Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

MuleSoft Certified Integration Architect - Level 1 Question and Answers

MuleSoft Certified Integration Architect - Level 1

Last Update Apr 26, 2024
Total Questions : 244

We are offering FREE MCIA-Level-1 MuleSoft exam questions. All you do is to just go and sign up. Give your details, prepare MCIA-Level-1 free exam questions and then go for complete pool of MuleSoft Certified Integration Architect - Level 1 test questions that will help you more.

MCIA-Level-1 pdf

MCIA-Level-1 PDF

$35  $99.99
MCIA-Level-1 Engine

MCIA-Level-1 Testing Engine

$42  $119.99
MCIA-Level-1 PDF + Engine

MCIA-Level-1 PDF + Testing Engine

$56  $159.99
Questions 1

An organization uses a four(4) node customer hosted Mule runtime cluster to host one(1) stateless api implementation. The API is accessed over HTTPS through a load balancer that uses round-robin for load distribution. Each node in the cluster has been sized to be able to accept four(4) times the current number of requests.

Two(2) nodes in the cluster experience a power outage and are no longer available. The load balancer directs the outage and blocks the two unavailable the nodes from receiving further HTTP requests.

What performance-related consequence is guaranteed to happen to average, assuming the remaining cluster nodes are fully operational?

Options:

A.  

100% increase in the average response time of the API

B.  

50% reduction in the throughput of the API

C.  

100% increase in the number of requests received by each remaining node

D.  

50% increase in the JVM heap memory consumed by each remaining node

Discussion 0
Questions 2

In which order are the API Client, API Implementation, and API interface components called in a typical REST request?

Options:

A.  

API Client > API implementation > API Interface

B.  

API interface > API Client > API Implementation

C.  

API Client > API Interface > API implementation

D.  

API Implementation > API Interface > API Client

Discussion 0
Questions 3

A mule application designed to fulfil two requirements

a) Processing files are synchronously from an FTPS server to a back-end database using VM intermediary queues for load balancing VM events

b) Processing a medium rate of records from a source to a target system using batch job scope

Considering the processing reliability requirements for FTPS files, how should VM queues be configured for processing files as well as for the batch job scope if the application is deployed to Cloudhub workers?

Options:

A.  

Use Cloud hub persistent queues for FTPS files processing

There is no need to configure VM queues for the batch jobs scope as it uses by default the worker's disc for VM queueing

B.  

Use Cloud hub persistent VM queue for FTPS file processing

There is no need to configure VM queues for the batch jobs scope as it uses by default the worker's JVM memory for VM queueing

C.  

Use Cloud hub persistent VM queues for FTPS file processing

Disable VM queue for the batch job scope

D.  

Use VM connector persistent queues for FTPS file processing Disable VM queue for the batch job scope

Discussion 0
Questions 4

Refer to the exhibit.

A Mule application is being designed to expose a SOAP web service to its clients.

What language is typically used inside the web service's interface definition to define the data structures that the web service Is expected to exchange with its clients?

Options:

A.  

WSDL

B.  

XSD

C.  

JSON Schema

D.  

RAMI

Discussion 0
Questions 5

An organization is creating a Mule application that will be deployed to CloudHub. The Mule application has a property named dbPassword that stores a database user’s password.

The organization's security standards indicate that the dbPassword property must be hidden from every Anypoint Platform user after the value is set in the Runtime Manager Properties tab.

What configuration in the Mule application helps hide the dbPassword property value in Runtime Manager?

Options:

A.  

Use secure::dbPassword as the property placeholder name and store the cleartext (unencrypted) value in a secure properties placeholder file

B.  

Use secure::dbPassword as the property placeholder name and store the property encrypted value in a secure properties placeholder file

C.  

Add the dbPassword property to the secureProperties section of the pom.xml file

D.  

Add the dbPassword property to the secureProperties section of the mule-artifact.json file

Discussion 0
Questions 6

According to the Internet Engineering Task Force (IETF), which supporting protocol does File Transfer Protocol (FTP) use for reliable communication?

Options:

A.  

A Secure Sockets Layer (SSL)

B.  

B Transmission Control Protocol (TCP)

C.  

Lightweight Directory Access Protocol (LDAP)

D.  

Hypertext Transfer Protocol (HTTP)

Discussion 0
Questions 7

Refer to the exhibit.

One of the backend systems invoked by an API implementation enforces rate limits on the number of requests a particular client can make. Both the backend system and the API implementation are deployed to several non-production environments in addition to production.

Rate limiting of the backend system applies to all non-production environments. The production environment, however, does NOT have any rate limiting.

What is the most effective approach to conduct performance tests of the API implementation in a staging (non-production) environment?

Options:

A.  

Create a mocking service that replicates the backend system's production performance characteristics. Then configure the API implementation to use the mocking service and conduct the performance tests

B.  

Use MUnit to simulate standard responses from the backend system then conduct performance tests to identify other bottlenecks in the system

C.  

Include logic within the API implementation that bypasses invocations of the backend system in a performance test situation. Instead invoking local stubs that replicate typical backend system responses then conduct performance tests using this API Implementation

D.  

Conduct scaled-down performance tests in the staging environment against the rate limited backend system then upscale performance results to full production scale

Discussion 0
Questions 8

An organization's security policies mandate complete control of the login credentials used to log in to Anypoint Platform. What feature of Anypoint Platform should be used to meet this requirement?

Options:

A.  

Enterprise Security Module

B.  

Client ID Secret

C.  

Federated Identity Management

D.  

Federated Client Management

Discussion 0
Questions 9

An organization is not meeting its growth and innovation objectives because IT cannot deliver projects last enough to keep up with the pace of change required by the business.

According to MuleSoft’s IT delivery and operating model, which step should the organization lake to solve this problem?

Options:

A.  

Modify IT governance and security controls so that line of business developers can have direct access to the organization's systems of record

B.  

Switch from a design-first to a code-first approach for IT development

C.  

Adopt a new approach that decouples core IT projects from the innovation that happens within each line of business

D.  

Hire more |T developers, architects, and project managers to increase IT delivery

Discussion 0
Questions 10

An organization uses a set of customer-hosted Mule runtimes that are managed using the Mulesoft-hosted control plane. What is a condition that can be alerted on from Anypoint Runtime Manager without any custom components or custom coding?

Options:

A.  

When a Mule runtime on a given customer-hosted server is experiencing high memory consumption during certain periods

B.  

When an SSL certificate used by one of the deployed Mule applications is about to expire

C.  

When the Mute runtime license installed on a Mule runtime is about to expire

D.  

When a Mule runtime's customer-hosted server is about to run out of disk space

Discussion 0
Questions 11

A company is designing a mule application to consume batch data from a partner's ftps server The data files have been compressed and then digitally signed using PGP.

What inputs are required for the application to securely consumed these files?

Options:

A.  

ATLS context Key Store requiring the private key and certificate for the company

PGP public key of partner

PGP private key for the company

B.  

ATLS context first store containing a public certificate for partner ftps server and the PGP public key of the partner

TLS contact Key Store containing the FTP credentials

C.  

TLS context trust or containing a public certificate for the ftps server The FTP username and password The PGP public key of the partner

D.  

The PGP public key of the partner

The PGP private key for the company

The FTP username and password

Discussion 0
Questions 12

What is a key difference between synchronous and asynchronous logging from Mule applications?

Options:

A.  

Synchronous logging writes log messages in a single logging thread but does not block the Mule event being processed by the next event processor

B.  

Asynchronous logging can improve Mule event processing throughput while also reducing the processing time for each Mule event

C.  

Asynchronous logging produces more reliable audit trails with more accurate timestamps

D.  

Synchronous logging within an ongoing transaction writes log messages in the same thread that processes the current Mule event

Discussion 0
Questions 13

In preparation for a digital transformation initiative, an organization is reviewing related IT integration projects that failed for various for reason.

According to MuleSoft’s surveys of global IT leaders, what is a common cause of IT project failure that this organization may likely discover in its assessment?

Options:

A.  

Following an Agile delivery methodology

B.  

Reliance on an Integration-Platform-as-a-Service (iPaaS)

C.  

Spending too much time on enablement

D.  

Lack of alignment around business outcomes

Discussion 0
Questions 14

Refer to the exhibit.

A Mule application is being designed to be deployed to several CIoudHub workers. The Mule application's integration logic is to replicate changed Accounts from Satesforce to a backend system every 5 minutes.

A watermark will be used to only retrieve those Satesforce Accounts that have been modified since the last time the integration logic ran.

What is the most appropriate way to implement persistence for the watermark in order to support the required data replication integration logic?

Options:

A.  

Persistent Anypoint MQ Queue

B.  

Persistent Object Store

C.  

Persistent Cache Scope

D.  

Persistent VM Queue

Discussion 0
Questions 15

Which Anypoint Platform component should a MuleSoft developer use to create an API specification prior to building the API implementation?

Options:

A.  

MUnit

B.  

API Designer

C.  

API Manager

D.  

Runtime Manager

Discussion 0
Questions 16

An Order microservice and a Fulfillment microservice are being designed to communicate with their dients through message-based integration (and NOT through API invocations).

The Order microservice publishes an Order message (a kind of command message) containing the details of an order to be fulfilled. The intention is that Order messages are only consumed by one Mute application, the Fulfillment microservice.

The Fulfilment microservice consumes Order messages, fulfills the order described therein, and then publishes an OrderFulfilted message (a kind of event message). Each OrderFulfilted message can be consumed by any interested Mule application, and the Order microservice is one such Mute application.

What is the most appropriate choice of message broker(s) and message destination(s) in this scenario?

Options:

A.  

Order messages are sent to an Anypoint MQ exchange OrderFulfilled messages are sent to an Anypoint MQ queue Both microservices interact with Anypoint MQ as the message broker, which must therefore scale to support the load of both microservices

B.  

Order messages are sent to a JMS queue. OrderFulfilled messages are sent to a JMS topic Both microservices interact with the same JMS provider (message broker) instance, which must therefore scale to support the load of both microservices

C.  

Order messages are sent directly to the Fulfillment microservices. OrderFulfilled messages are sent directly to the Order microservice The Order microservice interacts with one AMQP-compatible message broker and the Fulfillment microservice interacts with a different AMQP-compatible message broker, so that both message brokers can be chosen and scaled to best support the load of each microservice

D.  

Order messages are sent to a JMS queue. OrderFulfilled messages are sent to a JMS topic The Order microservice interacts with one JMS provider (message broker) and the Fulfillment microservice interacts with a different JMS provider, so that both message brokers can be chosen and scaled to best support the load of each microservice

Discussion 0
Questions 17

An API client makes an HTTP request to an API gateway with an Accept header containing the value’’ application’’.

What is a valid HTTP response payload for this request in the client requested data format?

Options:

A.  

healthy

B.  

{"status" "healthy"}

C.  

status(‘healthy")

D.  

status: healthy

Discussion 0
Questions 18

In Anypoint Platform, a company wants to configure multiple identity providers(Idps) for various lines of business (LOBs) Multiple business groups and environments have been defined for the these LOBs. What Anypoint Platform feature can use multiple Idps access the company’s business groups and environment?

Options:

A.  

User management

B.  

Roles and permissions

C.  

Dedicated load balancers

D.  

Client Management

Discussion 0
Questions 19

Organization wants to achieve high availability goal for Mule applications in customer hosted runtime plane. Due to the complexity involved, data cannot be shared among of different instances of same Mule application. What option best suits to this requirement considering high availability is very much critical to the organization?

Options:

A.  

The cluster can be configured

B.  

Use third party product to implement load balancer

C.  

High availability can be achieved only in CloudHub

D.  

Use persistent object store

Discussion 0
Questions 20

An organization is designing the following two Mule applications that must share data via a common persistent object store instance:

- Mule application P will be deployed within their on-premises datacenter.

- Mule application C will run on CloudHub in an Anypoint VPC.

The object store implementation used by CloudHub is the Anypoint Object Store v2 (OSv2).

what type of object store(s) should be used, and what design gives both Mule applications access to the same object store instance?

Options:

A.  

Application P uses the Object Store connector to access a persistent object store Application C accesses this persistent object store via the Object Store REST API through an IPsec tunnel

B.  

Application C and P both use the Object Store connector to access the Anypoint Object Store v2

C.  

Application C uses the Object Store connector to access a persistent object Application P accesses the persistent object store via the Object Store REST API

D.  

Application C and P both use the Object Store connector to access a persistent object store

Discussion 0
Questions 21

The implementation of a Process API must change. What is a valid approach that minimizes the impact of this change on API clients?

Options:

A.  

Implement required changes to the Process API implementation so that whenever possible, the Process API's RAML definition remains unchanged

B.  

Update the RAML definition of the current Process API and notify API client developers by sending them links to the updated RAML definition

C.  

Postpone changes until API consumers acknowledge they are ready to migrate to a new Process API or API version

D.  

Implement the Process API changes in a new API implementation, and have the old API implementation return an HTTP status code 301 - Moved Permanently to inform API clients they should be calling the new API implementation

Discussion 0
Questions 22

An organization has implemented a continuous integration (CI) lifecycle that promotes Mule applications through code, build, and test stages. To standardize the organization's CI journey, a new dependency control approach is being designed to store artifacts that include information such as dependencies, versioning, and build promotions.

To implement these process improvements, the organization will now require developers to maintain all dependencies related to Mule application code in a shared location.

What is the most idiomatic (used for its intended purpose) type of system the organization should use in a shared location to standardize all dependencies related to Mule application code?

Options:

A.  

A MuleSoft-managed repository at repository.mulesoft.org

B.  

A binary artifact repository

C.  

API Community Manager

D.  

The Anypoint Object Store service at cloudhub.io

Discussion 0
Questions 23

A company is planning to migrate its deployment environment from on-premises cluster to a Runtime Fabric (RTF) cluster. It also has a requirement to enable Mule applications deployed to a Mule runtime instance to store and share data across application replicas and restarts.

How can these requirements be met?

Options:

A.  

Anypoint object store V2 to share data between replicas in the RTF cluster

B.  

Install the object store pod on one of the cluster nodes

C.  

Configure Persistence Gateway in any of the servers using Mule Object Store

D.  

Configure Persistent Gateway at the RTF

Discussion 0
Questions 24

A leading e-commerce giant will use Mulesoft API's on runtime fabric (RTF) to process customer orders. Some customer's sensitive information such as credit card information is also there as a part of a API payload.

What approach minimizes the risk of matching sensitive data to the original and can convert back to the original value whenever and wherever required?

Options:

A.  

Apply masking to hide the sensitive information and then use API

B.  

manager to detokenize the masking format to return the original value

C.  

create a tokenization format and apply a tokenization policy to the API Gateway

D.  

Used both masking and tokenization

E.  

Apply a field level encryption policy in the API Gateway

Discussion 0
Questions 25

What is an advantage of using OAuth 2.0 client credentials and access tokens over only API keys for API authentication?

Options:

A.  

If the access token is compromised, the client credentials do not to be reissued.

B.  

If the access token is compromised, I can be exchanged for an API key.

C.  

If the client ID is compromised, it can be exchanged for an API key

D.  

If the client secret is compromised, the client credentials do not have to be reissued.

Discussion 0
Questions 26

Refer to the exhibit.

An organization deploys multiple Mule applications to the same customer -hosted Mule runtime. Many of these Mule applications must expose an HTTPS endpoint on the same port using a server-side certificate that rotates often.

What is the most effective way to package the HTTP Listener and package or store the server-side certificate when deploying these Mule applications, so the disruption caused by certificate rotation is minimized?

Options:

A.  

Package the HTTPS Listener configuration in a Mule DOMAIN project, referencing it from all Mule applications that need to expose an HTTPS endpoint Package the server-side certificate in ALL Mule APPLICATIONS that need to expose an HTTPS endpoint

B.  

Package the HTTPS Listener configuration in a Mule DOMAIN project, referencing it from all Mule applications that need to expose an HTTPS endpoint. Store the server-side certificate in a shared filesystem location in the Mule runtime's classpath, OUTSIDE the Mule DOMAIN or any Mule APPLICATION

C.  

Package an HTTPS Listener configuration In all Mule APPLICATIONS that need to expose an HTTPS endpoint Package the server-side certificate in a NEW Mule DOMAIN project

D.  

Package the HTTPS Listener configuration in a Mule DOMAIN project, referencing It from all Mule applications that need to expose an HTTPS endpoint. Package the server-side certificate in the SAME Mule DOMAIN project Go to Set

Discussion 0
Questions 27

An integration Mute application is being designed to process orders by submitting them to a backend system for offline processing. Each order will be received by the Mute application through an HTTPS POST and must be acknowledged immediately. Once acknowledged, the order will be submitted to a backend system. Orders that cannot be successfully submitted due to rejections from the backend system will need to be processed manually (outside the backend system).

The Mule application will be deployed to a customer-hosted runtime and is able to use an existing ActiveMQ broker if needed.

The backend system has a track record of unreliability both due to minor network connectivity issues and longer outages.

What idiomatic (used for their intended purposes) combination of Mule application components and ActiveMQ queues are required to ensure automatic submission of orders to the backend system, while minimizing manual order processing?

Options:

A.  

An On Error scope Non-persistent VM ActiveMQ Dead Letter Queue for manual processing

B.  

An On Error scope MuleSoft Object Store ActiveMQ Dead Letter Queue for manual processing

C.  

Until Successful component MuleSoft Object Store ActiveMQ is NOT needed or used

D.  

Until Successful component ActiveMQ long retry Queue ActiveMQ Dead Letter Queue for manual processing

Discussion 0
Questions 28

What is a core pillar of the MuleSoft Catalyst delivery approach?

Options:

A.  

Business outcomes

B.  

Technology centralization

C.  

Process thinking

D.  

Scope reduction

Discussion 0
Questions 29

In a Mule Application, a flow contains two (2) JMS consume operations that are used to connect to a JMS broker and consume messages from two(2) JMS destination. The Mule application then joins the two JMS messages together.

The JMS broker does not implement high availability (HA) and periodically experiences scheduled outages of upto 10 mins for routine maintenance.

What is the most idiomatic (used for its intented purpose) way to build the mule flow so it can best recover from the expected outages?

Options:

A.  

Configure a reconnection strategy for the JMS connector

B.  

Enclose the two(2) JMS operation in an Until Successful scope

C.  

Consider a transaction for the JMS connector

D.  

Enclose the two(2) JMS operations in a Try scope with an Error Continue error handler

Discussion 0
Questions 30

What is an example of data confidentiality?

Options:

A.  

Signing a file digitally and sending it using a file transfer mechanism

B.  

Encrypting a file containing personally identifiable information (PV)

C.  

Providing a server's private key to a client for secure decryption of data during a two-way SSL handshake

D.  

De-masking a person's Social Security number while inserting it into a database

Discussion 0
Questions 31

A Mule application is running on a customer-hosted Mule runtime in an organization's network. The Mule application acts as a producer of asynchronous Mule events. Each Mule event must be broadcast to all interested external consumers outside the Mule application. The Mule events should be published in a way that is guaranteed in normal situations and also minimizes duplicate delivery in less frequent failure scenarios.

The organizational firewall is configured to only allow outbound traffic on ports 80 and 443. Some external event consumers are within the organizational network, while others are located outside the firewall.

What Anypoint Platform service is most idiomatic (used for its intended purpose) for publishing these Mule events to all external consumers while addressing the desired reliability goals?

Options:

A.  

CloudHub VM queues

B.  

Anypoint MQ

C.  

Anypoint Exchange

D.  

CloudHub Shared Load Balancer

Discussion 0
Questions 32

A Mule application is being designed for deployment to a single CloudHub worker. The Mule application will have a flow that connects to a SaaS system to perform some operations each time the flow is invoked.

The SaaS system connector has operations that can be configured to request a short-lived token (fifteen minutes) that can be reused for subsequent connections within the fifteen minute time window. After the token expires, a new token must be requested and stored.

What is the most performant and idiomatic (used for its intended purpose) Anypoint Platform component or service to use to support persisting and reusing tokens in the Mule application to help speed up reconnecting the Mule application to the SaaS application?

Options:

A.  

Nonpersistent object store

B.  

Persistent object store

C.  

Variable

D.  

Database

Discussion 0
Questions 33

An API has been unit tested and is ready for integration testing. The API is governed by a Client ID Enforcement policy in all environments.

What must the testing team do before they can start integration testing the API in the Staging environment?

Options:

A.  

They must access the API portal and create an API notebook using the Client ID and Client Secret supplied by the API portal in the Staging environment

B.  

They must request access to the API instance in the Staging environment and obtain a Client ID and Client Secret to be used for testing the API

C.  

They must be assigned as an API version owner of the API in the Staging environment

D.  

They must request access to the Staging environment and obtain the Client ID and Client Secret for that environment to be used for testing the API

Discussion 0
Questions 34

An organization uses Mule runtimes which are managed by Anypoint Platform - Private Cloud Edition. What MuleSoft component is responsible for feeding analytics data to non-MuleSoft analytics platforms?

Options:

A.  

Anypoint Exchange

B.  

The Mule runtimes

C.  

Anypoint API Manager

D.  

Anypoint Runtime Manager

Discussion 0
Questions 35

As a part of business requirement , old CRM system needs to be integrated using Mule application. CRM system is capable of exchanging data only via SOAP/HTTP protocol. As an integration architect who follows API led approach , what is the the below step you will perform so that you can share document with CRM team?

Options:

A.  

Create RAML specification using Design Center

B.  

Create SOAP API specification using Design Center

C.  

Create WSDL specification using text editor

D.  

Create WSDL specification using Design Center

Discussion 0