API Implementation

D.

Conduct scaled-down performance tests in the staging environment against the rate limited backend system then upscale performance results to full production scale

Buy Now
Questions 71

An insurance company is implementing a MuleSoft API to get inventory details from the two vendors. Due to network issues, the invocations to vendor applications are getting timed-out intermittently. But the transactions are successful upon reprocessing

What is the most performant way of implementing this requirement?

Options:

A.

Implement a scatter-gather scope to invoke the two vendor

applications on two different route

Use the Until-Successful scope to implement the retry mechanism

for timeout errors on each route

B.

Implement a Choice scope to invoke the two vendor applications on two different route

Use the try-catch scope to implement the retry mechanism for timeout errors on each route

C.

Implement a For-Each scope to invoke the two vendor applications

Use until successful scope to implement the retry mechanism for the timeout errors

D.

Implement Round-Robin scope to invoke the two vendor applications on two different routes

Use the Try-Catch scope to implement retry mechanism for timeout errors on each route

Buy Now
Questions 72

Which key DevOps practice and associated Anypoint Platform component should a MuteSoft integration team adopt to improve delivery quality?

Options:

A.

A Continuous design with API Designer

B.

Automated testing with MUnit

C.

Passive monitoring with Anypoint Monitoring

D.

Manual testing with Anypoint Studio

Buy Now
Questions 73

An integration architect is designing an API that must accept requests from API clients for both XML and JSON content over HTTP/1.1 by default.

Which API architectural style, when used for its intended and typical purposes, should the architect choose to meet these requirements?

Options:

A.

SOAP

B.

GraphQL

C.

REST

D.

grRPC

Buy Now
Questions 74

An organization has various integrations implemented as Mule applications. Some of these Mule applications are deployed to custom hosted Mule runtimes (on-premises) while others execute in the MuleSoft-hosted runtime plane (CloudHub). To perform the Integra functionality, these Mule applications connect to various backend systems, with multiple applications typically needing to access the backend systems.

How can the organization most effectively avoid creating duplicates in each Mule application of the credentials required to access the backend systems?

Options:

A.

Create a Mule domain project that maintains the credentials as Mule domain-shared resources Deploy the Mule applications to the Mule domain, so the credentials are available to the Mule applications

B.

Store the credentials in properties files in a shared folder within the organization's data center Have the Mule applications load properties files from this shared location at startup

C.

Segregate the credentials for each backend system into environment-specific properties files Package these properties files in each Mule application, from where they are loaded at startup

D.

Configure or create a credentials service that returns the credentials for each backend system, and that is accessible from customer-hosted and MuleSoft-hosted Mule runtimes Have the Mule applications toad the properties at startup by invoking that credentials service

Buy Now
Questions 75

Refer to the exhibit.

An organization is designing a Mule application to receive data from one external business partner. The two companies currently have no shared IT infrastructure and do not want to establish one. Instead, all communication should be over the public internet (with no VPN).

What Anypoint Connector can be used in the organization's Mule application to securely receive data from this external business partner?

Options:

A.

File connector

B.

VM connector

C.

SFTP connector

D.

Object Store connector

Buy Now
Questions 76

An organization is designing a Mule application to periodically poll an SFTP location for new files containing sales order records and then process those sales orders. Each sales order must be processed exactly once.

To support this requirement, the Mule application must identify and filter duplicate sales orders on the basis of a unique ID contained in each sales order record and then only send the new sales orders to the downstream system.

What is the most idiomatic (used for its intended purpose) Anypoint connector, validator, or scope that can be configured in the Mule application to filter duplicate sales orders on the basis of the unique ID field contained in each sales order record?

Options:

A.

Configure a Cache scope to filter and store each record from the received file by the order ID

B.

Configure a Database connector to filter and store each record by the order ID

C.

Configure an Idempotent Message Validator component to filter each record by the order ID

D.

Configure a watermark In an On New or Updated File event source to filter unique records by the order ID

Buy Now
Questions 77

According to MuleSoft’s recommended REST conventions, which HTTP method should an API use to specify how AP\ clients can request data from a specified resource?

Options:

A.

POST

B.

PUT

C.

PATCH

D.

GET

Buy Now
Questions 78

A Mule application uses the Database connector.

What condition can the Mule application automatically adjust to or recover from without needing to restart or redeploy the Mule application?

Options:

A.

One of the stored procedures being called by the Mule application has been renamed

B.

The database server was unavailable for four hours due to a major outage but is now fully operational again

C.

The credentials for accessing the database have been updated and the previous credentials are no longer valid

D.

The database server has been updated and hence the database driver library/JAR needs a minor version upgrade

Buy Now
Questions 79

An Integration Mule application is being designed to synchronize customer data between two systems. One system is an IBM Mainframe and the other system is a Salesforce Marketing Cloud (CRM) instance. Both systems have been deployed in their typical configurations, and are to be invoked using the native protocols provided by Salesforce and IBM.

What interface technologies are the most straightforward and appropriate to use in this Mute application to interact with these systems, assuming that Anypoint Connectors exist that implement these interface technologies?

Options:

A.

IBM: DB access CRM: gRPC

B.

IBM: REST CRM:REST

C.

IBM: Active MQ CRM: REST

D.

IBM: CICS CRM: SOAP

Buy Now
Questions 80

A manufacturing company plans to deploy Mule applications to its own

Azure Kubernetes service infrastructure.The organization wants to make

the Mule applications more available and robust by deploying each Mule

application to an isolated Mule runtime in a Docker container while

managing all the Mule applications from the MuleSoft-hosted control plane.

What choice of runtime plane meets these organizational requirements?

Options:

A.

CloudHub 2.0

B.

Customer-hosted self-provisioned runtime plane

C.

Anypoint Service Mesh

D.

Anypoint Runtime Fabric

Buy Now
Questions 81

An organization is designing an integration solution to replicate financial transaction data from a legacy system into a data warehouse (DWH).

The DWH must contain a daily snapshot of financial transactions, to be delivered as a CSV file. Daily transaction volume exceeds tens of millions of records, with significant spikes in volume during popular shopping periods.

What is the most appropriate integration style for an integration solution that meets the organization's current requirements?

Options:

A.

Event-driven architecture

B.

Microservice architecture

C.

API-led connectivity

D.

Batch-triggered ETL

Buy Now
Exam Name: Salesforce Certified MuleSoft Integration Architect 1 (SP24) Exam
Last Update: Sep 7, 2024
Questions: 273
MuleSoft-Integration-Architect-I pdf

MuleSoft-Integration-Architect-I PDF

$24  $80
MuleSoft-Integration-Architect-I Engine

MuleSoft-Integration-Architect-I Testing Engine

$28.5  $95
MuleSoft-Integration-Architect-I PDF + Engine

MuleSoft-Integration-Architect-I PDF + Testing Engine

$39  $130