Big Cyber Monday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Salesforce Certified MuleSoft Platform Integration Architect (Mule-Arch-202) Question and Answers

Salesforce Certified MuleSoft Platform Integration Architect (Mule-Arch-202)

Last Update Dec 7, 2025
Total Questions : 273

We are offering FREE MuleSoft-Integration-Architect-I Salesforce exam questions. All you do is to just go and sign up. Give your details, prepare MuleSoft-Integration-Architect-I free exam questions and then go for complete pool of Salesforce Certified MuleSoft Platform Integration Architect (Mule-Arch-202) test questions that will help you more.

MuleSoft-Integration-Architect-I pdf

MuleSoft-Integration-Architect-I PDF

$36.75  $104.99
MuleSoft-Integration-Architect-I Engine

MuleSoft-Integration-Architect-I Testing Engine

$43.75  $124.99
MuleSoft-Integration-Architect-I PDF + Engine

MuleSoft-Integration-Architect-I PDF + Testing Engine

$57.75  $164.99
Questions 1

A project uses Jenkins to implement CI/CD process. It was observed that each Mule package contains some of the Jenkins files and folders for configurations of CI/CD jobs.

As these files and folders are not part of the actual package, expectation is that these should not be part of deployed archive.

Which file can be used to exclude these files and folders from the deployed archive?

Options:

A.  

muleignore

B.  

_unTrackMule

C.  

mulelnclude

D.  

_muleExclude

Discussion 0
Questions 2

Which role is primarily responsible for building API implementation as part of a typical MuleSoft integration project?

Options:

A.  

API Developer

B.  

API Designer

C.  

Integration Architect

D.  

Operations

Discussion 0
Questions 3

An API client is implemented as a Mule application that includes an HTTP Request operation using a default configuration. The HTTP Request operation invokes an external API that follows standard HTTP status code conventions, which causes the HTTP Request operation to return a 4xx status code.

What is a possible cause of this status code response?

Options:

A.  

An error occurred inside the external API implementation when processing the HTTP request that was received from the outbound HTTP Request operation of the Mule application

B.  

The external API reported that the API implementation has moved to a different external endpoint

C.  

The HTTP response cannot be interpreted by the HTTP Request operation of the Mule application after it was received from the external API

D.  

The external API reported an error with the HTTP request that was received from the outbound HTTP Request operation of the Mule application

Discussion 0
Questions 4

As a part of project requirement, client will send a stream of data to mule application. Payload size can vary between 10mb to 5GB. Mule application is required to transform the data and send across multiple sftp servers. Due to the cost cuttings in the organization, mule application can only be allocated one worker with size of 0.2 vCore.

As an integration architect , which streaming strategy you would suggest to handle this scenario?

Options:

A.  

In-memory non repeatable stream

B.  

File based non-repeatable stream

C.  

In-memory repeatable stream

D.  

File based repeatable storage

Discussion 0
Questions 5

An organization is designing an integration Mule application to process orders by submitting them to a back-end system for offline processing. Each order will be received by the Mule application through an HTTPS POST and must be acknowledged immediately. Once acknowledged, the order will be submitted to a back-end system. Orders that cannot be successfully submitted due to rejections from the back-end system will need to be processed manually (outside the back-end system).

The Mule application will be deployed to a customer-hosted runtime and is able to use an existing ActiveMQ broker if needed. The ActiveMQ broker is located inside the organization’s firewall. The back-end system has a track record of unreliability due to both minor network connectivity issues and longer outages.

What idiomatic (used for their intended purposes) combination of Mule application components and ActiveMQ queues are required to ensure automatic submission of orders to the back-end system while supporting but minimizing manual order processing?

Options:

A.  

An Until Successful scope to call the back-end systemOne or more ActiveMQ long-retry queuesOne or more ActiveMQ dead-letter queues for manual processing

B.  

One or more On Error scopes to assist calling the back-end systemAn Until Successful scope containing VM components for long retriesA persistent dead-letter VM queue configured in CloudHub

C.  

One or more On Error scopes to assist calling the back-end systemOne or more ActiveMQ long-retry queuesA persistent dead-letter object store configured in the CloudHub Object Store service

D.  

A Batch Job scope to call the back-end systemAn Until Successful scope containing Object Store components for long retriesA dead-letter object store configured in the Mule application

Discussion 0
Questions 6

Refer to the exhibit.

A Mule application is deployed to a cluster of two customer-hosted Mute runtimes. The Mute application has a flow that polls a database and another flow with an HTTP Listener.

HTTP clients send HTTP requests directly to individual cluster nodes.

What happens to database polling and HTTP request handling in the time after the primary (master) node of the cluster has railed, but before that node is restarted?

Options:

A.  

Database polling continues Only HTTP requests sent to the remaining node continue to be accepted

B.  

Database polling stops All HTTP requests continue to be accepted

C.  

Database polling continues All HTTP requests continue to be accepted, but requests to the failed node Incur increased latency

D.  

Database polling stops All HTTP requests are rejected

Discussion 0
Questions 7

Refer to the exhibit.

One of the backend systems invoked by an API implementation enforces rate limits on the number of requests a particular client can make. Both the backend system and the API implementation are deployed to several non-production environments in addition to production.

Rate limiting of the backend system applies to all non-production environments. The production environment, however, does NOT have any rate limiting.

What is the most effective approach to conduct performance tests of the API implementation in a staging (non-production) environment?

Options:

A.  

Create a mocking service that replicates the backend system's production performance characteristics. Then configure the API implementation to use the mocking service and conduct the performance tests

B.  

Use MUnit to simulate standard responses from the backend system then conduct performance tests to identify other bottlenecks in the system

C.  

Include logic within the API implementation that bypasses invocations of the backend system in a performance test situation. Instead invoking local stubs that replicate typical backend system responses then conduct performance tests using this API Implementation

D.  

Conduct scaled-down performance tests in the staging environment against the rate limited backend system then upscale performance results to full production scale

Discussion 0
Questions 8

An organization is evaluating using the CloudHub shared Load Balancer (SLB) vs creating a CloudHub dedicated load balancer (DLB). They are evaluating how this choice affects the various types of certificates used by CloudHub deployed Mule applications, including MuleSoft-provided, customer-provided, or Mule application-provided certificates. What type of restrictions exist on the types of certificates for the service that can be exposed by the CloudHub Shared Load Balancer (SLB) to external web clients over the public internet?

Options:

A.  

Underlying Mule applications need to implement own certificates

B.  

Only MuleSoft provided certificates can be used for server side certificate

C.  

Only self signed certificates can be used

D.  

All certificates which can be used in shared load balancer need to get approved by raising support ticket

Discussion 0
Questions 9

A large life sciences customer plans to use the Mule Tracing module with the Mapped Diagnostic Context (MDC) logging operations to enrich logging in its Mule application and to improve tracking by providing more context in the Mule application logs. The customer also wants to improve throughput and lower the message processing latency in its Mule application flows.

After installing the Mule Tracing module in the Mule application, how should logging be performed in flows in Mule applications, and what should be changed In the log4j2.xml files?

Options:

A.  

In the flows, add Mule Tracing module Set logging variable operations before any Core Logger components.In log4j2.xml files, change the appender's pattern layout to use %MDC and then assign the appender to a Logger or Root element.

B.  

In the flows, add Mule Tracing module Set logging variable operations before any CoreLogger components.In log4j2.xmI files, change the appender’s pattern layout to use the %MDC placeholder and then assign the appender to an AsyncLogger element.

C.  

In the flows, add Mule Tracing module Set logging variable operations before any CoreLogger components.In log4j2.xmI files, change the appender’'s pattern layout to use %asyncLogger placeholder and then assign the appender to an AsyncLogger element.

D.  

In the flows, wrap Logger components in Async scopes. In log4j2.xmI files, change the appender's pattern layout to use the %asyncLoggerplaceholder and then assign the appender to a Logger or Root element.

Discussion 0
Questions 10

According to the Internet Engineering Task Force (IETF), which supporting protocol does File Transfer Protocol (FTP) use for reliable communication?

Options:

A.  

A Secure Sockets Layer (SSL)

B.  

B Transmission Control Protocol (TCP)

C.  

Lightweight Directory Access Protocol (LDAP)

D.  

Hypertext Transfer Protocol (HTTP)

Discussion 0
Questions 11

Refer to the exhibit.

Anypoint Platform supports role-based access control (RBAC) to features of the platform. An organization has configured an external Identity Provider for identity management with Anypoint Platform.

What aspects of RBAC must ALWAYS be controlled from the Anypoint Platform control plane and CANNOT be controlled via the external Identity Provider?

Options:

A.  

Controlling the business group within Anypoint Platform to which the user belongs

B.  

Assigning Anypoint Platform permissions to a role

C.  

Assigning Anypoint Platform role(s) to a user

D.  

Removing a user's access to Anypoint Platform when they no longer work for the organization

Discussion 0
Questions 12

A retail company is implementing a MuleSoft API to get inventory details from two vendors by Invoking each vendor's online applications. Due to network issues, the invocations to the vendor applications are timing out intermittently, but the requests are successful after re-invoking each

vendor application.

What is the most performant way of implementing the API to invoke each vendor application and to retry invocations that generate timeout errors?

Options:

A.  

Use a For-Each scope to invoke the two vendor applications in series, one after the other.Place the For-Each scope inside an Until-Successful scope to retry requests that raise timeout errors.

B.  

Use a Choice scope to Invoke each vendor application on a separate route.Place the Choice scope inside an Until-Successful scope to retry requests that raisetimeout errors.

C.  

Use a Scatter-Gather scope to invoke each vendor application on a separate route.Use an Until-Successful scope in each route to retry requests that raise timeout errors.

D.  

Use a Round-Robin scope to invoke each vendor application on a separate route.Use a Try-Catch scope in each route to retry requests that raise timeout errors.

Discussion 0
Questions 13

An organization has several APIs that accept JSON data over HTTP POST. The APIs are all publicly available and are associated with several mobile applications and web applications. The organization does NOT want to use any authentication or compliance policies for these APIs, but at the same time, is worried that some bad actor could send payloads that could somehow compromise the applications or servers running the API implementations. What out-of-the-box Anypoint Platform policy can address exposure to this threat?

Options:

A.  

Apply a Header injection and removal policy that detects the malicious data before it is used

B.  

Apply an IP blacklist policy to all APIs; the blacklist will Include all bad actors

C.  

Shut out bad actors by using HTTPS mutual authentication for all API invocations

D.  

Apply a JSON threat protection policy to all APIs to detect potential threat vectors

Discussion 0
Questions 14

Which Mulesoft feature helps users to delegate their access without sharing sensitive credentials or giving full control of accounts to 3rd parties?

Options:

A.  

Secure Scheme

B.  

client id enforcement policy

C.  

Connected apps

D.  

Certificates

Discussion 0
Questions 15

Refer to the exhibit.

A business process involves two APIs that interact with each other asynchronously over HTTP. Each API is implemented as a Mule application. API 1 receives the initial HTTP request and invokes API 2 (in a fire and forget fashion) while API 2, upon completion of the processing, calls back into API l to notify about completion of the asynchronous process.

Each API Is deployed to multiple redundant Mule runtimes and a separate load balancer, and is deployed to a separate network zone.

In the network architecture, how must the firewall rules be configured to enable the above Interaction between API 1 and API 2?

Options:

A.  

To authorize the certificate to be used both APIs

B.  

To enable communication from each API’s Mule Runtimes and Network zone to the load balancer of the other API

C.  

To open direct two-way communication between the Mule Runtimes of both API’s

D.  

To allow communication between load balancers used by each API

Discussion 0
Questions 16

A stock broking company makes use of CloudHub VPC to deploy Mule applications. Mule application needs to connect to a database application in the customers on-premises corporate data center and also to a Kafka cluster running in AWS VPC.

How is access enabled for the API to connect to the database application and Kafka cluster securely?

Options:

A.  

Set up a transit gateway to the customers on-premises corporate datacenter to AWS VPC

B.  

Setup AnyPoint VPN to the customer's on-premise corporate datacenter and VPC peering with AWS VPC

C.  

Setup VPC peering with AWS VPC and the customers devices corporate data center

D.  

Setup VPC peering with the customers onto my service corporate data center and Anypoint VPN to AWS VPC

Discussion 0
Questions 17

Which of the below requirements prevent the usage of Anypoint MQ in a company's network? (Choose two answers)

Options:

A.  

single message payload can be up to 15 MB

B.  

payloads must be encrypted

C.  

the message broker must be hosted on premises

D.  

support for point-to-point messaging

E.  

ability for a third party outside the company's network to consume events from the queue

Discussion 0
Questions 18

Following MuleSoft best practices, what MuleSoft runtime deployment option best meets the company's goals to begin its digital transformation journey?

Options:

A.  

Runtime Fabric on VMs/bare metal

B.  

CloudHub runtimes

C.  

Customer-hosted runtimes provisioned by a MuleSoft services partner

D.  

Customer-hosted self-provisioned runtimes

Discussion 0
Questions 19

How are the API implementation , API client, and API consumer combined to invoke and process an API ?

Options:

A.  

The API consumer creates an API implementation , which receives API invocations from an API such that they are processed for an API client

B.  

The API consumer creates an API client which sends API invocations to an API such that they are processed by an API implementation

C.  

An API client creates an API consumer, which receives API invocation from an API such that they are processed for an API implementation

D.  

The API client creates an API consumer which sends API invocations to an API such that they are processed by API implementation

Discussion 0
Questions 20

An organization's IT team follows an API-led connectivity approach and must use Anypoint Platform to implement a System AP\ that securely accesses customer data. The organization uses Salesforce as the system of record for all customer data, and its most important objective is to reduce the overall development time to release the System API.

The team's integration architect has identified four different approaches to access the customer data from within the implementation of the System API by using different Anypoint Connectors that all meet the technical requirements of the project.

Options:

A.  

Use the Anypoint Connector for Database to connect to a MySQL database to access a copy of the customer data

B.  

Use the Anypoint Connector for HTTP to connect to the Salesforce APIs to directly access the customer data

C.  

Use the Anypoint Connector for Salesforce to connect to the Salesforce APIs to directly access the customer data

D.  

Use the Anypoint Connector tor FTP to download a file containing a recent near-real time extract of the customer data

Discussion 0
Questions 21

Additional nodes are being added to an existing customer-hosted Mule runtime cluster to improve performance. Mule applications deployed to this cluster are invoked by API clients through a load balancer.

What is also required to carry out this change?

Options:

A.  

A new load balancer must be provisioned to allow traffic to the new nodes in a round-robin fashion

B.  

External monitoring tools or log aggregators must be configured to recognize the new nodes

C.  

API implementations using an object store must be adjusted to recognize the new nodes and persist to them

D.  

New firewall rules must be configured to accommodate communication between API clients and the new nodes

Discussion 0
Questions 22

An organization needs to enable access to their customer data from both a mobile app and a web application, which each need access to common fields as well as certain unique fields. The data is available partially in a database and partially in a 3rd-party CRM system. What APIs should be created to best fit these design requirements?

Options:

A.  

A Process API that contains the data required by both the web and mobile apps, allowing these applications to invoke it directly and access the data they need thereby providing the flexibility to add more fields in the future without needing API changes.

B.  

One set of APIs (Experience API, Process API, and System API) for the web app, and another set for the mobile app.

C.  

Separate Experience APIs for the mobile and web app, but a common Process API that invokes separate System APIs created for the database and CRM system

D.  

A common Experience API used by both the web and mobile apps, but separate Process APIs for the web and mobile apps that interact with the database and the CRM System.

Discussion 0
Questions 23

Organization wants to achieve high availability goal for Mule applications in customer hosted runtime plane. Due to the complexity involved, data cannot be shared among of different instances of same Mule application. What option best suits to this requirement considering high availability is very much critical to the organization?

Options:

A.  

The cluster can be configured

B.  

Use third party product to implement load balancer

C.  

High availability can be achieved only in CloudHub

D.  

Use persistent object store

Discussion 0
Questions 24

An organization is successfully using API led connectivity, however, as the application network grows, all the manually performed tasks to publish share and discover, register, apply policies to, and deploy an API are becoming repetitive pictures driving the organization to automate this process using efficient CI/'CD pipeline. Considering Anypoint platforms capabilities how should the organization approach automating is API lifecycle?

Options:

A.  

Use runtime manager rest apis for API management and mavenforAPI deployment

B.  

Use Maven with a custom configuration required for the API lifecycle

C.  

Use Anypoint CLI or Anypoint Platform REST apis with scripting language such as groovy

D.  

Use Exchange rest api's for API management and MavenforAPI deployment

Discussion 0
Questions 25

According to MuleSoft, what is a major distinguishing characteristic of an application network in relation to the integration of systems, data, and devices?

Options:

A.  

It uses a well-organized monolithic approach with standards

B.  

It is built for change and self-service

C.  

It leverages well-accepted internet standards like HTTP and JSON

D.  

It uses CI/CD automation for real-time project delivery

Discussion 0
Questions 26

The implementation of a Process API must change. What is a valid approach that minimizes the impact of this change on API clients?

Options:

A.  

Implement required changes to the Process API implementation so that whenever possible, the Process API's RAML definition remains unchanged

B.  

Update the RAML definition of the current Process API and notify API client developers by sending them links to the updated RAML definition

C.  

Postpone changes until API consumers acknowledge they are ready to migrate to a new Process API or API version

D.  

Implement the Process API changes in a new API implementation, and have the old API implementation return an HTTP status code 301 - Moved Permanently to inform API clients they should be calling the new API implementation

Discussion 0
Questions 27

An organization's security policies mandate complete control of the login credentials used to log in to Anypoint Platform. What feature of Anypoint Platform should be used to meet this requirement?

Options:

A.  

Enterprise Security Module

B.  

Client ID Secret

C.  

Federated Identity Management

D.  

Federated Client Management

Discussion 0
Questions 28

According to MuleSoft, what Action should an IT organization take regarding its technology assets in order to close the IT delivery.

Options:

A.  

Make assets easily discoverable via a central repository

B.  

Focus project delivery efforts on custom assets that meet the specific requirements of each individual line of business

C.  

Create weekly meetings that all members of IT attend to present justification and request approval to use existing assets

D.  

Hire additional staff to meet the demand for asset creation required for approved projects and timelines

Discussion 0
Questions 29

An organization has deployed runtime fabric on an eight note cluster with performance profile. An API uses and non persistent object store for maintaining some of its state data. What will be the impact to the stale data if server crashes?

Options:

A.  

State data is preserved

B.  

State data is rolled back to a previously saved version

C.  

State data is lost

D.  

State data is preserved as long as more than one more is unaffected by the crash

Discussion 0
Questions 30

An organization will deploy Mule applications to Cloudhub, Business requirements mandate that all application logs be stored ONLY in an external splunk consolidated logging service and NOT in Cloudhub.

In order to most easily store Mule application logs ONLY in Splunk, how must Mule application logging be configured in Runtime Manager, and where should the log4j2 splunk appender be defined?

Options:

A.  

Keep the default logging configuration in RuntimeManagerDefine the splunk appender in ONE global log4j.xml file that is uploaded once to Runtime Manager to support at Mule application deployments.

B.  

Disable Cloudhub logging in Runtime ManagerDefine the splunk appender in EACH Mule application’s log4j2.xml file

C.  

Disable Cloudhub logging in Runtime ManagerDefine the splunk appender in ONE global log4j.xml file that is uploaded once to Runtime Manger to support at Mule application deployments.

D.  

Keep the default logging configuration in Runtime ManagerDefine the Splunk appender in EACH Mule application log4j2.xml file

Discussion 0
Questions 31

How does timeout attribute help inform design decisions while using JMS connector listening for incoming messages in an extended architecture (XA) transaction?

Options:

A.  

After the timeout is exceeded, stale JMS consumer threads are destroyed and new threads are created

B.  

The timeout specifies the time allowed to pass between receiving JMS messages on the same JMS connection and then after the timeout new JMS connection is established

C.  

The time allowed to pass between committing the transaction and the completion of the mule flow and then after the timeout flow processing triggers an error

D.  

The timeout defines the time that is allowed to pass without the transaction ending explicitly and after the timeout expires, the transaction rolls back

Discussion 0
Questions 32

An Organization has previously provisioned its own AWS VPC hosting various servers. The organization now needs to use Cloudhub to host a Mule application that will implement a REST API once deployed to Cloudhub, this Mule application must be able to communicate securely with the customer-provisioned AWS VPC resources within the same region, without being interceptable on the public internet.

What Anypoint Platform features should be used to meet these network communication requirements between Cloudhub and the existing customer-provisioned AWS VPC?

Options:

A.  

Add a Mulesoft hosted Anypoint VPC configured and with VPC Peering to the AWS VPC

B.  

Configure an external identity provider (IDP) in Anypoint Platform with certificates from the customer provisioned AWS VPC

C.  

Add a default API Whitelisting policy to API Manager to automatically whitelist the customer provisioned AWS VPC IP ranges needed by the Mule applicaton

D.  

Use VM queues in the Mule application to allow any non-mule assets within the customer provisioned AWS VPC to subscribed to and receive messages

Discussion 0
Questions 33

A corporation has deployed Mule applications to different customer-hosted Mule runtimes. Mule applications deployed to these Mule runtimes are managed by Anypoint Platform.

What needs to be installed or configured (if anything) to monitor these Mule applications from Anypoint Monitoring, and how is monitoring data from each Mule application sent to Anypoint Monitoring?

Options:

A.  

Enable monitoring of individual Mule applications from the Runtime Managerapplication settings.Runtime Manager sends monitoring data to Anypoint Monitoring for each deployed Mule application.

B.  

Install a Runtime Manager agent on each Mule runtime.Each Runtime Manager agent sends monitoring data from the Mule applicationsrunning in its Mule runtime to Runtime Manager, then Runtime Manager sendsmonitoring data to Anypoint Monitoring.

C.  

Leave the out-of-the-box Anypoint Monitoring agent unchanged in its default Muleruntime installation.Each Anypoint Monitoring agent sends monitoring data from the Mule applicationsrunning in its Mule runtime to Runtime Manager, then Runtime Manager sendsmonitoring data to Anypoint Monitoring.

D.  

Install an Anypoint Monitoring agent on each Mule runtime.Each Anypoint Monitoring agent sends monitoring data from the Mule applicationsrunning in its Mule runtime to Anypoint Monitoring.

Discussion 0
Questions 34

A Mule application is being designed for deployment to a single CloudHub worker. The Mule application will have a flow that connects to a SaaS system to perform some operations each time the flow is invoked.

The SaaS system connector has operations that can be configured to request a short-lived token (fifteen minutes) that can be reused for subsequent connections within the fifteen minute time window. After the token expires, a new token must be requested and stored.

What is the most performant and idiomatic (used for its intended purpose) Anypoint Platform component or service to use to support persisting and reusing tokens in the Mule application to help speed up reconnecting the Mule application to the SaaS application?

Options:

A.  

Nonpersistent object store

B.  

Persistent object store

C.  

Variable

D.  

Database

Discussion 0
Questions 35

A company is using Mulesoft to develop API's and deploy them to Cloudhub and on premises targets. Recently it has decided to enable Runtime Fabric deployment option as well and infrastructure is set up for this option.

What can be used to deploy Runtime Fabric?

Options:

A.  

AnypointCLI

B.  

Anypoint platform REST API's

C.  

Directly uploading ajar file from the Runtime manager

D.  

Mule maven plug-in

Discussion 0
Questions 36

What operation can be performed through a JMX agent enabled in a Mule application?

Options:

A.  

View object store entries

B.  

Replay an unsuccessful message

C.  

Set a particular tog4J2 log level to TRACE

D.  

Deploy a Mule application

Discussion 0
Questions 37

An XA transaction Is being configured that involves a JMS connector listening for Incoming JMS messages. What is the meaning of the timeout attribute of the XA transaction, and what happens after the timeout expires?

Options:

A.  

The time that is allowed to pass between committing the transaction and the completion of the Mule flow After the timeout, flow processing triggers an error

B.  

The time that Is allowed to pass between receiving JMS messages on the same JMS connection After the timeout, a new JMS connection Is established

C.  

The time that Is allowed to pass without the transaction being ended explicitly After the timeout, the transaction Is forcefully rolled-back

D.  

The time that Is allowed to pass for state JMS consumer threads to be destroyed After the timeout, a new JMS consumer thread is created

Discussion 0
Questions 38

A Mule application uses APIkit for SOAP to implement a SOAP web service. The Mule application has been deployed to a CloudHub worker in a testing environment.

The integration testing team wants to use a SOAP client to perform Integration testing. To carry out the integration tests, the integration team must obtain the interface definition for the SOAP web service.

What is the most idiomatic (used for its intended purpose) way for the integration testing team to obtain the interface definition for the deployed SOAP web service in order to perform integration testing with the SOAP client?

Options:

A.  

Retrieve the OpenAPI Specification file(s) from API Manager

B.  

Retrieve the WSDL file(s) from the deployed Mule application

C.  

Retrieve the RAML file(s) from the deployed Mule application

D.  

Retrieve the XML file(s) from Runtime Manager

Discussion 0
Questions 39

An application load balancer routes requests to a RESTful web API secured by Anypoint Flex Gateway.

Which protocol is involved in the communication between the load balancer and the Gateway?

Options:

A.  

SFTP

B.  

HTTPS

C.  

LDAP

D.  

SMTP

Discussion 0
Questions 40

When the mule application using VM is deployed to a customer-hosted cluster or multiple cloudhub workers, how are messages consumed by the Mule engine?

Options:

A.  

in non-deterministic way

B.  

by starting an XA transaction for each new message

C.  

in a deterministic way

D.  

the primary only in order to avoid duplicate processing

Discussion 0
Questions 41

A company is implementing a new Mule application that supports a set of critical functions driven by a rest API enabled, claims payment rules engine hosted on oracle ERP. As designed the mule application requires many data transformation operations as it performs its batch processing logic.

The company wants to leverage and reuse as many of its existing java-based capabilities (classes, objects, data model etc.) as possible

What approach should be considered when implementing required data mappings and transformations between Mule application and Oracle ERP in the new Mule application?

Options:

A.  

Create a new metadata RAML classes in Mule from the appropriate Java objects and then perform transformations via Dataweave

B.  

From the mule application, transform via theXSLT model

C.  

Transform by calling any suitable Java class from Dataweave

D.  

Invoke any of the appropriate Java methods directly, create metadata RAML classes and then perform required transformations via Dataweave

Discussion 0
Questions 42

An API has been unit tested and is ready for integration testing. The API is governed by a Client ID Enforcement policy in all environments.

What must the testing team do before they can start integration testing the API in the Staging environment?

Options:

A.  

They must access the API portal and create an API notebook using the Client ID and Client Secret supplied by the API portal in the Staging environment

B.  

They must request access to the API instance in the Staging environment and obtain a Client ID and Client Secret to be used for testing the API

C.  

They must be assigned as an API version owner of the API in the Staging environment

D.  

They must request access to the Staging environment and obtain the Client ID and Client Secret for that environment to be used for testing the API

Discussion 0
Questions 43

A company is designing an integration Mule application to process orders by submitting them to a back-end system for offline processing. Each order will be received by the Mule application through an HTTP5 POST and must be acknowledged immediately.

Once acknowledged the order will be submitted to a back-end system. Orders that cannot be successfully submitted due to the rejections from the back-end system will need to be processed manually (outside the banking system).

The mule application will be deployed to a customer hosted runtime and will be able to use an existing ActiveMQ broker if needed. The ActiveMQ broker is located inside the organization's firewall. The back-end system has a track record of unreliability due to both minor network connectivity issues and longer outages.

Which combination of Mule application components and ActiveMQ queues are required to ensure automatic submission of orders to the back-end system while supporting but minimizing manual order processing?

Options:

A.  

One or more On Error scopes to assist calling the back-end system An Untill successful scope containing VM components for long retries A persistent dead-letter VM queue configure in Cloud hub

B.  

An Until Successful scope to call the back-end system One or more ActiveMQ long-retry queues One or more ActiveMQ dead-letter queues for manual processing

C.  

One or more on-Error scopes to assist calling the back-end system one or more ActiveMQ long-retry queues A persistent dead-letter Object store configuration in the CloudHub object store service

D.  

A batch job scope to call the back in system An Untill successful scope containing Object Store components for long retries. A dead-letter object store configured in the Mule application

Discussion 0
Questions 44

An insurance company has an existing API which is currently used by customers. API is deployed to customer hosted Mule runtime cluster. The load balancer that is used to access any APIs on the mule cluster is only configured to point to applications hosted on the server at port 443.

Mule application team of a company attempted to deploy a second API using port 443 but the application will not start and checking logs shows an error indicating the address is already in use.

Which steps must the organization take to resolve this error and allow customers to access both the API's?

Options:

A.  

Change the base path of the HTTP listener configuration in the second API to a different one from the first API

B.  

Set HTTP listener configuration in both API's to allow for connections from multiple ports

C.  

Move the HTTP listener configurations from the API's and package them in a mule domain project using port 443

D.  

Set the HTTP listener of the second API to use different port than the one used in the first API

Discussion 0
Questions 45

What aspects of a CI/CD pipeline for Mute applications can be automated using MuleSoft-provided Maven plugins?

Options:

A.  

Compile, package, unit test, deploy, create associated API instances in API ManagerB Import from API designer, compile, package, unit test, deploy, publish to Am/point Exchange

B.  

Compile, package, unit test, validate unit test coverage, deploy

C.  

Compile, package, unit test, deploy, integration test

Discussion 0
Questions 46

According to MuleSoft's API development best practices, which type of API development approach starts with writing and approving an API contract?

Options:

A.  

Implement-first

B.  

Catalyst

C.  

Agile

D.  

Design-first

Discussion 0
Questions 47

What limits if a particular Anypoint Platform user can discover an asset in Anypoint Exchange?

Options:

A.  

Design Center and RAML were both used to create the asset

B.  

The existence of a public Anypoint Exchange portal to which the asset has been published

C.  

The type of the asset in Anypoint Exchange

D.  

The business groups to which the user belongs

Discussion 0
Questions 48

What comparison is true about a CloudHub Dedicated Load Balancer (DLB) vs. the CloudHub Shared Load Balancer (SLB)?

Options:

A.  

Only a DLB allows the configuration of a custom TLS server certificate

B.  

Only the SLB can forward HTTP traffic to the VPC-internal ports of the CloudHub workers

C.  

Both a DLB and the SLB allow the configuration of access control via IP whitelists

D.  

Both a DLB and the SLB implement load balancing by sending HTTP requests to workers with the lowest workloads

Discussion 0
Questions 49

A Mule application is being designed To receive nightly a CSV file containing millions of records from an external vendor over SFTP, The records from the file need to be validated, transformed. And then written to a database. Records can be inserted into the database in any order.

In this use case, what combination of Mule components provides the most effective and performant way to write these records to the database?

Options:

A.  

Use a Parallel for Each scope to Insert records one by one into the database

B.  

Use a Scatter-Gather to bulk insert records into the database

C.  

Use a Batch job scope to bulk insert records into the database.

D.  

Use a DataWeave map operation and an Async scope to insert records one by one into the database.

Discussion 0
Questions 50

What metrics about API invocations are available for visualization in custom charts using Anypoint Analytics?

Options:

A.  

Request size, request HTTP verbs, response time

B.  

Request size, number of requests, JDBC Select operation result set size

C.  

Request size, number of requests, response size, response time

D.  

Request size, number of requests, JDBC Select operation response time

Discussion 0
Questions 51

A team has completed the build and test activities for a Mule application that implements a System API for its application network.

Which Anypoint Platform component should the team now use to both deploy and monitor the System AP\ implementation?

Options:

A.  

API Manager

B.  

Design Center

C.  

Anypoint Exchange

D.  

Runtime Manager

Discussion 0
Questions 52

Refer to the exhibit.

A Mule application has an HTTP Listener that accepts HTTP DELETE requests. This Mule application Is deployed to three CloudHub workers under the control of the CloudHub Shared Load Balancer.

A web client makes a sequence of requests to the Mule application's public URL.

How is this sequence of web client requests distributed among the HTTP Listeners running in the three CloudHub workers?

Options:

A.  

Each request is routed to the PRIMARY CloudHub worker in the PRIMARY Availability Zone (AZ)

B.  

Each request is routed to ONE ARBiTRARY CloudHub worker in the PRIMARY Availability Zone (AZ)

C.  

Each request Is routed to ONE ARBiTRARY CloudHub worker out of ALL three CloudHub workers

D.  

Each request is routed (scattered) to ALL three CloudHub workers at the same time

Discussion 0
Questions 53

Which Salesforce API is invoked to deploy, retrieve, create or delete customization information such as custom object definitions using a Mule Salesforce connector in a Mule application?

Options:

A.  

Metadata API

B.  

REST API

C.  

SOAP API

D.  

Bulk API

Discussion 0
Questions 54

A system API EmployeeSAPI is used to fetch employee's data from an underlying SQL database.

The architect must design a caching strategy to query the database only when there is an update to the employees stable or else return a cached response in order to minimize the number of redundant transactions being handled by the database.

What must the architect do to achieve the caching objective?

Options:

A.  

Use an On Table Row on employees table and call invalidate cacheUse an object store caching strategy and expiration interval to empty

B.  

Use a Scheduler with a fixed frequency every hour triggering an invalidate cache flowUse an object store caching strategy and expiration interval to empty

C.  

Use a Scheduler with a fixed frequency every hour triggering an invalidate cache flowUse an object store caching strategy and set expiration interval to 1-hour

D.  

Use an on table rule on employees table call invalidate cache and said new employees data to cacheUse an object store caching strategy and set expiration interval to 1-hour

Discussion 0
Questions 55

A leading eCommerce giant will use MuleSoft APIs on Runtime Fabric (RTF) to process customer orders. Some customer-sensitive information, such as credit card information, is required in request payloads or is included in response payloads in some of the APIs. Other API requests and responses are not authorized to access some of this customer-sensitive information but have been implemented to validate and transform based on the structure and format of this customer-sensitive information (such as account IDs, phone numbers, and postal codes).

What approach configures an API gateway to hide sensitive data exchanged between API consumers and API implementations, but can convert tokenized fields back to their original value for other API requests or responses, without having to recode the API implementations?

Later, the project team requires all API specifications to be augmented with an additional non-functional requirement (NFR) to protect the backend services from a high rate of requests, according to defined service-level

agreements (SLAs). The NFR's SLAs are based on a new tiered subscription level "Gold", "Silver", or "Platinum" that must be tied to a new parameter that is being added to the Accounts object in their enterprise data model.

Following MuleSoft's recommended best practices, how should the project team now convey the necessary non-functional requirement to stakeholders?

Options:

A.  

Create and deploy API proxies in API Manager for the NFR, change the baseurl in eachAPI specification to the corresponding API proxy implementation endpoint, and publish each modified API specification to Exchange

B.  

Update each API specification with comments about the NFR's SLAs and publish each modified API specification to Exchange

C.  

Update each API specification with a shared RAML fragment required to implement the NFR and publish the RAML fragment and each modified API specification to Exchange

D.  

Create a shared RAML fragment required to implement the NFR, list each API implementation endpoint in the RAML fragment, and publish the RAML fragment to Exchange

Discussion 0
Questions 56

A REST API is being designed to implement a Mule application.

What standard interface definition language can be used to define REST APIs?

Options:

A.  

Web Service Definition Language(WSDL)

B.  

OpenAPI Specification (OAS)

C.  

YAML

D.  

AsyncAPI Specification

Discussion 0
Questions 57

Insurance organization is planning to deploy Mule application in MuleSoft Hosted runtime plane. As a part of requirement , application should be scalable . highly available. It also has regulatory requirement which demands logs to be retained for at least 2 years. As an Integration Architect what step you will recommend in order to achieve this?

Options:

A.  

It is not possible to store logs for 2 years in CloudHub deployment. External log management system is required.

B.  

When deploying an application to CloudHub , logs retention period should be selected as 2 years

C.  

When deploying an application to CloudHub, worker size should be sufficient to store 2 years data

D.  

Logging strategy should be configured accordingly in log4j file deployed with the application.

Discussion 0
Questions 58

As a part of project , existing java implementation is being migrated to Mulesoft. Business is very tight on the budget and wish to complete the project in most economical way possible.

Canonical object model using java is already a part of existing implementation. Same object model is required by mule application for a business use case. What is the best way to achieve this?

Options:

A.  

Make use of Java module

B.  

Create similar model for Mule applications

C.  

Create a custom application to read Java code and make it available for Mule application

D.  

Use Anypoint exchange

Discussion 0
Questions 59

Refer to the exhibit.

An organization is sizing an Anypoint VPC for the non-production deployments of those Mule applications that connect to the organization's on-premises systems. This applies to approx. 60 Mule applications. Each application is deployed to two CloudHub i workers. The organization currently has three non-production environments (DEV, SIT and UAT) that share this VPC. The AWS region of the VPC has two AZs.

The organization has a very mature DevOps approach which automatically progresses each application through all non-production environments before automatically deploying to production. This process results in several Mule application deployments per hour, using CloudHub's normal zero-downtime deployment feature.

What is a CIDR block for this VPC that results in the smallest usable private IP address range?

Options:

A.  

10.0.0.0/26 (64 IPS)

B.  

10.0.0.0/25 (128 IPs)

C.  

10.0.0.0/24 (256 IPs)

D.  

10.0.0.0/22 (1024 IPs)

Discussion 0
Questions 60

A banking company is developing a new set of APIs for its online business. One of the critical API's is a master lookup API which is a system API. This master lookup API uses persistent object store. This API will be used by all other APIs to provide master lookup data.

Master lookup API is deployed on two cloudhub workers of 0.1 vCore each because there is a lot of master data to be cached. Master lookup data is stored as a key value pair. The cache gets refreshed if they key is not found in the cache.

Doing performance testing it was observed that the Master lookup API has a higher response time due to database queries execution to fetch the master lookup data.

Due to this performance issue, go-live of the online business is on hold which could cause potential financial loss to Bank.

As an integration architect, which of the below option you would suggest to resolve performance issue?

Options:

A.  

Implement HTTP caching policy for all GET endpoints for the master lookup API and implement locking to synchronize access to object store

B.  

Upgrade vCore size from 0.1 vCore to 0,2 vCore

C.  

Implement HTTP caching policy for all GET endpoints for master lookup API

D.  

Add an additional Cloudhub worker to provide additional capacity

Discussion 0
Questions 61

Refer to the exhibit.

A shopping cart checkout process consists of a web store backend sending a sequence of API invocations to an Experience API, which in turn invokes a Process API. All API invocations are over HTTPS POST. The Java web store backend executes in a Java EE application server, while all API implementations are Mule applications executing in a customer -hosted Mule runtime.

End-to-end correlation of all HTTP requests and responses belonging to each individual checkout Instance is required. This is to be done through a common correlation ID, so that all log entries written by the web store backend, Experience API implementation, and Process API implementation include the same correlation ID for all requests and responses belonging to the same checkout instance.

What is the most efficient way (using the least amount of custom coding or configuration) for the web store backend and the implementations of the Experience API and Process API to participate in end-to-end correlation of the API invocations for each checkout instance?

A)

The web store backend, being a Java EE application, automatically makes use of the thread-local correlation ID generated by the Java EE application server and automatically transmits that to the Experience API using HTTP-standard headers

No special code or configuration is included in the web store backend, Experience API, and Process API implementations to generate and manage the correlation ID

B)

The web store backend generates a new correlation ID value at the start of checkout and sets it on the X-CORRELATlON-lt HTTP request header In each API invocation belonging to that checkout

No special code or configuration is included in the Experience API and Process API implementations to generate and manage the correlation ID

C)

The Experience API implementation generates a correlation ID for each incoming HTTP request and passes it to the web store backend in the HTTP response, which includes it in all subsequent API invocations to the Experience API.

The Experience API implementation must be coded to also propagate the correlation ID to the Process API in a suitable HTTP request header

D)

The web store backend sends a correlation ID value in the HTTP request body In the way required by the Experience API

The Experience API and Process API implementations must be coded to receive the custom correlation ID In the HTTP requests and propagate It in suitable HTTP request headers

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 62

A Mule application is running on a customer-hosted Mule runtime in an organization's network. The Mule application acts as a producer of asynchronous Mule events. Each Mule event must be broadcast to all interested external consumers outside the Mule application. The Mule events should be published in a way that is guaranteed in normal situations and also minimizes duplicate delivery in less frequent failure scenarios.

The organizational firewall is configured to only allow outbound traffic on ports 80 and 443. Some external event consumers are within the organizational network, while others are located outside the firewall.

What Anypoint Platform service is most idiomatic (used for its intended purpose) for publishing these Mule events to all external consumers while addressing the desired reliability goals?

Options:

A.  

CloudHub VM queues

B.  

Anypoint MQ

C.  

Anypoint Exchange

D.  

CloudHub Shared Load Balancer

Discussion 0
Questions 63

An organization heeds to procure an enterprise software system to increase cross-selling opportunities and better rack prospect data.

Which category of enterprise software has these core capabilities, when used for its typical and intended purpose?

Options:

A.  

Supply Chain Management (SCM)

B.  

IT Service Management (ITSM)

C.  

Business-to-Business (A2B)

D.  

Customer Relationship Management (CRM)

Discussion 0
Questions 64

An organization plans to extend its Mule APIs to the EU (Frankfurt) region.

Currently, all Mule applications are deployed to CloudHub 1.0 in the default North American region, from the North America control plane, following this naming convention: {API-name}—{environment} (for example, Orderssapi—dev, Orders-sapi-—qa, Orders-sapi-—prod, etc.).

There is no network restriction to block communications between APIs.

What strategy should be implemented in order to deploy the same Mule APIs to the CloudHub 1.0 EU region from the North America control plane,

as well as to minimize latency between APIs and target users and systems in Europe?

Options:

A.  

In Runtime Manager, for each Mule application deployment, set the Region property to EU (Frankfurt) and reuse the same Mule application mame as in the North Americanregion.Communicate the new urls {API-name}—{environment}.de-ci.cloudhub.io to the consuming API clients In Europe.

B.  

In API Manager, set the Region property to EU (Frankfurt) to create an API proxy named {API-name}—proxy—{environment} for each Mule application.Communicate the new url {API-name}—proxy—{environment}.de-c1.cloudhub.io to the consuming API clients In Europe.

C.  

In Runtime Manager, for each Mule application deployment, leave the Region propertyblank (default) and change the Mule application name to {API-name}—{environment).de-cl.Communicate the new urls {API-name}—{environment}.de-ci1.cloudhub.io to theconsuming API clients in Europe.

D.  

In API Manager, leave the Region property blank (default) to deploy an API proxy named {API-name}~proxy~- (environment}.de-cl for each Mule application.Communicate the new url {API-name}—proxy—{environment}.de-cl.cloudhub.io to the consuming API clients in Europe.

Discussion 0
Questions 65

Refer to the exhibit.

A Mule 4 application has a parent flow that breaks up a JSON array payload into 200 separate items, then sends each item one at a time inside an Async scope to a VM queue.

A second flow to process orders has a VM Listener on the same VM queue. The rest of this flow processes each received item by writing the item to a database.

This Mule application is deployed to four CloudHub workers with persistent queues enabled.

What message processing guarantees are provided by the VM queue and the CloudHub workers, and how are VM messages routed among the CloudHub workers for each invocation of the parent flow under normal operating conditions where all the CloudHub workers remain online?

Options:

A.  

EACH item VM message is processed AT MOST ONCE by ONE CloudHub worker, with workers chosen in a deterministic round-robin fashion Each of the four CloudHub workers can be expected to process 1/4 of the Item VM messages (about 50 items)

B.  

EACH item VM message is processed AT LEAST ONCE by ONE ARBITRARY CloudHub worker Each of the four CloudHub workers can be expected to process some item VM messages

C.  

ALL Item VM messages are processed AT LEAST ONCE by the SAME CloudHub worker where the parent flow was invokedThis one CloudHub worker processes ALL 200 item VM messages

D.  

ALL item VM messages are processed AT MOST ONCE by ONE ARBITRARY CloudHub workerThis one CloudHub worker processes ALL 200 item VM messages

Discussion 0
Questions 66

The AnyAirline organization's passenger reservations center is designing an integration solution that combines invocations of three different System APIs (bookFlight, bookHotel, and bookCar) in a business transaction. Each System API makes calls to a single database.

The entire business transaction must be rolled back when at least one of the APIs fails.

What is the most idiomatic (used for its intended purpose) way to integrate these APIs in near real-time that provides the best balance of consistency, performance, and reliability?

Options:

A.  

Implement eXtended Architecture (XA) transactions between the API implementationsCoordinate between the API implementations using a Saga patternImplement caching in each API implementation to improve performance

B.  

Implement local transactions within each API implementationConfigure each API implementation to also participate in the same eXtended Architecture (XA) transactionImplement caching in each API implementation to improve performance

C.  

Implement local transactions in each API implementationCoordinate between the API implementations using a Saga patternApply various compensating actions depending on where a failure occurs

D.  

Implement an eXtended Architecture (XA) transaction manager in a Mule application using a Saga patternConnect each API implementation with the Mule application using XA transactionsApply various compensating actions depending on where a failure occurs

Discussion 0
Questions 67

An IT integration delivery team begins a project by gathering all of the requirements, and proceeds to execute the remaining project activities as sequential, non-repeating phases.

Which IT project delivery methodology is this team following?

Options:

A.  

Kanban

B.  

Scrum

C.  

Waterfall

D.  

Agile

Discussion 0
Questions 68

A mule application uses an HTTP request operation to involve an external API.

The external API follows the HTTP specification for proper status code usage.

What is possible cause when a 3xx status code is returned to the HTTP Request operation from the external API?

Options:

A.  

The request was not accepted by the external API

B.  

The request was Redirected to a different URL by the external API

C.  

The request was NOT RECEIVED by the external API

D.  

The request was ACCEPTED by the external API

Discussion 0
Questions 69

According to MuleSoft, which deployment characteristic applies to a microservices application architecture?

Options:

A.  

Services exist as independent deployment artifacts and can be scaled -independently of other services

B.  

All services of an application can be deployed together as single Java WAR file

C.  

A deployment to enhance one capability requires a redeployment of all capabilities

D.  

Core business capabilities are encapsulated in a single, deployable application

Discussion 0
Questions 70

An organization uses one specific CloudHub (AWS) region for all CloudHub deployments. How are CloudHub workers assigned to availability zones (AZs) when the organization's Mule applications are deployed to CloudHub in that region?

Options:

A.  

Workers belonging to a given environment are assigned to the same AZ within that region.

B.  

AZs are selected as part of the Mule application's deployment configuration.

C.  

Workers are randomly distributed across available AZs within that region.

D.  

An AZ is randomly selected for a Mule application, and all the Mule application's CloudHub workers are assigned to that one AZ

Discussion 0
Questions 71

As a part of design , Mule application is required call the Google Maps API to perform a distance computation. The application is deployed to cloudhub.

At the minimum what should be configured in the TLS context of the HTTP request configuration to meet these requirements?

Options:

A.  

The configuration is built-in and nothing extra is required for the TLS context

B.  

Request a private key from Google and create a PKCS12 file with it and add it in keyStore as a part of TLS context

C.  

Download the Google public certificate from a browser, generate JKS file from it and add it in key store as a part of TLS context

D.  

Download the Google public certificate from a browser, generate a JKS file from it and add it in Truststore as part of the TLS context

Discussion 0
Questions 72

An organization is designing the following two Mule applications that must share data via a common persistent object store instance:

- Mule application P will be deployed within their on-premises datacenter.

- Mule application C will run on CloudHub in an Anypoint VPC.

The object store implementation used by CloudHub is the Anypoint Object Store v2 (OSv2).

what type of object store(s) should be used, and what design gives both Mule applications access to the same object store instance?

Options:

A.  

Application P uses the Object Store connector to access a persistent object store Application C accesses this persistent object store via the Object Store REST API through an IPsec tunnel

B.  

Application C and P both use the Object Store connector to access the Anypoint Object Store v2

C.  

Application C uses the Object Store connector to access a persistent object Application P accesses the persistent object store via the Object Store REST API

D.  

Application C and P both use the Object Store connector to access a persistent object store

Discussion 0
Questions 73

A rale limiting policy has been applied to a soap VI.2 API published in Clondhub. The API implementation catches errors in a global error handler on error propagate in the main flow for HTTP: RETRY_EXHAUSTED with HTTP status set to 429 and any with the HTTP status set to 500.

What is the expected H1TP status when the client exceeds the quota of the API calls?

Options:

A.  

HTTP status 429 as defined in the HTTP:RETRY EXHAUSTED error handler in the API B. HTTP status 500 as defined in the ANY error handler in the API since an API:RETRY_EXHAUSTED will be generated

B.  

HTTP status 401 unauthorized for policy violation

C.  

HTTP status 400 from the rate-limiting policy violation since the call does not reach the back-end

Discussion 0
Questions 74

A Mule application is built to support a local transaction for a series of operations on a single database. The mule application has a Scatter-Gather scope that participates in the local transaction.

What is the behavior of the Scatter-Gather when running within this local transaction?

Options:

A.  

Execution of all routes within Scatter-Gather occurs in parallel Any error that occurs inside Scatter-Gather will result in a roll back of all the database operations

B.  

Execution of all routes within Scatter-Gather occurs sequentially Any error that occurs inside Scatter-Gather will be handled by error handler and will not result in roll back

C.  

Execution of all routes within Scatter-Gather occurs sequentially Any error that occurs inside Scatter-Gather will result in a roll back of all the database operations

D.  

Execution of all routes within Scatter-Gather occurs in parallel Any error that occurs inside Scatter-Gather will be handled by error handler and will not result in roll back

Discussion 0
Questions 75

Refer to the exhibit.

What is the type data format shown in the exhibit?

Options:

A.  

JSON

B.  

XML

C.  

YAML

D.  

CSV

Discussion 0
Questions 76

What is true about the network connections when a Mule application uses a JMS connector to interact with a JMS provider (message broker)?

Options:

A.  

To complete sending a JMS message, the JMS connector must establish a network connection with the JMS message recipient

B.  

To receive messages into the Mule application, the JMS provider initiates a network connection to the JMS connector and pushes messages along this connection

C.  

The JMS connector supports both sending and receiving of JMS messages over the protocol determined by the JMS provider

D.  

The AMQP protocol can be used by the JMS connector to portably establish connections to various types of JMS providers

Discussion 0
Questions 77

An organization is choosing between API-led connectivity and other integration approaches.

According to MuleSoft, which business benefits is associated with an API-led connectivity approach using Anypoint Platform?

Options:

A.  

improved security through adoption of monolithic architectures

B.  

Increased developer productivity through sell-service of API assets

C.  

Greater project predictability through tight coupling of systems

D.  

Higher outcome repeatability through centralized development

Discussion 0
Questions 78

A new Mule application under development must implement extensive data transformation logic. Some of the data transformation functionality is already available as external transformation services that are mature and widely used across the organization; the rest is highly specific to the new Mule application.

The organization follows a rigorous testing approach, where every service and application must be extensively acceptance tested before it is allowed to go into production.

What is the best way to implement the data transformation logic for this new Mule application while minimizing the overall testing effort?

Options:

A.  

Implement and expose all transformation logic as mlaoservices using DataWeave, so it can be reused by any application component that needs it, including the new Mule application

B.  

Implement transformation logic in the new Mute application using DataWeave, replicating the transformation logic of existing transformation services

C.  

Extend the existing transformation services with new transformation logic and Invoke them from the new Mule application

D.  

Implement transformation logic in the new Mute application using DataWeave, invoking existing transformation services when possible

Discussion 0
Questions 79

An organization has chosen Mulesoft for their integration and API platform.

According to the Mulesoft catalyst framework, what would an integration architect do to create achievement goals as part of their business outcomes?

Options:

A.  

Measure the impact of the centre for enablement

B.  

build and publish foundational assets

C.  

agree upon KPI's and help develop and overall success plan

D.  

evangelize API's

Discussion 0
Questions 80

A key Cl/CD capability of any enterprise solution is a testing framework to write and run repeatable tests.

Which component of Anypoint Platform provides the te6t automation capabilities for customers to use in their pipelines?

Options:

A.  

Anypoint CLl

B.  

Mule Maven Plugin

C.  

Exchange Mocking Service

D.  

MUnit

Discussion 0
Questions 81

Mule application muleA deployed in cloudhub uses Object Store v2 to share data across instances. As a part of new requirement , application muleB which is deployed in same region wants to access this Object Store.

Which of the following option you would suggest which will have minimum latency in this scenario?

Options:

A.  

Object Store REST API

B.  

Object Store connector

C.  

Both of the above option will have same latency

D.  

Object Store of one mule application cannot be accessed by other mule application.

Discussion 0