Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

Salesforce Certified MuleSoft Integration Architect 1 (SP25) Exam Question and Answers

Salesforce Certified MuleSoft Integration Architect 1 (SP25) Exam

Last Update Jul 10, 2025
Total Questions : 273

We are offering FREE MuleSoft-Integration-Architect-I Salesforce exam questions. All you do is to just go and sign up. Give your details, prepare MuleSoft-Integration-Architect-I free exam questions and then go for complete pool of Salesforce Certified MuleSoft Integration Architect 1 (SP25) Exam test questions that will help you more.

MuleSoft-Integration-Architect-I pdf

MuleSoft-Integration-Architect-I PDF

$42  $104.99
MuleSoft-Integration-Architect-I Engine

MuleSoft-Integration-Architect-I Testing Engine

$50  $124.99
MuleSoft-Integration-Architect-I PDF + Engine

MuleSoft-Integration-Architect-I PDF + Testing Engine

$66  $164.99
Questions 1

An organization is using Mulesoft cloudhub and develops API's in the latest version. As a part of requirements for one of the API's, third party API needs to be called. The security team has made it clear that calling any external API needs to have include listing

As an integration architect please suggest the best way to accomplish the design plan to support these requirements?

Options:

A.  

Implement includelist IP on the cloudhub VPC firewall to allow the traffic

B.  

Implement the validation of includelisted IP operation

C.  

Implement the Any point filter processor to implement the include list IP

D.  

Implement a proxy for the third party API and enforce the IPinclude list policy and call this proxy from the flow of the API

Discussion 0
Questions 2

Refer to the exhibit.

A Mule application is being designed to be deployed to several CIoudHub workers. The Mule application's integration logic is to replicate changed Accounts from Satesforce to a backend system every 5 minutes.

A watermark will be used to only retrieve those Satesforce Accounts that have been modified since the last time the integration logic ran.

What is the most appropriate way to implement persistence for the watermark in order to support the required data replication integration logic?

Options:

A.  

Persistent Anypoint MQ Queue

B.  

Persistent Object Store

C.  

Persistent Cache Scope

D.  

Persistent VM Queue

Discussion 0
Questions 3

An organization has decided on a cloud migration strategy to minimize the organization's own IT resources. Currently the organization has all of its new applications running on its own premises and uses an on-premises load balancer that exposes all APIs under the base URL (https://api.rutujar.com ).

As part of migration strategy, the organization is planning to migrate all of its new applications and load balancer CloudHub.

What is the most straightforward and cost-effective approach to Mule application deployment and load balancing that preserves the public URL's?

Options:

A.  

Deploy the Mule application to Cloudhub

Create a CNAME record for base URL( httpsr://api.rutujar.com) in the Cloudhub shared load balancer that points to the A record of theon-premises load balancer

Apply mapping rules in SLB to map URLto their corresponding Mule applications

B.  

Deploy the Mule application to Cloudhub

Update a CNAME record for base URL ( https://api.rutujar.com) in the organization 's DNS server to point to the A record of the Cloudhub dedicated load balancer

Apply mapping rules in DLB to map URLto their corresponding Mule applications

C.  

Deploy the Mule application to Cloudhub

Update a CNAME record for base URL ( https://api.rutujar.com) in the organization 's DNS server to point to the A record of the CloudHub shared load balancer

Apply mapping rules in SLB to map URLto their corresponding Mule applications

D.  

For each migrated Mule application, deploy an API proxy application to Cloudhub with all traffic to the mule applications routed through a Cloud Hub Dedicated load balancer (DLB)

Update a CNAME record for base URL ( https://api.rutujar.com) in the organization 's DNS server to point to the A record of the CloudHub dedicated load balancer

Apply mapping rules in DLB to map each API proxy appl

Discussion 0
Questions 4

An integration team uses Anypoint Platform and follows MuleSoft's recommended approach to full lifecycle API development.

Which step should the team's API designer take before the API developers implement the AP! Specification?

Options:

A.  

Generate test cases using MUnit so the API developers can observe the results of running the API

B.  

Use the scaffolding capability of Anypoint Studio to create an API portal based on the API specification

C.  

Publish the API specification to Exchange and solicit feedback from the API's consumers

D.  

Use API Manager to version the API specification

Discussion 0
Questions 5

According to MuleSoft, what Action should an IT organization take regarding its technology assets in order to close the IT delivery.

Options:

A.  

Make assets easily discoverable via a central repository

B.  

Focus project delivery efforts on custom assets that meet the specific requirements of each individual line of business

C.  

Create weekly meetings that all members of IT attend to present justification and request approval to use existing assets

D.  

Hire additional staff to meet the demand for asset creation required for approved projects and timelines

Discussion 0
Questions 6

Refer to the exhibit.

A Mule application is deployed to a cluster of two customer-hosted Mute runtimes. The Mute application has a flow that polls a database and another flow with an HTTP Listener.

HTTP clients send HTTP requests directly to individual cluster nodes.

What happens to database polling and HTTP request handling in the time after the primary (master) node of the cluster has railed, but before that node is restarted?

Options:

A.  

Database polling continues Only HTTP requests sent to the remaining node continue to be accepted

B.  

Database polling stops All HTTP requests continue to be accepted

C.  

Database polling continues All HTTP requests continue to be accepted, but requests to the failed node Incur increased latency

D.  

Database polling stops All HTTP requests are rejected

Discussion 0
Questions 7

A retail company is implementing a MuleSoft API to get inventory details from two vendors by Invoking each vendor's online applications. Due to network issues, the invocations to the vendor applications are timing out intermittently, but the requests are successful after re-invoking each

vendor application.

What is the most performant way of implementing the API to invoke each vendor application and to retry invocations that generate timeout errors?

Options:

A.  

Use a For-Each scope to invoke the two vendor applications in series, one after the other.

Place the For-Each scope inside an Until-Successful scope to retry requests that raise timeout errors.

B.  

Use a Choice scope to Invoke each vendor application on a separate route.

Place the Choice scope inside an Until-Successful scope to retry requests that raise

timeout errors.

C.  

Use a Scatter-Gather scope to invoke each vendor application on a separate route.

Use an Until-Successful scope in each route to retry requests that raise timeout errors.

D.  

Use a Round-Robin scope to invoke each vendor application on a separate route.

Use a Try-Catch scope in each route to retry requests that raise timeout errors.

Discussion 0
Questions 8

What is maximum vCores can be allocated to application deployed to CloudHub?

Options:

A.  

1 vCores

B.  

2 vCores

C.  

4 vCores

D.  

16 vCores

Discussion 0
Questions 9

A corporation has deployed Mule applications to different customer-hosted Mule runtimes. Mule applications deployed to these Mule runtimes are managed by Anypoint Platform.

What needs to be installed or configured (if anything) to monitor these Mule applications from Anypoint Monitoring, and how is monitoring data from each Mule application sent to Anypoint Monitoring?

Options:

A.  

Enable monitoring of individual Mule applications from the Runtime Manager

application settings.

Runtime Manager sends monitoring data to Anypoint Monitoring for each deployed Mule application.

B.  

Install a Runtime Manager agent on each Mule runtime.

Each Runtime Manager agent sends monitoring data from the Mule applications

running in its Mule runtime to Runtime Manager, then Runtime Manager sends

monitoring data to Anypoint Monitoring.

C.  

Leave the out-of-the-box Anypoint Monitoring agent unchanged in its default Mule

runtime installation.

Each Anypoint Monitoring agent sends monitoring data from the Mule applications

running in its Mule runtime to Runtime Manager, then Runtime Manager sends

monitoring data to Anypoint Monitoring.

D.  

Install an Anypoint Monitoring agent on each Mule runtime.

Each Anypoint Monitoring agent sends monitoring data from the Mule applications

running in its Mule runtime to Anypoint Monitoring.

Discussion 0
Questions 10

Which role is primarily responsible for building API implementation as part of a typical MuleSoft integration project?

Options:

A.  

API Developer

B.  

API Designer

C.  

Integration Architect

D.  

Operations

Discussion 0
Questions 11

A Mule application uses APIkit for SOAP to implement a SOAP web service. The Mule application has been deployed to a CloudHub worker in a testing environment.

The integration testing team wants to use a SOAP client to perform Integration testing. To carry out the integration tests, the integration team must obtain the interface definition for the SOAP web service.

What is the most idiomatic (used for its intended purpose) way for the integration testing team to obtain the interface definition for the deployed SOAP web service in order to perform integration testing with the SOAP client?

Options:

A.  

Retrieve the OpenAPI Specification file(s) from API Manager

B.  

Retrieve the WSDL file(s) from the deployed Mule application

C.  

Retrieve the RAML file(s) from the deployed Mule application

D.  

Retrieve the XML file(s) from Runtime Manager

Discussion 0
Questions 12

What aspect of logging is only possible for Mule applications deployed to customer-hosted Mule runtimes, but NOT for Mule applications deployed to CloudHub?

Options:

A.  

To send Mule application log entries to Splunk

B.  

To change tog4j2 tog levels in Anypoint Runtime Manager without having to restart the Mule application

C.  

To log certain messages to a custom log category

D.  

To directly reference one shared and customized log4j2.xml file from multiple Mule applications

Discussion 0
Questions 13

An auto mobile company want to share inventory updates with dealers Dl and D2 asynchronously and concurrently via queues Q1 and Q2. Dealer Dl must consume the message from the queue Q1 and dealer D2 to must consume a message from the queue Q2.

Dealer D1 has implemented a retry mechanism to reprocess the transaction in case of any errors while processing the inventers updates. Dealer D2 has not implemented any retry mechanism.

How should the dealers acknowledge the message to avoid message loss and minimize impact on the current implementation?

Options:

A.  

Dealer D1 must use auto acknowledgement and dealer D2 can use manual acknowledgement and acknowledge the message after successful processing

B.  

Dealer D1 can use auto acknowledgement and dealer D2 can use IMMEDIATE acknowledgement and acknowledge the message of successful processing

C.  

Dealer D1 and dealer D2 must use AUTO acknowledgement and acknowledge the message after successful processing

D.  

Dealer D1 can use AUTO acknowledgement and dealer D2 must use manual acknowledgement and acknowledge the message

after successful processing

Discussion 0
Questions 14

According to MuteSoft, which principle is common to both Service Oriented Architecture (SOA) and API-led connectivity approaches?

Options:

A.  

Service centralization

B.  

Service statefulness

C.  

Service reusability

D.  

Service interdependence

Discussion 0
Questions 15

An organization’s IT team must secure all of the internal APIs within an integration solution by using an API proxy to apply required authentication and authorization policies.

Which integration technology, when used for its intended purpose, should the team choose to meet these requirements if all other relevant factors are equal?

Options:

A.  

API Management (APIM)

B.  

Robotic Process Automation (RPA)

C.  

Electronic Data Interchange (EDI)

D.  

Integration Platform-as-a-service (PaaS)

Discussion 0
Questions 16

A large life sciences customer plans to use the Mule Tracing module with the Mapped Diagnostic Context (MDC) logging operations to enrich logging in its Mule application and to improve tracking by providing more context in the Mule application logs. The customer also wants to improve throughput and lower the message processing latency in its Mule application flows.

After installing the Mule Tracing module in the Mule application, how should logging be performed in flows in Mule applications, and what should be changed In the log4j2.xml files?

Options:

A.  

In the flows, add Mule Tracing module Set logging variable operations before any Core Logger components.

In log4j2.xml files, change the appender's pattern layout to use %MDC and then assign the appender to a Logger or Root element.

B.  

In the flows, add Mule Tracing module Set logging variable operations before any Core

Logger components.

In log4j2.xmI files, change the appender’s pattern layout to use the %MDC placeholder and then assign the appender to an AsyncLogger element.

C.  

In the flows, add Mule Tracing module Set logging variable operations before any Core

Logger components.

In log4j2.xmI files, change the appender’'s pattern layout to use %asyncLogger placeholder and then assign the appender to an AsyncLogger element.

D.  

In the flows, wrap Logger components in Async scopes. In log4j2.xmI files, change the appender's pattern layout to use the %asyncLogger

placeholder and then assign the appender to a Logger or Root element.

Discussion 0
Questions 17

Refer to the exhibit.

The HTTP Listener and the Logger are being handled from which thread pools respectively?

Options:

A.  

CPU_INTENSIVE and Dedicated Selector pool

B.  

UBER and NONBLOCKING

C.  

Shared Selector Pool and CPU LITE

D.  

BLOCKING _IO and UBER

Discussion 0
Questions 18

A mule application is required to periodically process large data set from a back-end database to Salesforce CRM using batch job scope configured properly process the higher rate of records.

The application is deployed to two cloudhub workers with no persistence queues enabled.

What is the consequence if the worker crashes during records processing?

Options:

A.  

Remaining records will be processed by a new replacement worker

B.  

Remaining records be processed by second worker

C.  

Remaining records will be left and processed

D.  

All the records will be processed from scratch by the second worker leading to duplicate processing

Discussion 0
Questions 19

An organization is designing Mule application which connects to a legacy backend. It has been reported that backend services are not highly available and experience downtime quite often. As an integration architect which of the below approach you would propose to achieve high reliability goals?

Options:

A.  

Alerts can be configured in Mule runtime so that backend team can be communicated when services are down

B.  

Until Successful scope can be implemented while calling backend API's

C.  

On Error Continue scope to be used to call in case of error again

D.  

Create a batch job with all requests being sent to backend using that job as per the availability of backend API's

Discussion 0
Questions 20

A project uses Jenkins to implement CI/CD process. It was observed that each Mule package contains some of the Jenkins files and folders for configurations of CI/CD jobs.

As these files and folders are not part of the actual package, expectation is that these should not be part of deployed archive.

Which file can be used to exclude these files and folders from the deployed archive?

Options:

A.  

muleignore

B.  

_unTrackMule

C.  

mulelnclude

D.  

_muleExclude

Discussion 0
Questions 21

A MuteSoft developer must implement an API as a Mule application, run the application locally, and execute unit tests against the Running application.

Which Anypoint Platform component can the developer use to full all of these requirements?

Options:

A.  

API Manager

B.  

API Designer

C.  

Anypoint CLI

D.  

Anypoint Studio

Discussion 0
Questions 22

What is an example of data confidentiality?

Options:

A.  

Signing a file digitally and sending it using a file transfer mechanism

B.  

Encrypting a file containing personally identifiable information (PV)

C.  

Providing a server's private key to a client for secure decryption of data during a two-way SSL handshake

D.  

De-masking a person's Social Security number while inserting it into a database

Discussion 0
Questions 23

An organization is sizing an Anypoint VPC to extend their internal network to Cloudhub.

For this sizing calculation, the organization assumes 150 Mule applications will be deployed among three(3) production environments and will use Cloudhub’s default zero-downtime feature. Each Mule application is expected to be configured with two(2) Cloudhub workers.This is expected to result in several Mule application deployments per hour.

Options:

A.  

10.0.0.0/21(2048 IPs)

B.  

10.0.0.0/22(1024IPs)

C.  

10.0.0.0/23(512 IPs)

D.  

10.0.0.0/24(256 IPs)

Discussion 0
Questions 24

A payment processing company has implemented a Payment Processing API Mule application to process credit card and debit card transactions, Because the Payment Processing API handles highly sensitive information, the payment processing company requires that data must be encrypted both In-transit and at-rest.

To meet these security requirements, consumers of the Payment Processing API must create request message payloads in a JSON format specified by the API, and the message payload values must be encrypted.

How can the Payment Processing API validate requests received from API consumers?

Options:

A.  

A Transport Layer Security (TLS) - Inbound policy can be applied in API Manager to decrypt the message payload and the Mule application implementation can then use

the JSON Validation module to validate the JSON data

B.  

The Mule application implementation can use the APIkit module to decrypt and then validate the JSON data

C.  

The Mule application implementation can use the Validation module to decrypt and then validate the JSON data

D.  

The Mule application implementation can use DataWeave to decrypt the message payload and then use the JSON Scheme Validation module to validate the JSON data

Discussion 0
Questions 25

The implementation of a Process API must change. What is a valid approach that minimizes the impact of this change on API clients?

Options:

A.  

Implement required changes to the Process API implementation so that whenever possible, the Process API's RAML definition remains unchanged

B.  

Update the RAML definition of the current Process API and notify API client developers by sending them links to the updated RAML definition

C.  

Postpone changes until API consumers acknowledge they are ready to migrate to a new Process API or API version

D.  

Implement the Process API changes in a new API implementation, and have the old API implementation return an HTTP status code 301 - Moved Permanently to inform API clients they should be calling the new API implementation

Discussion 0
Questions 26

What operation can be performed through a JMX agent enabled in a Mule application?

Options:

A.  

View object store entries

B.  

Replay an unsuccessful message

C.  

Set a particular tog4J2 log level to TRACE

D.  

Deploy a Mule application

Discussion 0
Questions 27

Refer to the exhibit.

An organization deploys multiple Mule applications to the same customer -hosted Mule runtime. Many of these Mule applications must expose an HTTPS endpoint on the same port using a server-side certificate that rotates often.

What is the most effective way to package the HTTP Listener and package or store the server-side certificate when deploying these Mule applications, so the disruption caused by certificate rotation is minimized?

Options:

A.  

Package the HTTPS Listener configuration in a Mule DOMAIN project, referencing it from all Mule applications that need to expose an HTTPS endpoint Package the server-side certificate in ALL Mule APPLICATIONS that need to expose an HTTPS endpoint

B.  

Package the HTTPS Listener configuration in a Mule DOMAIN project, referencing it from all Mule applications that need to expose an HTTPS endpoint. Store the server-side certificate in a shared filesystem location in the Mule runtime's classpath, OUTSIDE the Mule DOMAIN or any Mule APPLICATION

C.  

Package an HTTPS Listener configuration In all Mule APPLICATIONS that need to expose an HTTPS endpoint Package the server-side certificate in a NEW Mule DOMAIN project

D.  

Package the HTTPS Listener configuration in a Mule DOMAIN project, referencing It from all Mule applications that need to expose an HTTPS endpoint. Package the server-side certificate in the SAME Mule DOMAIN project Go to Set

Discussion 0
Questions 28

What is the MuleSoft-recommended best practice to share the connector and configuration information among the APIs?

Options:

A.  

Build a Mule domain project, add the Database connector and configuration to it, and reference this one domain project from each System API

B.  

Build a separate Mule domain project for each API, and configure each of them to use a file on a shared file store to load the configuration information dynamically

C.  

Build another System API that connects to the database, and refactor all the other APIs to make requests through the new System API to access the database

D.  

Create an API proxy for each System API and share the Database connector configuration with all the API proxies via an automated policy

Discussion 0
Questions 29

As a part of design , Mule application is required call the Google Maps API to perform a distance computation. The application is deployed to cloudhub.

At the minimum what should be configured in the TLS context of the HTTP request configuration to meet these requirements?

Options:

A.  

The configuration is built-in and nothing extra is required for the TLS context

B.  

Request a private key from Google and create a PKCS12 file with it and add it in keyStore as a part of TLS context

C.  

Download the Google public certificate from a browser, generate JKS file from it and add it in key store as a part of TLS context

D.  

Download the Google public certificate from a browser, generate a JKS file from it and add it in Truststore as part of the TLS context

Discussion 0
Questions 30

A company is building an application network and has deployed four Mule APIs: one experience API, one process API, and two system APIs. The logs from all the APIs are aggregated in an external log aggregation tool. The company wants to trace messages that are exchanged between multiple API implementations. What is the most idiomatic (based on its intended use) identifier that should be used to implement Mule event tracing across the multiple API implementations?

Options:

A.  

Mule event ID

B.  

Mule correlation ID

C.  

Client's IP address

D.  

DataWeave UUID

Discussion 0
Questions 31

According to MuleSoft, which system integration term describes the method, format, and protocol used for communication between two system?

Options:

A.  

Component

B.  

interaction

C.  

Message

D.  

Interface

Discussion 0
Questions 32

A system API EmployeeSAPI is used to fetch employee's data from an underlying SQL database.

The architect must design a caching strategy to query the database only when there is an update to the employees stable or else return a cached response in order to minimize the number of redundant transactions being handled by the database.

What must the architect do to achieve the caching objective?

Options:

A.  

Use an On Table Row on employees table and call invalidate cache

Use an object store caching strategy and expiration interval to empty

B.  

Use a Scheduler with a fixed frequency every hour triggering an invalidate cache flow

Use an object store caching strategy and expiration interval to empty

C.  

Use a Scheduler with a fixed frequency every hour triggering an invalidate cache flow

Use an object store caching strategy and set expiration interval to 1-hour

D.  

Use an on table rule on employees table call invalidate cache and said new employees data to cache

Use an object store caching strategy and set expiration interval to 1-hour

Discussion 0
Questions 33

A travel company wants to publish a well-defined booking service API to be shared with its business partners. These business partners have agreed to ONLY consume SOAP services and they want to get the service contracts in an easily consumable way before they start any development. The travel company will publish the initial design documents to Anypoint Exchange, then share those documents with the business partners. When using an API-led approach, what is the first design document the travel company should deliver to its business partners?

Options:

A.  

Create a WSDL specification using any XML editor

B.  

Create a RAML API specification using any text editor

C.  

Create an OAS API specification in Design Center

D.  

Create a SOAP API specification in Design Center

Discussion 0
Questions 34

An IT integration delivery team begins a project by gathering all of the requirements, and proceeds to execute the remaining project activities as sequential, non-repeating phases.

Which IT project delivery methodology is this team following?

Options:

A.  

Kanban

B.  

Scrum

C.  

Waterfall

D.  

Agile

Discussion 0
Questions 35

A banking company is developing a new set of APIs for its online business. One of the critical API's is a master lookup API which is a system API. This master lookup API uses persistent object store. This API will be used by all other APIs to provide master lookup data.

Master lookup API is deployed on two cloudhub workers of 0.1 vCore each because there is a lot of master data to be cached. Master lookup data is stored as a key value pair. The cache gets refreshed if they key is not found in the cache.

Doing performance testing it was observed that the Master lookup API has a higher response time due to database queries execution to fetch the master lookup data.

Due to this performance issue, go-live of the online business is on hold which could cause potential financial loss to Bank.

As an integration architect, which of the below option you would suggest to resolve performance issue?

Options:

A.  

Implement HTTP caching policy for all GET endpoints for the master lookup API and implement locking to synchronize access to object store

B.  

Upgrade vCore size from 0.1 vCore to 0,2 vCore

C.  

Implement HTTP caching policy for all GET endpoints for master lookup API

D.  

Add an additional Cloudhub worker to provide additional capacity

Discussion 0
Questions 36

An organization uses one specific CloudHub (AWS) region for all CloudHub deployments. How are CloudHub workers assigned to availability zones (AZs) when the organization's Mule applications are deployed to CloudHub in that region?

Options:

A.  

Workers belonging to a given environment are assigned to the same AZ within that region.

B.  

AZs are selected as part of the Mule application's deployment configuration.

C.  

Workers are randomly distributed across available AZs within that region.

D.  

An AZ is randomly selected for a Mule application, and all the Mule application's CloudHub workers are assigned to that one AZ

Discussion 0
Questions 37

What are two reasons why a typical MuleSoft customer favors a MuleSoft-hosted Anypoint Platform runtime plane over a customer-hosted runtime for its Mule application deployments? (Choose two.)

Options:

A.  

Reduced application latency

B.  

Increased application isolation

C.  

Reduced time-to-market for the first application

D.  

Increased application throughput

E.  

Reduced IT operations effort

Discussion 0
Questions 38

What is true about automating interactions with Anypoint Platform using tools such as Anypoint Platform REST API's, Anypoint CLI or the Mule Maven plugin?

Options:

A.  

By default, the Anypoint CLI and Mule Maven plugin are not included in the Mule runtime

B.  

Access to Anypoint Platform API;s and Anypoint CLI can be controlled separately thruough the roles and permissions in Anypoint platform, so that specific users can get access to Anypoint CLI while others get access to the platform API's

C.  

Anypoint Platform API's can only automate interactions with CloudHub while the Mule maven plugin is required for deployment to customer hosted Mule runtimes

D.  

API policies can be applied to the Anypoint platform API's so that only certain LOS's has access to specific functions

Discussion 0
Questions 39

A manufacturing company plans to deploy Mule applications to its own

Azure Kubernetes service infrastructure.The organization wants to make

the Mule applications more available and robust by deploying each Mule

application to an isolated Mule runtime in a Docker container while

managing all the Mule applications from the MuleSoft-hosted control plane.

What choice of runtime plane meets these organizational requirements?

Options:

A.  

CloudHub 2.0

B.  

Customer-hosted self-provisioned runtime plane

C.  

Anypoint Service Mesh

D.  

Anypoint Runtime Fabric

Discussion 0
Questions 40

A rale limiting policy has been applied to a soap VI.2 API published in Clondhub. The API implementation catches errors in a global error handler on error propagate in the main flow for HTTP: RETRY_EXHAUSTED with HTTP status set to 429 and any with the HTTP status set to 500.

What is the expected H1TP status when the client exceeds the quota of the API calls?

Options:

A.  

HTTP status 429 as defined in the HTTP:RETRY EXHAUSTED error handler in the API B. HTTP status 500 as defined in the ANY error handler in the API since an API:RETRY_EXHAUSTED will be generated

B.  

HTTP status 401 unauthorized for policy violation

C.  

HTTP status 400 from the rate-limiting policy violation since the call does not reach the back-end

Discussion 0
Questions 41

An external REST client periodically sends an array of records in a single POST request to a Mule application API endpoint.

The Mule application must validate each record of the request against a JSON schema before sending it to a downstream system in the same order that it was received in the array

Record processing will take place inside a router or scope that calls a child flow. The child flow has its own error handling defined. Any validation or communication failures should not prevent further processing of the remaining records.

To best address these requirements what is the most idiomatic(used for it intended purpose) router or scope to used in the parent flow, and what type of error handler should be used in the child flow?

Options:

A.  

First Successful router in the parent flow

On Error Continue error handler in the child flow

B.  

For Each scope in the parent flow

On Error Continue error handler in the child flow

C.  

Parallel For Each scope in the parent flow

On Error Propagate error handler in the child flow

D.  

Until Successful router in the parent flow

On Error Propagate error handler in the child flow

Discussion 0
Questions 42

An organization has several APIs that accept JSON data over HTTP POST. The APIs are all publicly available and are associated with several mobile applications and web applications. The organization does NOT want to use any authentication or compliance policies for these APIs, but at the same time, is worried that some bad actor could send payloads that could somehow compromise the applications or servers running the API implementations. What out-of-the-box Anypoint Platform policy can address exposure to this threat?

Options:

A.  

Apply a Header injection and removal policy that detects the malicious data before it is used

B.  

Apply an IP blacklist policy to all APIs; the blacklist will Include all bad actors

C.  

Shut out bad actors by using HTTPS mutual authentication for all API invocations

D.  

Apply a JSON threat protection policy to all APIs to detect potential threat vectors

Discussion 0
Questions 43

A Mule application is being designed to do the following:

Step 1: Read a SalesOrder message from a JMS queue, where each SalesOrder consists of a header and a list of SalesOrderLineltems.

Step 2: Insert the SalesOrder header and each SalesOrderLineltem into different tables in an RDBMS.

Step 3: Insert the SalesOrder header and the sum of the prices of all its SalesOrderLineltems into a table In a different RDBMS.

No SalesOrder message can be lost and the consistency of all SalesOrder-related information in both RDBMSs must be ensured at all times.

What design choice (including choice of transactions) and order of steps addresses these requirements?

Options:

A.  

1) Read the JMS message (NOT in an XA transaction)

2) Perform BOTH DB inserts in ONE DB transaction

3) Acknowledge the JMS message

B.  

1) Read the JMS message (NOT in an XA transaction)

2) Perform EACH DB insert in a SEPARATE DB transaction

3) Acknowledge the JMS message

C.  

1) Read the JMS message in an XA transaction

2) In the SAME XA transaction, perform BOTH DB inserts but do NOT acknowledge the JMS message

D.  

1) Read and acknowledge the JMS message (NOT in an XA transaction)

2) In a NEW XA transaction, perform BOTH DB inserts

Discussion 0
Questions 44

Refer to the exhibit.

A business process involves the receipt of a file from an external vendor over SFTP. The file needs to be parsed and its content processed, validated, and ultimately persisted to a database. The delivery mechanism is expected to change in the future as more vendors send similar files using other mechanisms such as file transfer or HTTP POST.

What is the most effective way to design for these requirements in order to minimize the impact of future change?

Options:

A.  

Use a MuleSoft Scatter-Gather and a MuleSoft Batch Job to handle the different files coming from different sources

B.  

Create a Process API to receive the file and process it using a MuleSoft Batch Job while delegating the data save process to a System API

C.  

Create an API that receives the file and invokes a Process API with the data contained In the file, then have the Process API process the data using a MuleSoft Batch Job and other System APIs as needed

D.  

Use a composite data source so files can be retrieved from various sources and delivered to a MuleSoft Batch Job for processing

Discussion 0
Questions 45

Refer to the exhibit.

A Mule 4 application has a parent flow that breaks up a JSON array payload into 200 separate items, then sends each item one at a time inside an Async scope to a VM queue.

A second flow to process orders has a VM Listener on the same VM queue. The rest of this flow processes each received item by writing the item to a database.

This Mule application is deployed to four CloudHub workers with persistent queues enabled.

What message processing guarantees are provided by the VM queue and the CloudHub workers, and how are VM messages routed among the CloudHub workers for each invocation of the parent flow under normal operating conditions where all the CloudHub workers remain online?

Options:

A.  

EACH item VM message is processed AT MOST ONCE by ONE CloudHub worker, with workers chosen in a deterministic round-robin fashion Each of the four CloudHub workers can be expected to process 1/4 of the Item VM messages (about 50 items)

B.  

EACH item VM message is processed AT LEAST ONCE by ONE ARBITRARY CloudHub worker Each of the four CloudHub workers can be expected to process some item VM messages

C.  

ALL Item VM messages are processed AT LEAST ONCE by the SAME CloudHub worker where the parent flow was invoked

This one CloudHub worker processes ALL 200 item VM messages

D.  

ALL item VM messages are processed AT MOST ONCE by ONE ARBITRARY CloudHub worker

This one CloudHub worker processes ALL 200 item VM messages

Discussion 0
Questions 46

A company is designing a mule application to consume batch data from a partner's ftps server The data files have been compressed and then digitally signed using PGP.

What inputs are required for the application to securely consumed these files?

Options:

A.  

ATLS context Key Store requiring the private key and certificate for the company

PGP public key of partner

PGP private key for the company

B.  

ATLS context first store containing a public certificate for partner ftps server and the PGP public key of the partner

TLS contact Key Store containing the FTP credentials

C.  

TLS context trust or containing a public certificate for the ftps server The FTP username and password The PGP public key of the partner

D.  

The PGP public key of the partner

The PGP private key for the company

The FTP username and password

Discussion 0
Questions 47

An organization has implemented a continuous integration (CI) lifecycle that promotes Mule applications through code, build, and test stages. To standardize the organization's CI journey, a new dependency control approach is being designed to store artifacts that include information such as dependencies, versioning, and build promotions.

To implement these process improvements, the organization will now require developers to maintain all dependencies related to Mule application code in a shared location.

What is the most idiomatic (used for its intended purpose) type of system the organization should use in a shared location to standardize all dependencies related to Mule application code?

Options:

A.  

A MuleSoft-managed repository at repository.mulesoft.org

B.  

A binary artifact repository

C.  

API Community Manager

D.  

The Anypoint Object Store service at cloudhub.io

Discussion 0
Questions 48

What is a defining characteristic of an integration-Platform-as-a-Service (iPaaS)?

Options:

A.  

A Cloud-based

B.  

No-code

C.  

Code-first

D.  

On-premises

Discussion 0
Questions 49

A leading e-commerce giant will use Mulesoft API's on runtime fabric (RTF) to process customer orders. Some customer's sensitive information such as credit card information is also there as a part of a API payload.

What approach minimizes the risk of matching sensitive data to the original and can convert back to the original value whenever and wherever required?

Options:

A.  

Apply masking to hide the sensitive information and then use API

B.  

manager to detokenize the masking format to return the original value

C.  

create a tokenization format and apply a tokenization policy to the API Gateway

D.  

Used both masking and tokenization

E.  

Apply a field level encryption policy in the API Gateway

Discussion 0
Questions 50

What limits if a particular Anypoint Platform user can discover an asset in Anypoint Exchange?

Options:

A.  

Design Center and RAML were both used to create the asset

B.  

The existence of a public Anypoint Exchange portal to which the asset has been published

C.  

The type of the asset in Anypoint Exchange

D.  

The business groups to which the user belongs

Discussion 0
Questions 51

As a part of project , existing java implementation is being migrated to Mulesoft. Business is very tight on the budget and wish to complete the project in most economical way possible.

Canonical object model using java is already a part of existing implementation. Same object model is required by mule application for a business use case. What is the best way to achieve this?

Options:

A.  

Make use of Java module

B.  

Create similar model for Mule applications

C.  

Create a custom application to read Java code and make it available for Mule application

D.  

Use Anypoint exchange

Discussion 0
Questions 52

How should the developer update the logging configuration in order to enable this package specific debugging?

Options:

A.  

In Anypoint Monitoring, define a logging search query with class property set to org.apache.cxf and level set to DEBUG

B.  

In the Mule application's log4j2.xml file, add an AsyncLogger element with name property set to org.apache.cxf and level set to DEBUG, then redeploy the Mule application in the CloudHub production environment

C.  

In the Mule application's log4j2.xmI file, change the root logger's level property to DEBUG, then redeploy the Mule application to the CloudHub production environment

D.  

In Anypoint Runtime Manager, in the Deployed Application Properties tab for the Mule application, add a line item with DEBUG level for package org.apache.cxf and apply the changes

Discussion 0
Questions 53

In Anypoint Platform, a company wants to configure multiple identity providers (IdPs) for multiple lines of business (LOBs). Multiple business groups, teams, and environments have been defined for these LOBs.

What Anypoint Platform feature can use multiple IdPs across the company’s business groups, teams, and environments?

Options:

A.  

MuleSoft-hosted (CloudHub) dedicated load balancers

B.  

Client (application) management

C.  

Virtual private clouds

D.  

Permissions

Discussion 0
Questions 54

According to MuleSoft, which deployment characteristic applies to a microservices application architecture?

Options:

A.  

Services exist as independent deployment artifacts and can be scaled -independently of other services

B.  

All services of an application can be deployed together as single Java WAR file

C.  

A deployment to enhance one capability requires a redeployment of all capabilities

D.  

Core business capabilities are encapsulated in a single, deployable application

Discussion 0
Questions 55

An organization is designing an integration solution to replicate financial transaction data from a legacy system into a data warehouse (DWH).

The DWH must contain a daily snapshot of financial transactions, to be delivered as a CSV file. Daily transaction volume exceeds tens of millions of records, with significant spikes in volume during popular shopping periods.

What is the most appropriate integration style for an integration solution that meets the organization's current requirements?

Options:

A.  

Event-driven architecture

B.  

Microservice architecture

C.  

API-led connectivity

D.  

Batch-triggered ETL

Discussion 0
Questions 56

When using Anypoint Platform across various lines of business with their own Anypoint Platform business groups, what configuration of Anypoint Platform is always performed at the organization level as opposed to at the business group level?

Options:

A.  

Environment setup

B.  

Identity management setup

C.  

Role and permission setup

D.  

Dedicated Load Balancer setup

Discussion 0
Questions 57

Which Mulesoft feature helps users to delegate their access without sharing sensitive credentials or giving full control of accounts to 3rd parties?

Options:

A.  

Secure Scheme

B.  

client id enforcement policy

C.  

Connected apps

D.  

Certificates

Discussion 0
Questions 58

According to MuleSoft, a synchronous invocation of a RESTful API using HTTP to get an individual customer record from a single system is an example of which system integration interaction pattern?

Options:

A.  

Request-Reply

B.  

Multicast

C.  

Batch

D.  

One-way

Discussion 0
Questions 59

An organization has defined a common object model in Java to mediate the communication between different Mule applications in a consistent way. A Mule application is being built to use this common object model to process responses from a SOAP API and a REST API and then write the processed results to an order management system.

The developers want Anypoint Studio to utilize these common objects to assist in creating mappings for various transformation steps in the Mule application.

What is the most idiomatic (used for its intended purpose) and performant way to utilize these common objects to map between the inbound and outbound systems in the Mule application?

Options:

A.  

Use JAXB (XML) and Jackson (JSON) data bindings

B.  

Use the WSS module

C.  

Use the Java module

D.  

Use the Transform Message component

Discussion 0
Questions 60

Which Anypoint Platform component helps integration developers discovers and share reusable APIs, connectors, and templates?

Options:

A.  

Anypoint Exchange

B.  

API Manager

C.  

Anypoint Studio

D.  

Design Center

Discussion 0
Questions 61

An integration Mule application is deployed to a customer-hosted multi-node Mule 4 runtime duster. The Mule application uses a Listener operation of a JMS connector to receive incoming messages from a JMS queue.

How are the messages consumed by the Mule application?

Options:

A.  

Depending on the JMS provider's configuration, either all messages are consumed by ONLY the primary cluster node or else ALL messages are consumed by ALL cluster nodes

B.  

Regardless of the Listener operation configuration, all messages are consumed by ALL cluster nodes

C.  

Depending on the Listener operation configuration, either all messages are consumed by ONLY the primary cluster node or else EACH message is consumed by ANY ONE cluster node

D.  

Regardless of the Listener operation configuration, all messages are consumed by ONLY the primary cluster node

Discussion 0
Questions 62

When designing an upstream API and its implementation, the development team has been advised to not set timeouts when invoking downstream API. Because the downstream API has no SLA that can be relied upon. This is the only donwstream API dependency of that upstream API. Assume the downstream API runs uninterrupted without crashing. What is the impact of this advice?

Options:

A.  

The invocation of the downstream API will run to completion without timing out.

B.  

An SLA for the upstream API CANNOT be provided.

C.  

A default timeout of 500 ms will automatically be applied by the Mule runtime in which the upstream API implementation executes.

D.  

A load-dependent timeout of less than 1000 ms will be applied by the Mule runtime in which the downstream API implementation executes.

Discussion 0
Questions 63

A Mule application is built to support a local transaction for a series of operations on a single database. The Mule application has a Scatter-Gather that participates in the local transaction.

What is the behavior of the Scatter-Gather when running within this local transaction?

Options:

A.  

Execution of each route within the Scatter-Gather occurs sequentially

Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations

B.  

Execution of all routes within the Scatter-Gather occurs in parallel

Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations

C.  

Execution of each route within the Scatter-Gather occurs sequentially

Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations

D.  

Execution of each route within the Scatter-Gather occurs in parallel

Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations

Discussion 0
Questions 64

An organization has just developed a Mule application that implements a REST API. The mule application will be deployed to a cluster of customer hosted Mule runtimes.

What additional infrastructure component must the customer provide in order to distribute inbound API requests across the Mule runtimes of the cluster?

Options:

A.  

A message broker

B.  

An HTTP Load Balancer

C.  

A database

D.  

An Object Store

Discussion 0
Questions 65

Mule application A receives a request Anypoint MQ message REQU with a payload containing a variable-length list of request objects. Application A uses the For Each scope to split the list into individual objects and sends each object as a message to an Anypoint MQ queue.

Service S listens on that queue, processes each message independently of all other messages, and sends a response message to a response queue.

Application A listens on that response queue and must in turn create and publish a response Anypoint MQ message RESP with a payload containing the list of responses sent by service S in the same order as the request objects originally sent in REQU.

Assume successful response messages are returned by service S for all request messages.

What is required so that application A can ensure that the length and order of the list of objects in RESP and REQU match, while at the same time maximizing message throughput?

Options:

A.  

Use a Scatter-Gather within the For Each scope to ensure response message order Configure the Scatter-Gather with a persistent object store

B.  

Perform all communication involving service S synchronously from within the For Each scope, so objects in RESP are in the exact same order as request objects in REQU

C.  

Use an Async scope within the For Each scope and collect response messages in a second For Each scope in the order In which they arrive, then send RESP using this list of responses

D.  

Keep track of the list length and all object indices in REQU, both in the For Each scope and in all communication involving service Use persistent storage when creating RESP

Discussion 0
Questions 66

An automation engineer needs to write scripts to automate the steps of the API lifecycle, including steps to create, publish, deploy and manage APIs and their implementations in Anypoint Platform.

What Anypoint Platform feature can be used to automate the execution of all these actions in scripts in the easiest way without needing to directly invoke the Anypoint Platform REST APIs?

Options:

A.  

Automated Policies in API Manager

B.  

Runtime Manager agent

C.  

The Mule Maven Plugin

D.  

Anypoint CLI

Discussion 0
Questions 67

An organization plans to extend its Mule APIs to the EU (Frankfurt) region.

Currently, all Mule applications are deployed to CloudHub 1.0 in the default North American region, from the North America control plane, following this naming convention: {API-name}—{environment} (for example, Orderssapi—dev, Orders-sapi-—qa, Orders-sapi-—prod, etc.).

There is no network restriction to block communications between APIs.

What strategy should be implemented in order to deploy the same Mule APIs to the CloudHub 1.0 EU region from the North America control plane,

as well as to minimize latency between APIs and target users and systems in Europe?

Options:

A.  

In Runtime Manager, for each Mule application deployment, set the Region property to EU (Frankfurt) and reuse the same Mule application mame as in the North American

region.

Communicate the new urls {API-name}—{environment}.de-ci.cloudhub.io to the consuming API clients In Europe.

B.  

In API Manager, set the Region property to EU (Frankfurt) to create an API proxy named {API-name}—proxy—{environment} for each Mule application.

Communicate the new url {API-name}—proxy—{environment}.de-c1.cloudhub.io to the consuming API clients In Europe.

C.  

In Runtime Manager, for each Mule application deployment, leave the Region property

blank (default) and change the Mule application name to {API-name}—

{environment).de-cl.

Communicate the new urls {API-name}—{environment}.de-ci1.cloudhub.io to the

consuming API clients in Europe.

D.  

In API Manager, leave the Region property blank (default) to deploy an API proxy named {API-name}~proxy~- (environment}.de-cl for each Mule application.

Communicate the new url {API-name}—proxy—{environment}.de-cl.cloudhub.io to the consuming API clients in Europe.

Discussion 0
Questions 68

An organization plans to migrate all its Mule applications to Runtime Fabric (RTF). Currently, all Mule applications have been deployed to CloudHub using automated CI/CD scripts.

What steps should be taken to properly migrate the applications from CloudHub to RTF, while keeping the same automated CI/CD deployment strategy?

Options:

A.  

A runtimefabric dependency should be added as a mule-plugin to the pom.xml file in all the Mule applications.

B.  

runtimeFabric command-line parameter should be added to the CI/CD deployment scripts.

C.  

A runtimefFabricDeployment profile should be added to Mule configuration properties YAML files in all the Mule applications.

CI/CD scripts must be modified to use the new configuration properties.

D.  

runtimefabricDeployment profile should be added to the pom.xml file in all the Mule applications. CI/CD scripts must be modified to use the new RTF profile.

E.  

- The pom.xml and Mule configuration YAML files can remain unchanged in each Mule application.

A --runtimeFabric command-line parameter should be added to the CI/CD deployment scripts

Discussion 0
Questions 69

A Mule application contains a Batch Job with two Batch Steps (Batch_Step_l and Batch_Step_2). A payload with 1000 records is received by the Batch Job.

How many threads are used by the Batch Job to process records, and how does each Batch Step process records within the Batch Job?

Options:

A.  

Each Batch Job uses SEVERAL THREADS for the Batch Steps Each Batch Step instance receives ONE record at a time as the payload, and RECORDS are processed IN PARALLEL within and between the two Batch Steps

B.  

Each Batch Job uses a SINGLE THREAD for all Batch steps Each Batch step instance receives ONE record at a time as the payload, and RECORDS are processed IN ORDER, first through Batch_Step_l and then through Batch_Step_2

C.  

Each Batch Job uses a SINGLE THREAD to process a configured block size of record Each Batch Step instance receives A BLOCK OF records as the payload, and BLOCKS of records are processed IN ORDER

D.  

Each Batch Job uses SEVERAL THREADS for the Batch Steps Each Batch Step instance receives ONE record at a time as the payload, and BATCH STEP INSTANCES execute IN PARALLEL to process records and Batch Steps in ANY order as fast as possible

Discussion 0
Questions 70

According to the Internet Engineering Task Force (IETF), which supporting protocol does File Transfer Protocol (FTP) use for reliable communication?

Options:

A.  

A Secure Sockets Layer (SSL)

B.  

B Transmission Control Protocol (TCP)

C.  

Lightweight Directory Access Protocol (LDAP)

D.  

Hypertext Transfer Protocol (HTTP)

Discussion 0
Questions 71

An Integration Mule application is being designed to synchronize customer data between two systems. One system is an IBM Mainframe and the other system is a Salesforce Marketing Cloud (CRM) instance. Both systems have been deployed in their typical configurations, and are to be invoked using the native protocols provided by Salesforce and IBM.

What interface technologies are the most straightforward and appropriate to use in this Mute application to interact with these systems, assuming that Anypoint Connectors exist that implement these interface technologies?

Options:

A.  

IBM: DB access CRM: gRPC

B.  

IBM: REST CRM:REST

C.  

IBM: Active MQ CRM: REST

D.  

IBM: CICS CRM: SOAP

Discussion 0
Questions 72

An organization needs to enable access to their customer data from both a mobile app and a web application, which each need access to common fields as well as certain unique fields. The data is available partially in a database and partially in a 3rd-party CRM system. What APIs should be created to best fit these design requirements?

Options:

A.  

A Process API that contains the data required by both the web and mobile apps, allowing these applications to invoke it directly and access the data they need thereby providing the flexibility to add more fields in the future without needing API changes.

B.  

One set of APIs (Experience API, Process API, and System API) for the web app, and another set for the mobile app.

C.  

Separate Experience APIs for the mobile and web app, but a common Process API that invokes separate System APIs created for the database and CRM system

D.  

A common Experience API used by both the web and mobile apps, but separate Process APIs for the web and mobile apps that interact with the database and the CRM System.

Discussion 0
Questions 73

An organization if struggling frequent plugin version upgrades and external plugin project dependencies. The team wants to minimize the impact on applications by creating best practices that will define a set of default dependencies across all new and in progress projects.

How can these best practices be achieved with the applications having the least amount of responsibility?

Options:

A.  

Create a Mule plugin project with all the dependencies and add it as a dependency in each application's POM.xml file

B.  

Create a mule domain project with all the dependencies define in its POM.xml file and add each application to the domain Project

C.  

Add all dependencies in each application's POM.xml file

D.  

Create a parent POM of all the required dependencies and reference each in each application's POM.xml file

Discussion 0
Questions 74

Which type of communication is managed by a service mesh in a microservices architecture?

Options:

A.  

Communication between microservices runtime administrators

B.  

Communication between microservices developers

C.  

Communication between microservices

D.  

Communication between trading partner services

Discussion 0
Questions 75

A Mule application is synchronizing customer data between two different database systems.

What is the main benefit of using eXtended Architecture (XA) transactions over local transactions to synchronize these two different database systems?

Options:

A.  

An XA transaction synchronizes the database systems with the least amount of Mule configuration or coding

B.  

An XA transaction handles the largest number of requests in the shortest time

C.  

An XA transaction automatically rolls back operations against both database systems if any operation falls

D.  

An XA transaction writes to both database systems as fast as possible

Discussion 0
Questions 76

An organization is designing an integration Mule application to process orders by submitting them to a back-end system for offline processing. Each order will be received by the Mule application through an HTTPS POST and must be acknowledged immediately. Once acknowledged, the order will be submitted to a back-end system. Orders that cannot be successfully submitted due to rejections from the back-end system will need to be processed manually (outside the back-end system).

The Mule application will be deployed to a customer-hosted runtime and is able to use an existing ActiveMQ broker if needed. The ActiveMQ broker is located inside the organization’s firewall. The back-end system has a track record of unreliability due to both minor network connectivity issues and longer outages.

What idiomatic (used for their intended purposes) combination of Mule application components and ActiveMQ queues are required to ensure automatic submission of orders to the back-end system while supporting but minimizing manual order processing?

Options:

A.  

An Until Successful scope to call the back-end system

One or more ActiveMQ long-retry queues

One or more ActiveMQ dead-letter queues for manual processing

B.  

One or more On Error scopes to assist calling the back-end system

An Until Successful scope containing VM components for long retries

A persistent dead-letter VM queue configured in CloudHub

C.  

One or more On Error scopes to assist calling the back-end system

One or more ActiveMQ long-retry queues

A persistent dead-letter object store configured in the CloudHub Object Store service

D.  

A Batch Job scope to call the back-end system

An Until Successful scope containing Object Store components for long retries

A dead-letter object store configured in the Mule application

Discussion 0
Questions 77

A mule application is deployed to a Single Cloudhub worker and the public URL appears in Runtime Manager as the APP URL.

Requests are sent by external web clients over the public internet to the mule application App url. Each of these requests routed to the HTTPS Listener event source of the running Mule application.

Later, the DevOps team edits some properties of this running Mule application in Runtime Manager.

Immediately after the new property values are applied in runtime manager, how is the current Mule application deployment affected and how will future web client requests to the Mule application be handled?

Options:

A.  

Cloudhub will redeploy the Mule application to the OLD Cloudhub worker

New web client requests will RETURN AN ERROR until the Mule application is redeployed to the OLD Cloudhub worker

B.  

CloudHub will redeploy the Mule application to a NEW Cloudhub worker

New web client requests will RETURN AN ERROR until the NEW Cloudhub worker is available

C.  

Cloudhub will redeploy the Mule application to a NEW Cloudhub worker

New web client requests are ROUTED to the OLD Cloudhub worker until the NEW Cloudhub worker is available.

D.  

Cloudhub will redeploy the mule application to the OLD Cloudhub worker

New web client requests are ROUTED to the OLD Cloudhub worker BOTH before and after the Mule application is redeployed.

Discussion 0
Questions 78

How does timeout attribute help inform design decisions while using JMS connector listening for incoming messages in an extended architecture (XA) transaction?

Options:

A.  

After the timeout is exceeded, stale JMS consumer threads are destroyed and new threads are created

B.  

The timeout specifies the time allowed to pass between receiving JMS messages on the same JMS connection and then after the timeout new JMS connection is established

C.  

The time allowed to pass between committing the transaction and the completion of the mule flow and then after the timeout flow processing triggers an error

D.  

The timeout defines the time that is allowed to pass without the transaction ending explicitly and after the timeout expires, the transaction rolls back

Discussion 0
Questions 79

A mule application is being designed to perform product orchestration. The Mule application needs to join together the responses from an inventory API and a Product Sales History API with the least latency.

To minimize the overall latency. What is the most idiomatic (used for its intended purpose) design to call each API request in the Mule application?

Options:

A.  

Call each API request in a separate lookup call from Dataweave reduce operator

B.  

Call each API request in a separate route of a Scatter-Gather

C.  

Call each API request in a separate route of a Parallel For Each scope

D.  

Call each API request in a separate Async scope

Discussion 0
Questions 80

Mule applications need to be deployed to CloudHub so they can access on-premises database systems. These systems store sensitive and hence tightly protected data, so are not accessible over the internet.

What network architecture supports this requirement?

Options:

A.  

An Anypoint VPC connected to the on-premises network using an IPsec tunnel or AWS DirectConnect, plus matching firewall rules in the VPC and on-premises network

B.  

Static IP addresses for the Mule applications deployed to the CloudHub Shared Worker Cloud, plus matching firewall rules and IP

whitelisting in the on-premises network

C.  

An Anypoint VPC with one Dedicated Load Balancer fronting each on-premises database system, plus matching IP whitelisting in the load balancer and firewall rules in the VPC and on-premises network

D.  

Relocation of the database systems to a DMZ in the on-premises network, with Mule applications deployed to the CloudHub Shared Worker Cloud connecting only to the DMZ

Discussion 0
Questions 81

An integration Mute application consumes and processes a list of rows from a CSV file. Each row must be read from the CSV file, validated, and the row data sent to a JMS queue, in the exact order as in the CSV file.

If any processing step for a row falls, then a log entry must be written for that row, but processing of other rows must not be affected.

What combination of Mute components is most idiomatic (used according to their intended purpose) when Implementing the above requirements?

Options:

A.  

Scatter-Gather component On Error Continue scope

B.  

VM connector first Successful scope On Error Propagate scope

C.  

For Each scope On Error Continue scope

D.  

Async scope On Error Propagate scope

Discussion 0