Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

MuleSoft Certified Integration Architect - Level 1 Question and Answers

MuleSoft Certified Integration Architect - Level 1

Last Update Jun 16, 2025
Total Questions : 273

We are offering FREE MCIA-Level-1 MuleSoft exam questions. All you do is to just go and sign up. Give your details, prepare MCIA-Level-1 free exam questions and then go for complete pool of MuleSoft Certified Integration Architect - Level 1 test questions that will help you more.

MCIA-Level-1 pdf

MCIA-Level-1 PDF

$42  $104.99
MCIA-Level-1 Engine

MCIA-Level-1 Testing Engine

$50  $124.99
MCIA-Level-1 PDF + Engine

MCIA-Level-1 PDF + Testing Engine

$66  $164.99
Questions 1

What is a key difference between synchronous and asynchronous logging from Mule applications?

Options:

A.  

Synchronous logging writes log messages in a single logging thread but does not block the Mule event being processed by the next event processor

B.  

Asynchronous logging can improve Mule event processing throughput while also reducing the processing time for each Mule event

C.  

Asynchronous logging produces more reliable audit trails with more accurate timestamps

D.  

Synchronous logging within an ongoing transaction writes log messages in the same thread that processes the current Mule event

Discussion 0
Questions 2

A developer needs to discover which API specifications have been created within the organization before starting a new project.

Which Anypoint Platform component can the developer use to find and try out the currently released API specifications?

Options:

A.  

Anypoint Exchange

B.  

Runtime Manager

C.  

API Manager

D.  

Object Store

Discussion 0
Questions 3

An integration Mute application consumes and processes a list of rows from a CSV file. Each row must be read from the CSV file, validated, and the row data sent to a JMS queue, in the exact order as in the CSV file.

If any processing step for a row falls, then a log entry must be written for that row, but processing of other rows must not be affected.

What combination of Mute components is most idiomatic (used according to their intended purpose) when Implementing the above requirements?

Options:

A.  

Scatter-Gather component On Error Continue scope

B.  

VM connector first Successful scope On Error Propagate scope

C.  

For Each scope On Error Continue scope

D.  

Async scope On Error Propagate scope

Discussion 0
Questions 4

A Mule application is deployed to a cluster of two(2) cusomter-hosted Mule runtimes. Currently the node name Alice is the primary node and node named bob is the secondary node. The mule application has a flow that polls a directory on a file system for new files.

The primary node Alice fails for an hour and then restarted.

After the Alice node completely restarts, from what node are the files polled, and what node is now the primary node for the cluster?

Options:

A.  

Files are polled from Alice node

Alice is now the primary node

B.  

Files are polled form Bob node

Alice is now the primary node

C.  

Files are polled from Alice node

Bob is the now the primary node

D.  

Files are polled form Bob node

Bob is now the primary node

Discussion 0
Questions 5

An organization has deployed both Mule and non-Mule API implementations to integrate its customer and order management systems. All the APIs are available to REST clients on the public internet.

The organization wants to monitor these APIs by running health checks: for example, to determine if an API can properly accept and process requests. The organization does not have subscriptions to any external monitoring tools and also does not want to extend its IT footprint.

What Anypoint Platform feature provides the most idiomatic (used for its intended purpose) way to monitor the availability of both the Mule and the non-Mule API implementations?

Options:

A.  

API Functional Monitoring

B.  

Runtime Manager

C.  

API Manager

D.  

Anypoint Visualizer

Discussion 0
Questions 6

The company's FTPS server login username and password

Options:

A.  

TLS context trust store containing a public certificate for the company. The company's PGP public key that was used to sign the files

B.  

The partner's PGP public key used by the company to login to the FTPS server. A TLS context key store containing the private key for the company

The partner's PGP private key that was used to sign the files

C.  

The company's FTPS server login username and password. A TLS context trust store containing a public certificate for ftps.partner.com

The partner's PGP public key that was used to sign the files

D.  

The partner's PGP public key used by the company to login to the FTPS server. A TLS context key store containing the private key for ftps.partner.com

The company's PGP private key that was used to sign the files

Discussion 0
Questions 7

An insurance provider is implementing Anypoint platform to manage its application infrastructure and is using the customer hosted runtime for its business due to certain financial requirements it must meet. It has built a number of synchronous API's and is currently hosting these on a mule runtime on one server

These applications make use of a number of components including heavy use of object stores and VM queues.

Business has grown rapidly in the last year and the insurance provider is starting to receive reports of reliability issues from its applications.

The DevOps team indicates that the API's are currently handling too many requests and this is over loading the server. The team has also mentioned that there is a significant downtime when the server is down for maintenance.

As an integration architect, which option would you suggest to mitigate these issues?

Options:

A.  

Add a load balancer and add additional servers in a server group configuration

B.  

Add a load balancer and add additional servers in a cluster configuration

C.  

Increase physical specifications of server CPU memory and network

D.  

Change applications by use an event-driven model

Discussion 0
Questions 8

How should the developer update the logging configuration in order to enable this package specific debugging?

Options:

A.  

In Anypoint Monitoring, define a logging search query with class property set to org.apache.cxf and level set to DEBUG

B.  

In the Mule application's log4j2.xml file, add an AsyncLogger element with name property set to org.apache.cxf and level set to DEBUG, then redeploy the Mule application in the CloudHub production environment

C.  

In the Mule application's log4j2.xmI file, change the root logger's level property to DEBUG, then redeploy the Mule application to the CloudHub production environment

D.  

In Anypoint Runtime Manager, in the Deployed Application Properties tab for the Mule application, add a line item with DEBUG level for package org.apache.cxf and apply the changes

Discussion 0
Questions 9

Refer to the exhibit.

A Mule 4 application has a parent flow that breaks up a JSON array payload into 200 separate items, then sends each item one at a time inside an Async scope to a VM queue.

A second flow to process orders has a VM Listener on the same VM queue. The rest of this flow processes each received item by writing the item to a database.

This Mule application is deployed to four CloudHub workers with persistent queues enabled.

What message processing guarantees are provided by the VM queue and the CloudHub workers, and how are VM messages routed among the CloudHub workers for each invocation of the parent flow under normal operating conditions where all the CloudHub workers remain online?

Options:

A.  

EACH item VM message is processed AT MOST ONCE by ONE CloudHub worker, with workers chosen in a deterministic round-robin fashion Each of the four CloudHub workers can be expected to process 1/4 of the Item VM messages (about 50 items)

B.  

EACH item VM message is processed AT LEAST ONCE by ONE ARBITRARY CloudHub worker Each of the four CloudHub workers can be expected to process some item VM messages

C.  

ALL Item VM messages are processed AT LEAST ONCE by the SAME CloudHub worker where the parent flow was invoked

This one CloudHub worker processes ALL 200 item VM messages

D.  

ALL item VM messages are processed AT MOST ONCE by ONE ARBITRARY CloudHub worker

This one CloudHub worker processes ALL 200 item VM messages

Discussion 0
Questions 10

An organization has chosen Mulesoft for their integration and API platform.

According to the Mulesoft catalyst framework, what would an integration architect do to create achievement goals as part of their business outcomes?

Options:

A.  

Measure the impact of the centre for enablement

B.  

build and publish foundational assets

C.  

agree upon KPI's and help develop and overall success plan

D.  

evangelize API's

Discussion 0
Questions 11

An organization has strict unit test requirement that mandate every mule application must have an MUnit test suit with a test case defined for each flow and a minimum test coverage of 80%.

A developer is building Munit test suit for a newly developed mule application that sends API request to an external rest API.

What is the effective approach for successfully executing the Munit tests of this new application while still achieving the required test coverage for the Munit tests?

Options:

A.  

Invoke the external endpoint of the rest API from the mule floors

B.  

Mark the rest API invocations in the Munits and then call the mocking service flow that simulates standard responses from the REST API

C.  

Mock the rest API invocation in the Munits and return a mock response for those invocations

D.  

Create a mocking service flow to simulate standard responses from the rest API and then configure the mule flows to call the marking service flow

Discussion 0
Questions 12

An organization uses a set of customer-hosted Mule runtimes that are managed using the Mulesoft-hosted control plane. What is a condition that can be alerted on from Anypoint Runtime Manager without any custom components or custom coding?

Options:

A.  

When a Mule runtime on a given customer-hosted server is experiencing high memory consumption during certain periods

B.  

When an SSL certificate used by one of the deployed Mule applications is about to expire

C.  

When the Mute runtime license installed on a Mule runtime is about to expire

D.  

When a Mule runtime's customer-hosted server is about to run out of disk space

Discussion 0
Questions 13

What best describes the Fully Qualified Domain Names (FQDNs), also known as DNS entries, created when a Mule application is deployed to the CloudHub Shared Worker Cloud?

Options:

A.  

A fixed number of FQDNs are created, IRRESPECTIVE of the environment and VPC design

B.  

The FQDNs are determined by the application name chosen, IRRESPECTIVE of the region

C.  

The FQDNs are determined by the application name, but can be modified by an administrator after deployment

D.  

The FQDNs are determined by both the application name and the region

Discussion 0
Questions 14

An API implementation is being developed to expose data from a production database via HTTP requests. The API implementation executes a database SELECT statement that is dynamically created based upon data received from each incoming HTTP request. The developers are planning to use various types of testing to make sure the Mule application works as expected, can handle specific workloads, and behaves correctly from an API consumer perspective. What type of testing would typically mock the results from each SELECT statement rather than actually execute it in the production database?

Options:

A.  

Unit testing (white box)

B.  

Integration testing

C.  

Functional testing (black box)

D.  

Performance testing

Discussion 0
Questions 15

A company is planning to extend its Mule APIs to the Europe region. Currently all new applications are deployed to Cloudhub in the US region following this naming convention

{API name}-{environment}. for example, Orders-SAPI-dev, Orders-SAPI-prod etc.

Considering there is no network restriction to block communications between API's, what strategy should be implemented in order to apply the same new API's running in the EU region of CloudHub as well to minimize latency between API's and target users and systems in Europe?

Options:

A.  

Set region property to Europe (eu-de) in API manager for all the mule application

No need to change the naming convention

B.  

Set region property to Europe (eu-de) in API manager for all the mule application

Change the naming convention to {API name}-{environment}-{region} and communicate this change to the consuming applications and users

C.  

Set region property to Europe (eu-de) in runtime manager for all the mule application

No need to change the naming convention

D.  

Set region property to Europe (eu-de) in runtime manager for all the mule application

Change the naming convention to {API name}-{environment}-{region} and communicate this change to the consuming applications and users

Discussion 0
Questions 16

What is an advantage of using OAuth 2.0 client credentials and access tokens over only API keys for API authentication?

Options:

A.  

If the access token is compromised, the client credentials do not to be reissued.

B.  

If the access token is compromised, I can be exchanged for an API key.

C.  

If the client ID is compromised, it can be exchanged for an API key

D.  

If the client secret is compromised, the client credentials do not have to be reissued.

Discussion 0
Questions 17

A Mule application is synchronizing customer data between two different database systems.

What is the main benefit of using XA transaction over local transactions to synchronize these two database system?

Options:

A.  

Reduce latency

B.  

Increase throughput

C.  

Simplifies communincation

D.  

Ensure consistency

Discussion 0
Questions 18

What is a defining characteristic of an integration-Platform-as-a-Service (iPaaS)?

Options:

A.  

A Cloud-based

B.  

No-code

C.  

Code-first

D.  

On-premises

Discussion 0
Questions 19

Additional nodes are being added to an existing customer-hosted Mule runtime cluster to improve performance. Mule applications deployed to this cluster are invoked by API clients through a load balancer.

What is also required to carry out this change?

Options:

A.  

A new load balancer must be provisioned to allow traffic to the new nodes in a round-robin fashion

B.  

External monitoring tools or log aggregators must be configured to recognize the new nodes

C.  

API implementations using an object store must be adjusted to recognize the new nodes and persist to them

D.  

New firewall rules must be configured to accommodate communication between API clients and the new nodes

Discussion 0
Questions 20

In Anypoint Platform, a company wants to configure multiple identity providers (IdPs) for multiple lines of business (LOBs). Multiple business groups, teams, and environments have been defined for these LOBs.

What Anypoint Platform feature can use multiple IdPs across the company’s business groups, teams, and environments?

Options:

A.  

MuleSoft-hosted (CloudHub) dedicated load balancers

B.  

Client (application) management

C.  

Virtual private clouds

D.  

Permissions

Discussion 0
Questions 21

When a Mule application using VM queues is deployed to a customer-hosted cluster or multiple CloudHub v1.0 workers/replicas, how are messages consumed across the nodes?

Options:

A.  

Sequentially, from a dedicated Anypoint MQ queue

B.  

Sequentially, only from the primary node

C.  

In a non-deterministic way

D.  

Round-robin, within an XA transaction

Discussion 0
Questions 22

An integration architect is designing an API that must accept requests from API clients for both XML and JSON content over HTTP/1.1 by default.

Which API architectural style, when used for its intended and typical purposes, should the architect choose to meet these requirements?

Options:

A.  

SOAP

B.  

GraphQL

C.  

REST

D.  

grRPC

Discussion 0
Questions 23

Which role is primarily responsible for building API implementation as part of a typical MuleSoft integration project?

Options:

A.  

API Developer

B.  

API Designer

C.  

Integration Architect

D.  

Operations

Discussion 0
Questions 24

A Mule application is being designed for deployment to a single CloudHub worker. The Mule application will have a flow that connects to a SaaS system to perform some operations each time the flow is invoked.

The SaaS system connector has operations that can be configured to request a short-lived token (fifteen minutes) that can be reused for subsequent connections within the fifteen minute time window. After the token expires, a new token must be requested and stored.

What is the most performant and idiomatic (used for its intended purpose) Anypoint Platform component or service to use to support persisting and reusing tokens in the Mule application to help speed up reconnecting the Mule application to the SaaS application?

Options:

A.  

Nonpersistent object store

B.  

Persistent object store

C.  

Variable

D.  

Database

Discussion 0
Questions 25

An organization uses Mule runtimes which are managed by Anypoint Platform - Private Cloud Edition. What MuleSoft component is responsible for feeding analytics data to non-MuleSoft analytics platforms?

Options:

A.  

Anypoint Exchange

B.  

The Mule runtimes

C.  

Anypoint API Manager

D.  

Anypoint Runtime Manager

Discussion 0
Questions 26

An organization is creating a Mule application that will be deployed to CloudHub. The Mule application has a property named dbPassword that stores a database user’s password.

The organization's security standards indicate that the dbPassword property must be hidden from every Anypoint Platform user after the value is set in the Runtime Manager Properties tab.

What configuration in the Mule application helps hide the dbPassword property value in Runtime Manager?

Options:

A.  

Use secure::dbPassword as the property placeholder name and store the cleartext (unencrypted) value in a secure properties placeholder file

B.  

Use secure::dbPassword as the property placeholder name and store the property encrypted value in a secure properties placeholder file

C.  

Add the dbPassword property to the secureProperties section of the pom.xml file

D.  

Add the dbPassword property to the secureProperties section of the mule-artifact.json file

Discussion 0
Questions 27

A Mule application currently writes to two separate SQL Server database instances across the internet using a single XA transaction. It is 58. proposed to split this one transaction into two separate non-XA transactions with no other changes to the Mule application.

What non-functional requirement can be expected to be negatively affected when implementing this change?

Options:

A.  

Throughput

B.  

Consistency

C.  

Response time

D.  

Availability

Discussion 0
Questions 28

An organization has an HTTPS-enabled Mule application named Orders API that receives requests from another Mule application named Process Orders.

The communication between these two Mule applications must be secured by TLS mutual authentication (two-way TLS).

At a minimum, what must be stored in each truststore and keystore of these two Mule applications to properly support two-way TLS between the two Mule applications while properly protecting each Mule application's keys?

Options:

A.  

Orders API truststore: The Orders API public key

Process Orders keystore: The Process Orders private key and public key

B.  

Orders API truststore: The Orders API private key and public key

Process Orders keystore: The Process Orders private key public key

C.  

Orders API truststore: The Process Orders public key

Orders API keystore: The Orders API private key and public key

Process Orders truststore: The Orders API public key

Process Orders keystore: The Process Orders private key and public key

D.  

Orders API truststore: The Process Orders public key

Orders API keystore: The Orders API private key

Process Orders truststore: The Orders API public key

Process Orders keystore: The Process Orders private key

Discussion 0
Questions 29

An integration Mule application is deployed to a customer-hosted multi-node Mule 4 runtime duster. The Mule application uses a Listener operation of a JMS connector to receive incoming messages from a JMS queue.

How are the messages consumed by the Mule application?

Options:

A.  

Depending on the JMS provider's configuration, either all messages are consumed by ONLY the primary cluster node or else ALL messages are consumed by ALL cluster nodes

B.  

Regardless of the Listener operation configuration, all messages are consumed by ALL cluster nodes

C.  

Depending on the Listener operation configuration, either all messages are consumed by ONLY the primary cluster node or else EACH message is consumed by ANY ONE cluster node

D.  

Regardless of the Listener operation configuration, all messages are consumed by ONLY the primary cluster node

Discussion 0
Questions 30

A leading eCommerce giant will use MuleSoft APIs on Runtime Fabric (RTF) to process customer orders. Some customer-sensitive information, such as credit card information, is required in request payloads or is included in response payloads in some of the APIs. Other API requests and responses are not authorized to access some of this customer-sensitive information but have been implemented to validate and transform based on the structure and format of this customer-sensitive information (such as account IDs, phone numbers, and postal codes).

What approach configures an API gateway to hide sensitive data exchanged between API consumers and API implementations, but can convert tokenized fields back to their original value for other API requests or responses, without having to recode the API implementations?

Later, the project team requires all API specifications to be augmented with an additional non-functional requirement (NFR) to protect the backend services from a high rate of requests, according to defined service-level

agreements (SLAs). The NFR's SLAs are based on a new tiered subscription level "Gold", "Silver", or "Platinum" that must be tied to a new parameter that is being added to the Accounts object in their enterprise data model.

Following MuleSoft's recommended best practices, how should the project team now convey the necessary non-functional requirement to stakeholders?

Options:

A.  

Create and deploy API proxies in API Manager for the NFR, change the baseurl in each

API specification to the corresponding API proxy implementation endpoint, and publish each modified API specification to Exchange

B.  

Update each API specification with comments about the NFR's SLAs and publish each modified API specification to Exchange

C.  

Update each API specification with a shared RAML fragment required to implement the NFR and publish the RAML fragment and each modified API specification to Exchange

D.  

Create a shared RAML fragment required to implement the NFR, list each API implementation endpoint in the RAML fragment, and publish the RAML fragment to Exchange

Discussion 0
Questions 31

A Mule application contains a Batch Job with two Batch Steps (Batch_Step_l and Batch_Step_2). A payload with 1000 records is received by the Batch Job.

How many threads are used by the Batch Job to process records, and how does each Batch Step process records within the Batch Job?

Options:

A.  

Each Batch Job uses SEVERAL THREADS for the Batch Steps Each Batch Step instance receives ONE record at a time as the payload, and RECORDS are processed IN PARALLEL within and between the two Batch Steps

B.  

Each Batch Job uses a SINGLE THREAD for all Batch steps Each Batch step instance receives ONE record at a time as the payload, and RECORDS are processed IN ORDER, first through Batch_Step_l and then through Batch_Step_2

C.  

Each Batch Job uses a SINGLE THREAD to process a configured block size of record Each Batch Step instance receives A BLOCK OF records as the payload, and BLOCKS of records are processed IN ORDER

D.  

Each Batch Job uses SEVERAL THREADS for the Batch Steps Each Batch Step instance receives ONE record at a time as the payload, and BATCH STEP INSTANCES execute IN PARALLEL to process records and Batch Steps in ANY order as fast as possible

Discussion 0
Questions 32

Which key DevOps practice and associated Anypoint Platform component should a MuteSoft integration team adopt to improve delivery quality?

Options:

A.  

A Continuous design with API Designer

B.  

Automated testing with MUnit

C.  

Passive monitoring with Anypoint Monitoring

D.  

Manual testing with Anypoint Studio

Discussion 0
Questions 33

What aspect of logging is only possible for Mule applications deployed to customer-hosted Mule runtimes, but NOT for Mule applications deployed to CloudHub?

Options:

A.  

To send Mule application log entries to Splunk

B.  

To change tog4j2 tog levels in Anypoint Runtime Manager without having to restart the Mule application

C.  

To log certain messages to a custom log category

D.  

To directly reference one shared and customized log4j2.xml file from multiple Mule applications

Discussion 0
Questions 34

An organization currently uses a multi-node Mule runtime deployment model within their datacenter, so each Mule runtime hosts several Mule applications. The organization is planning to transition to a deployment model based on Docker containers in a Kubernetes cluster. The organization has already created a standard Docker image containing a Mule runtime and all required dependencies (including a JVM), but excluding the Mule application itself.

What is an expected outcome of this transition to container-based Mule application deployments?

Options:

A.  

Required redesign of Mule applications to follow microservice architecture principles

B.  

Required migration to the Docker and Kubernetes-based Anypoint Platform - Private Cloud Edition

C.  

Required change to the URL endpoints used by clients to send requests to the Mule applications

D.  

Guaranteed consistency of execution environments across all deployments of a Mule application

Discussion 0
Questions 35

A project uses Jenkins to implement CI/CD process. It was observed that each Mule package contains some of the Jenkins files and folders for configurations of CI/CD jobs.

As these files and folders are not part of the actual package, expectation is that these should not be part of deployed archive.

Which file can be used to exclude these files and folders from the deployed archive?

Options:

A.  

muleignore

B.  

_unTrackMule

C.  

mulelnclude

D.  

_muleExclude

Discussion 0
Questions 36

An API has been unit tested and is ready for integration testing. The API is governed by a Client ID Enforcement policy in all environments.

What must the testing team do before they can start integration testing the API in the Staging environment?

Options:

A.  

They must access the API portal and create an API notebook using the Client ID and Client Secret supplied by the API portal in the Staging environment

B.  

They must request access to the API instance in the Staging environment and obtain a Client ID and Client Secret to be used for testing the API

C.  

They must be assigned as an API version owner of the API in the Staging environment

D.  

They must request access to the Staging environment and obtain the Client ID and Client Secret for that environment to be used for testing the API

Discussion 0
Questions 37

An organization is evaluating using the CloudHub shared Load Balancer (SLB) vs creating a CloudHub dedicated load balancer (DLB). They are evaluating how this choice affects the various types of certificates used by CloudHub deployed Mule applications, including MuleSoft-provided, customer-provided, or Mule application-provided certificates. What type of restrictions exist on the types of certificates for the service that can be exposed by the CloudHub Shared Load Balancer (SLB) to external web clients over the public internet?

Options:

A.  

Underlying Mule applications need to implement own certificates

B.  

Only MuleSoft provided certificates can be used for server side certificate

C.  

Only self signed certificates can be used

D.  

All certificates which can be used in shared load balancer need to get approved by raising support ticket

Discussion 0
Questions 38

An organization is evaluating using the CloudHub shared Load Balancer (SLB) vs creating a CloudHub dedicated load balancer (DLB). They are evaluating how this choice affects the various types of certificates used by CloudHub deplpoyed Mule applications, including MuleSoft-provided, customer-provided, or Mule application-provided certificates.

What type of restrictions exist on the types of certificates that can be exposed by the CloudHub Shared Load Balancer (SLB) to external web clients over the public internet?

Options:

A.  

Only MuleSoft-provided certificates are exposed.

B.  

Only customer-provided wildcard certificates are exposed.

C.  

Only customer-provided self-signed certificates are exposed.

D.  

Only underlying Mule application certificates are exposed (pass-through)

Discussion 0
Questions 39

Refer to the exhibit.

One of the backend systems invoked by an API implementation enforces rate limits on the number of requests a particular client can make. Both the backend system and the API implementation are deployed to several non-production environments in addition to production.

Rate limiting of the backend system applies to all non-production environments. The production environment, however, does NOT have any rate limiting.

What is the most effective approach to conduct performance tests of the API implementation in a staging (non-production) environment?

Options:

A.  

Create a mocking service that replicates the backend system's production performance characteristics. Then configure the API implementation to use the mocking service and conduct the performance tests

B.  

Use MUnit to simulate standard responses from the backend system then conduct performance tests to identify other bottlenecks in the system

C.  

Include logic within the API implementation that bypasses invocations of the backend system in a performance test situation. Instead invoking local stubs that replicate typical backend system responses then conduct performance tests using this API Implementation

D.  

Conduct scaled-down performance tests in the staging environment against the rate limited backend system then upscale performance results to full production scale

Discussion 0
Questions 40

What Mule application can have API policies applied by Anypoint Platform to the endpoint exposed by that Mule application?

Options:

A.  

A Mule application that accepts requests over HTTP/1x

B.  

A Mule application that accepts JSON requests over TCP but is NOT required to provide a response.

C.  

A Mule application that accepts JSON requests over WebSocket

D.  

A Mule application that accepts gRPC requests over HTTP/2

Discussion 0
Questions 41

A company is designing a mule application to consume batch data from a partner's ftps server The data files have been compressed and then digitally signed using PGP.

What inputs are required for the application to securely consumed these files?

Options:

A.  

ATLS context Key Store requiring the private key and certificate for the company

PGP public key of partner

PGP private key for the company

B.  

ATLS context first store containing a public certificate for partner ftps server and the PGP public key of the partner

TLS contact Key Store containing the FTP credentials

C.  

TLS context trust or containing a public certificate for the ftps server The FTP username and password The PGP public key of the partner

D.  

The PGP public key of the partner

The PGP private key for the company

The FTP username and password

Discussion 0
Questions 42

An organization is using Mulesoft cloudhub and develops API's in the latest version. As a part of requirements for one of the API's, third party API needs to be called. The security team has made it clear that calling any external API needs to have include listing

As an integration architect please suggest the best way to accomplish the design plan to support these requirements?

Options:

A.  

Implement includelist IP on the cloudhub VPC firewall to allow the traffic

B.  

Implement the validation of includelisted IP operation

C.  

Implement the Any point filter processor to implement the include list IP

D.  

Implement a proxy for the third party API and enforce the IPinclude list policy and call this proxy from the flow of the API

Discussion 0
Questions 43

What requirement prevents using Anypoint MQ as the messaging broker for a Mule application?

Options:

A.  

When the payload sent through the message broker must use XML format

B.  

When the payload sent through the message broker must be encrypted

C.  

When the messaging broker must support point-to-point messaging

D.  

When the messaging broker must be deployed on-premises

Discussion 0
Questions 44

An organization is designing Mule application which connects to a legacy backend. It has been reported that backend services are not highly available and experience downtime quite often. As an integration architect which of the below approach you would propose to achieve high reliability goals?

Options:

A.  

Alerts can be configured in Mule runtime so that backend team can be communicated when services are down

B.  

Until Successful scope can be implemented while calling backend API's

C.  

On Error Continue scope to be used to call in case of error again

D.  

Create a batch job with all requests being sent to backend using that job as per the availability of backend API's

Discussion 0
Questions 45

An organization is implementing a Quote of the Day API that caches today's quote. What scenario can use the CloudHub Object Store connector to persist the cache's state?

Options:

A.  

When there is one deployment of the API implementation to CloudHub and another one to customer hosted mule runtime that must share the cache state.

B.  

When there are two CloudHub deployments of the API implementation by two Anypoint Platform business groups to the same CloudHub region that must share the cache state.

C.  

When there is one CloudHub deployment of the API implementation to three workers that must share the cache state.

D.  

When there are three CloudHub deployments of the API implementation to three separate CloudHub regions that must share the cache state.

Discussion 0
Questions 46

A company is designing an integration Mule application to process orders by submitting them to a back-end system for offline processing. Each order will be received by the Mule application through an HTTP5 POST and must be acknowledged immediately.

Once acknowledged the order will be submitted to a back-end system. Orders that cannot be successfully submitted due to the rejections from the back-end system will need to be processed manually (outside the banking system).

The mule application will be deployed to a customer hosted runtime and will be able to use an existing ActiveMQ broker if needed. The ActiveMQ broker is located inside the organization's firewall. The back-end system has a track record of unreliability due to both minor network connectivity issues and longer outages.

Which combination of Mule application components and ActiveMQ queues are required to ensure automatic submission of orders to the back-end system while supporting but minimizing manual order processing?

Options:

A.  

One or more On Error scopes to assist calling the back-end system An Untill successful scope containing VM components for long retries A persistent dead-letter VM queue configure in Cloud hub

B.  

An Until Successful scope to call the back-end system One or more ActiveMQ long-retry queues One or more ActiveMQ dead-letter queues for manual processing

C.  

One or more on-Error scopes to assist calling the back-end system one or more ActiveMQ long-retry queues A persistent dead-letter Object store configuration in the CloudHub object store service

D.  

A batch job scope to call the back in system An Untill successful scope containing Object Store components for long retries. A dead-letter object store configured in the Mule application

Discussion 0
Questions 47

An auto mobile company want to share inventory updates with dealers Dl and D2 asynchronously and concurrently via queues Q1 and Q2. Dealer Dl must consume the message from the queue Q1 and dealer D2 to must consume a message from the queue Q2.

Dealer D1 has implemented a retry mechanism to reprocess the transaction in case of any errors while processing the inventers updates. Dealer D2 has not implemented any retry mechanism.

How should the dealers acknowledge the message to avoid message loss and minimize impact on the current implementation?

Options:

A.  

Dealer D1 must use auto acknowledgement and dealer D2 can use manual acknowledgement and acknowledge the message after successful processing

B.  

Dealer D1 can use auto acknowledgement and dealer D2 can use IMMEDIATE acknowledgement and acknowledge the message of successful processing

C.  

Dealer D1 and dealer D2 must use AUTO acknowledgement and acknowledge the message after successful processing

D.  

Dealer D1 can use AUTO acknowledgement and dealer D2 must use manual acknowledgement and acknowledge the message

after successful processing

Discussion 0
Questions 48

As a part of project , existing java implementation is being migrated to Mulesoft. Business is very tight on the budget and wish to complete the project in most economical way possible.

Canonical object model using java is already a part of existing implementation. Same object model is required by mule application for a business use case. What is the best way to achieve this?

Options:

A.  

Make use of Java module

B.  

Create similar model for Mule applications

C.  

Create a custom application to read Java code and make it available for Mule application

D.  

Use Anypoint exchange

Discussion 0
Questions 49

Which Salesforce API is invoked to deploy, retrieve, create, update, or delete customization information, such as custom object definitions using Mule Salesforce Connectors in a Mule application?

Options:

A.  

sObject Platform Action API

B.  

User Interface API

C.  

Metadata API

D.  

Process Rules API

Discussion 0
Questions 50

An organization has defined a common object model in Java to mediate the communication between different Mule applications in a consistent way. A Mule application is being built to use this common object model to process responses from a SOAP API and a REST API and then write the processed results to an order management system.

The developers want Anypoint Studio to utilize these common objects to assist in creating mappings for various transformation steps in the Mule application.

What is the most idiomatic (used for its intended purpose) and performant way to utilize these common objects to map between the inbound and outbound systems in the Mule application?

Options:

A.  

Use JAXB (XML) and Jackson (JSON) data bindings

B.  

Use the WSS module

C.  

Use the Java module

D.  

Use the Transform Message component

Discussion 0
Questions 51

A stock trading company handles millions of trades a day and requires excellent performance and reliability within its stock trading system. The company operates a number of event-driven APIs Implemented as Mule applications that are hosted on various customer-hosted Mule clusters and needs to enable message exchanges between the APIs within their internal network using shared message queues.

What is an effective way to meet the cross-cluster messaging requirements of its event-driven APIs?

Options:

A.  

Non-transactional JMS operations with a reliability pattern and manual acknowledgements

B.  

Persistent VM queues with automatic acknowledgements

C.  

JMS transactions with automatic acknowledgements

D.  

extended Architecture (XA) transactions and XA connected components with manual acknowledgements

Discussion 0
Questions 52

A manufacturing company plans to deploy Mule applications to its own

Azure Kubernetes service infrastructure.The organization wants to make

the Mule applications more available and robust by deploying each Mule

application to an isolated Mule runtime in a Docker container while

managing all the Mule applications from the MuleSoft-hosted control plane.

What choice of runtime plane meets these organizational requirements?

Options:

A.  

CloudHub 2.0

B.  

Customer-hosted self-provisioned runtime plane

C.  

Anypoint Service Mesh

D.  

Anypoint Runtime Fabric

Discussion 0
Questions 53

A Mule application is built to support a local transaction for a series of operations on a single database. The mule application has a Scatter-Gather scope that participates in the local transaction.

What is the behavior of the Scatter-Gather when running within this local transaction?

Options:

A.  

Execution of all routes within Scatter-Gather occurs in parallel Any error that occurs inside Scatter-Gather will result in a roll back of all the database operations

B.  

Execution of all routes within Scatter-Gather occurs sequentially Any error that occurs inside Scatter-Gather will be handled by error handler and will not result in roll back

C.  

Execution of all routes within Scatter-Gather occurs sequentially Any error that occurs inside Scatter-Gather will result in a roll back of all the database operations

D.  

Execution of all routes within Scatter-Gather occurs in parallel Any error that occurs inside Scatter-Gather will be handled by error handler and will not result in roll back

Discussion 0
Questions 54

A Mule application contains a Batch Job scope with several Batch Step scopes. The Batch Job scope is configured with a batch block size of 25.

A payload with 4,000 records is received by the Batch Job scope.

When there are no errors, how does the Batch Job scope process records within and between the Batch Step scopes?

Options:

A.  

The Batch Job scope processes multiple record blocks in parallel, and a block of 25 records can jump ahead to the next Batch Step scope over an earlier block of records

Each Batch Step scope is invoked with one record in the payload of the received Mule event

For each Batch Step scope, all 25 records within a block are processed in parallel

All the records in a block must be completed before the block of 25 records is avai

B.  

The Batch Job scope processes each record block sequentially, one at a time

Each Batch Step scope is invoked with one record in the payload of the received Mule event

For each Batch Step scope, all 25 records within a block are processed sequentially, one at a time

All 4000 records must be completed before the blocks of records are available to the next Batch Step scope

C.  

The Batch Job scope processes multiple record blocks in parallel, and a block of 25 records can jump ahead to the next Batch Step scope over an earlier block of records

Each Batch Step scope is invoked with one record in the payload of the received Mule event

For each Batch Step scope, all 25 records within a block are processed sequentially, one record at a time

All the records in a block must be completed before the bloc

D.  

The Batch Job scope processes multiple record blocks in parallel

Each Batch Step scope is invoked with a batch of 25 records in the payload of the received Mule event

For each Batch Step scope, all 4000 records are processed in parallel

Individual records can jump ahead to the next Batch Step scope before the rest of the records finish processing in the current Batch Step scope

Discussion 0
Questions 55

Refer to the exhibit.

An organization is sizing an Anypoint VPC for the non-production deployments of those Mule applications that connect to the organization's on-premises systems. This applies to approx. 60 Mule applications. Each application is deployed to two CloudHub i workers. The organization currently has three non-production environments (DEV, SIT and UAT) that share this VPC. The AWS region of the VPC has two AZs.

The organization has a very mature DevOps approach which automatically progresses each application through all non-production environments before automatically deploying to production. This process results in several Mule application deployments per hour, using CloudHub's normal zero-downtime deployment feature.

What is a CIDR block for this VPC that results in the smallest usable private IP address range?

Options:

A.  

10.0.0.0/26 (64 IPS)

B.  

10.0.0.0/25 (128 IPs)

C.  

10.0.0.0/24 (256 IPs)

D.  

10.0.0.0/22 (1024 IPs)

Discussion 0
Questions 56

An automation engineer needs to write scripts to automate the steps of the API lifecycle, including steps to create, publish, deploy and manage APIs and their implementations in Anypoint Platform.

What Anypoint Platform feature can be used to automate the execution of all these actions in scripts in the easiest way without needing to directly invoke the Anypoint Platform REST APIs?

Options:

A.  

Automated Policies in API Manager

B.  

Runtime Manager agent

C.  

The Mule Maven Plugin

D.  

Anypoint CLI

Discussion 0
Questions 57

A Mule application is running on a customer-hosted Mule runtime in an organization's network. The Mule application acts as a producer of asynchronous Mule events. Each Mule event must be broadcast to all interested external consumers outside the Mule application. The Mule events should be published in a way that is guaranteed in normal situations and also minimizes duplicate delivery in less frequent failure scenarios.

The organizational firewall is configured to only allow outbound traffic on ports 80 and 443. Some external event consumers are within the organizational network, while others are located outside the firewall.

What Anypoint Platform service is most idiomatic (used for its intended purpose) for publishing these Mule events to all external consumers while addressing the desired reliability goals?

Options:

A.  

CloudHub VM queues

B.  

Anypoint MQ

C.  

Anypoint Exchange

D.  

CloudHub Shared Load Balancer

Discussion 0
Questions 58

According to MuleSoft, what Action should an IT organization take regarding its technology assets in order to close the IT delivery.

Options:

A.  

Make assets easily discoverable via a central repository

B.  

Focus project delivery efforts on custom assets that meet the specific requirements of each individual line of business

C.  

Create weekly meetings that all members of IT attend to present justification and request approval to use existing assets

D.  

Hire additional staff to meet the demand for asset creation required for approved projects and timelines

Discussion 0
Questions 59

A developer is examining the responses from a RESTful web service that is compliant with the Mypertext Transfer Protocol (HTTP/1.1) a8 defined by the Internet Engineering Task Force (IETF).

In this HTTP/1.1-compliant web service, which class of HTTP response status codes should be specified to indicate when client requests are successfully received, understood, and accepted by the web service?

Options:

A.  

3xx

B.  

2xx

C.  

4xx

D.  

5xx

Discussion 0
Questions 60

As part of a growth strategy, a supplier signs a trading agreement with a large customer. The customer sends purchase orders to the supplier according to the ANSI X12 EDI standard, and the supplier creates the orders in its ERP system using the information in the EDI document.

The agreement also requires that the supplier provide a new RESTful API to process request from the customer for current product inventory level from the supplier’ s ERP system.

Which two fundamental integration use cases does the supplier need to deliver to provide an end-to-end solution for this business scenario? (Choose two.)

Options:

A.  

Synchronized data transfer

B.  

Sharing data with external partners

C.  

User interface integration

D.  

Streaming data ingestion

E.  

Data mashups

Discussion 0
Questions 61

Insurance organization is planning to deploy Mule application in MuleSoft Hosted runtime plane. As a part of requirement , application should be scalable . highly available. It also has regulatory requirement which demands logs to be retained for at least 2 years. As an Integration Architect what step you will recommend in order to achieve this?

Options:

A.  

It is not possible to store logs for 2 years in CloudHub deployment. External log management system is required.

B.  

When deploying an application to CloudHub , logs retention period should be selected as 2 years

C.  

When deploying an application to CloudHub, worker size should be sufficient to store 2 years data

D.  

Logging strategy should be configured accordingly in log4j file deployed with the application.

Discussion 0
Questions 62

Mule application A receives a request Anypoint MQ message REQU with a payload containing a variable-length list of request objects. Application A uses the For Each scope to split the list into individual objects and sends each object as a message to an Anypoint MQ queue.

Service S listens on that queue, processes each message independently of all other messages, and sends a response message to a response queue.

Application A listens on that response queue and must in turn create and publish a response Anypoint MQ message RESP with a payload containing the list of responses sent by service S in the same order as the request objects originally sent in REQU.

Assume successful response messages are returned by service S for all request messages.

What is required so that application A can ensure that the length and order of the list of objects in RESP and REQU match, while at the same time maximizing message throughput?

Options:

A.  

Use a Scatter-Gather within the For Each scope to ensure response message order Configure the Scatter-Gather with a persistent object store

B.  

Perform all communication involving service S synchronously from within the For Each scope, so objects in RESP are in the exact same order as request objects in REQU

C.  

Use an Async scope within the For Each scope and collect response messages in a second For Each scope in the order In which they arrive, then send RESP using this list of responses

D.  

Keep track of the list length and all object indices in REQU, both in the For Each scope and in all communication involving service Use persistent storage when creating RESP

Discussion 0
Questions 63

An organization's governance process requires project teams to get formal approval from all key stakeholders for all new Integration design specifications. An integration Mule application Is being designed that interacts with various backend systems. The Mule application will be created using Anypoint Design Center or Anypoint Studio and will then be deployed to a customer-hosted runtime.

What key elements should be included in the integration design specification when requesting approval for this Mule application?

Options:

A.  

SLAs and non-functional requirements to access the backend systems

B.  

Snapshots of the Mule application's flows, including their error handling

C.  

A list of current and future consumers of the Mule application and their contact details

D.  

The credentials to access the backend systems and contact details for the administrator of each system

Discussion 0
Questions 64

A retailer is designing a data exchange interface to be used by its suppliers. The interface must support secure communication over the public internet. The interface must also work with a wide variety of programming languages and IT systems used by suppliers.

What are suitable interface technologies for this data exchange that are secure, cross-platform, and internet friendly, assuming that Anypoint Connectors exist for these interface technologies?

Options:

A.  

EDJFACT XML over SFTP JSON/REST over HTTPS

B.  

SOAP over HTTPS HOP over TLS gRPC over HTTPS

C.  

XML over ActiveMQ XML over SFTP XML/REST over HTTPS

D.  

CSV over FTP YAML over TLS JSON over HTTPS

Discussion 0
Questions 65

An organization is designing the following two Mule applications that must share data via a common persistent object store instance:

- Mule application P will be deployed within their on-premises datacenter.

- Mule application C will run on CloudHub in an Anypoint VPC.

The object store implementation used by CloudHub is the Anypoint Object Store v2 (OSv2).

what type of object store(s) should be used, and what design gives both Mule applications access to the same object store instance?

Options:

A.  

Application P uses the Object Store connector to access a persistent object store Application C accesses this persistent object store via the Object Store REST API through an IPsec tunnel

B.  

Application C and P both use the Object Store connector to access the Anypoint Object Store v2

C.  

Application C uses the Object Store connector to access a persistent object Application P accesses the persistent object store via the Object Store REST API

D.  

Application C and P both use the Object Store connector to access a persistent object store

Discussion 0
Questions 66

A trading company handles millions of requests a day. Due to nature of its business, it requires excellent

performance and reliability within its application.

For this purpose, company uses a number of event-based API's hosted on various mule clusters that communicate across a shared message queue sitting within its network.

Which method should be used to meet the company's requirement for its system?

Options:

A.  

XA transactions and XA connected components

B.  

JMS transactions

C.  

JMS manual acknowledgements with a reliability pattern

D.  

VM queues with reliability pattern

Discussion 0
Questions 67

An organization has various integrations implemented as Mule applications. Some of these Mule applications are deployed to custom hosted Mule runtimes (on-premises) while others execute in the MuleSoft-hosted runtime plane (CloudHub). To perform the Integra functionality, these Mule applications connect to various backend systems, with multiple applications typically needing to access the backend systems.

How can the organization most effectively avoid creating duplicates in each Mule application of the credentials required to access the backend systems?

Options:

A.  

Create a Mule domain project that maintains the credentials as Mule domain-shared resources Deploy the Mule applications to the Mule domain, so the credentials are available to the Mule applications

B.  

Store the credentials in properties files in a shared folder within the organization's data center Have the Mule applications load properties files from this shared location at startup

C.  

Segregate the credentials for each backend system into environment-specific properties files Package these properties files in each Mule application, from where they are loaded at startup

D.  

Configure or create a credentials service that returns the credentials for each backend system, and that is accessible from customer-hosted and MuleSoft-hosted Mule runtimes Have the Mule applications toad the properties at startup by invoking that credentials service

Discussion 0
Questions 68

An insurance company is using a CIoudHub runtime plane. As a part of requirement, email alert should

be sent to internal operations team every time of policy applied to an API instance is deleted As an integration architect suggest on how this requirement be met?

Options:

A.  

Use audit logs in Anypoint platform to detect a policy deletion and configure the Audit logs alert feature to send an email to the operations team

B.  

Use Anypoint monitoring to configure an alert that sends an email to the operations team every time a policy is deleted in API manager

C.  

Create a custom connector to be triggered every time of policy is deleted in API manager

D.  

Implement a new application that uses the Audit log REST API to

detect the policy deletion and send an email to operations team the SMTP connector

Discussion 0
Questions 69

What is an advantage that Anypoint Platform offers by providing universal API management and Integration-Platform-as-a-Service (iPaaS) capabilities in a unified platform?

Options:

A.  

Ability to use a single iPaaS to manage and integrate all API gateways

B.  

Ability to use a single connector to manage and integrate all APis

C.  

Ability to use a single control plane for both full-lifecycle AP] management and integration

D.  

Ability to use a single iPaaS to manage all API developer portals

Discussion 0
Questions 70

Refer to the exhibit.

A customer is running Mule applications on Runtime Fabric for Self-Managed Kubernetes

(RTF-BYOKS) in a multi-cloud environment.

Based on this configuration, how do Agents and Runtime Manager

communicate, and what Is exchanged between them?

Options:

A.  

BLOCKING_IO, UBER

B.  

UBER, Dedicated NIO Selector Pool

C.  

CPU_LITE, CPU_INTENSIVE

D.  

Shared NIO Selector Pool, CPU_LITE

Discussion 0
Questions 71

A large life sciences customer plans to use the Mule Tracing module with the Mapped Diagnostic Context (MDC) logging operations to enrich logging in its Mule application and to improve tracking by providing more context in the Mule application logs. The customer also wants to improve throughput and lower the message processing latency in its Mule application flows.

After installing the Mule Tracing module in the Mule application, how should logging be performed in flows in Mule applications, and what should be changed In the log4j2.xml files?

Options:

A.  

In the flows, add Mule Tracing module Set logging variable operations before any Core Logger components.

In log4j2.xml files, change the appender's pattern layout to use %MDC and then assign the appender to a Logger or Root element.

B.  

In the flows, add Mule Tracing module Set logging variable operations before any Core

Logger components.

In log4j2.xmI files, change the appender’s pattern layout to use the %MDC placeholder and then assign the appender to an AsyncLogger element.

C.  

In the flows, add Mule Tracing module Set logging variable operations before any Core

Logger components.

In log4j2.xmI files, change the appender’'s pattern layout to use %asyncLogger placeholder and then assign the appender to an AsyncLogger element.

D.  

In the flows, wrap Logger components in Async scopes. In log4j2.xmI files, change the appender's pattern layout to use the %asyncLogger

placeholder and then assign the appender to a Logger or Root element.

Discussion 0
Questions 72

An organization is sizing an Anypoint VPC to extend their internal network to Cloudhub.

For this sizing calculation, the organization assumes 150 Mule applications will be deployed among three(3) production environments and will use Cloudhub’s default zero-downtime feature. Each Mule application is expected to be configured with two(2) Cloudhub workers.This is expected to result in several Mule application deployments per hour.

Options:

A.  

10.0.0.0/21(2048 IPs)

B.  

10.0.0.0/22(1024IPs)

C.  

10.0.0.0/23(512 IPs)

D.  

10.0.0.0/24(256 IPs)

Discussion 0
Questions 73

Refer to the exhibit.

A Mule application is being designed to be deployed to several CIoudHub workers. The Mule application's integration logic is to replicate changed Accounts from Satesforce to a backend system every 5 minutes.

A watermark will be used to only retrieve those Satesforce Accounts that have been modified since the last time the integration logic ran.

What is the most appropriate way to implement persistence for the watermark in order to support the required data replication integration logic?

Options:

A.  

Persistent Anypoint MQ Queue

B.  

Persistent Object Store

C.  

Persistent Cache Scope

D.  

Persistent VM Queue

Discussion 0
Questions 74

An XA transaction Is being configured that involves a JMS connector listening for Incoming JMS messages. What is the meaning of the timeout attribute of the XA transaction, and what happens after the timeout expires?

Options:

A.  

The time that is allowed to pass between committing the transaction and the completion of the Mule flow After the timeout, flow processing triggers an error

B.  

The time that Is allowed to pass between receiving JMS messages on the same JMS connection After the timeout, a new JMS connection Is established

C.  

The time that Is allowed to pass without the transaction being ended explicitly After the timeout, the transaction Is forcefully rolled-back

D.  

The time that Is allowed to pass for state JMS consumer threads to be destroyed After the timeout, a new JMS consumer thread is created

Discussion 0
Questions 75

A system administrator needs to determine when permissions were last changed for an Anypoint Platform user.

Which Anypoint Platform component should the administrator use to obtain this information?

Options:

A.  

Audit Logging

B.  

Anypoint Monitoring

C.  

Anypiont Studio

D.  

Mule Stack Traces

Discussion 0
Questions 76

Mule application muleA deployed in cloudhub uses Object Store v2 to share data across instances. As a part of new requirement , application muleB which is deployed in same region wants to access this Object Store.

Which of the following option you would suggest which will have minimum latency in this scenario?

Options:

A.  

Object Store REST API

B.  

Object Store connector

C.  

Both of the above option will have same latency

D.  

Object Store of one mule application cannot be accessed by other mule application.

Discussion 0
Questions 77

Refer to the exhibit.

A shopping cart checkout process consists of a web store backend sending a sequence of API invocations to an Experience API, which in turn invokes a Process API. All API invocations are over HTTPS POST. The Java web store backend executes in a Java EE application server, while all API implementations are Mule applications executing in a customer -hosted Mule runtime.

End-to-end correlation of all HTTP requests and responses belonging to each individual checkout Instance is required. This is to be done through a common correlation ID, so that all log entries written by the web store backend, Experience API implementation, and Process API implementation include the same correlation ID for all requests and responses belonging to the same checkout instance.

What is the most efficient way (using the least amount of custom coding or configuration) for the web store backend and the implementations of the Experience API and Process API to participate in end-to-end correlation of the API invocations for each checkout instance?

A)

The web store backend, being a Java EE application, automatically makes use of the thread-local correlation ID generated by the Java EE application server and automatically transmits that to the Experience API using HTTP-standard headers

No special code or configuration is included in the web store backend, Experience API, and Process API implementations to generate and manage the correlation ID

B)

The web store backend generates a new correlation ID value at the start of checkout and sets it on the X-CORRELATlON-lt HTTP request header In each API invocation belonging to that checkout

No special code or configuration is included in the Experience API and Process API implementations to generate and manage the correlation ID

C)

The Experience API implementation generates a correlation ID for each incoming HTTP request and passes it to the web store backend in the HTTP response, which includes it in all subsequent API invocations to the Experience API.

The Experience API implementation must be coded to also propagate the correlation ID to the Process API in a suitable HTTP request header

D)

The web store backend sends a correlation ID value in the HTTP request body In the way required by the Experience API

The Experience API and Process API implementations must be coded to receive the custom correlation ID In the HTTP requests and propagate It in suitable HTTP request headers

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 78

According to MuleSoft’s recommended REST conventions, which HTTP method should an API use to specify how AP\ clients can request data from a specified resource?

Options:

A.  

POST

B.  

PUT

C.  

PATCH

D.  

GET

Discussion 0
Questions 79

A mule application designed to fulfil two requirements

a) Processing files are synchronously from an FTPS server to a back-end database using VM intermediary queues for load balancing VM events

b) Processing a medium rate of records from a source to a target system using batch job scope

Considering the processing reliability requirements for FTPS files, how should VM queues be configured for processing files as well as for the batch job scope if the application is deployed to Cloudhub workers?

Options:

A.  

Use Cloud hub persistent queues for FTPS files processing

There is no need to configure VM queues for the batch jobs scope as it uses by default the worker's disc for VM queueing

B.  

Use Cloud hub persistent VM queue for FTPS file processing

There is no need to configure VM queues for the batch jobs scope as it uses by default the worker's JVM memory for VM queueing

C.  

Use Cloud hub persistent VM queues for FTPS file processing

Disable VM queue for the batch job scope

D.  

Use VM connector persistent queues for FTPS file processing Disable VM queue for the batch job scope

Discussion 0
Questions 80

An organization is creating a set of new services that are critical for their business. The project team prefers using REST for all services but is willing to use SOAP with common WS-" standards if a particular service requires it.

What requirement would drive the team to use SOAP/WS-* for a particular service?

Options:

A.  

Must use XML payloads for the service and ensure that it adheres to a specific schema

B.  

Must publish and share the service specification (including data formats) with the consumers of the service

C.  

Must support message acknowledgement and retry as part of the protocol

D.  

Must secure the service, requiring all consumers to submit a valid SAML token

Discussion 0
Questions 81

A manufacturing company is developing a new set of APIs for its retail business. One of the APIs is a Master Look Up API, which is a System API,

The API uses a persistent object-store. This API will be used by almost all other APIs to provide master lookup data.

The Master Look Up API is deployed on two CloudHub workers of 0.1 vCore each because there is a lot of master data to be cached. Most of the master

lookup data is stored as a key-value pair. The cache gets refreshed if the key is not found in the cache.

During performance testing, it was determined that the Master Look Up API has a high response time due to the latency of database queries executed to fetch the master lookup data.

What two methods can be used to resolve these performance issues?

Choose 2 answers

Options:

A.  

Implement the HTTP caching policy for all GET endpoints for the Master Look Up API

B.  

Implement an HTTP caching policy for all GET endpoints in the Master Look Up API

C.  

Implement locking to synchronize access to the Object Store

D.  

Upgrade the vCore size from 0.1 vCore to 0.2 vCore

Discussion 0