Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

MuleSoft-Integration-Architect-I Sample Questions Answers

Questions 4

Refer to the exhibit.

This Mule application is deployed to multiple Cloudhub workers with persistent queue enabled. The retrievefile flow event source reads a CSV file from a remote SFTP server and then publishes each record in the CSV file to a VM queue. The processCustomerRecords flow’s VM Listner receives messages from the same VM queue and then processes each message separately.

How are messages routed to the cloudhub workers as messages are received by the VM Listener?

Options:

A.

Each message is routed to ONE of the Cloudhub workers in a DETERMINSTIC round robin fashion thereby EXACTLY BALANCING messages among the cloudhub workers

B.

Each messages routes to ONE of the available Clouhub workers in a NON- DETERMINSTIC non round-robin fashion thereby APPROXIMATELY BALANCING messages among the cloudhub workers

C.

Each message is routed to the SAME Cloudhub worker that retrieved the file, thereby BINDING ALL messages to ONLY that ONE Cloudhub worker

D.

Each message is duplicated to ALL of the Cloudhub workers, thereby SHARING EACH message with ALL the Cloudhub workers.

Buy Now
Questions 5

An API implementation is being designed that must invoke an Order API which is known to repeatedly experience downtime. For this reason a fallback API is to be called when the Order API is unavailable. What approach to designing invocation of the fallback API provides the best resilience?

Options:

A.

Redirect client requests through an HTTP 303 temporary redirect status code to the fallback API whenever the Order API is unavailable

B.

Set an option in the HTTP Requester component that invokes the order API to instead invoke a fallback API whenever an HTTP 4XX or 5XX response status code is received from Order API

C.

Create a separate entry for the order API in API manager and then invoke this API as a fallback API if the primary Order API is unavailable

D.

Search Anypoint Exchange for a suitable existing fallback API and them implement invocations to their fallback API in addition to the Order API

Buy Now
Questions 6

According to MuleSoft, what is a major distinguishing characteristic of an application network in relation to the integration of systems, data, and devices?

Options:

A.

It uses a well-organized monolithic approach with standards

B.

It is built for change and self-service

C.

It leverages well-accepted internet standards like HTTP and JSON

D.

It uses CI/CD automation for real-time project delivery

Buy Now
Questions 7

A leading bank implementing new mule API.

The purpose of API to fetch the customer account balances from the backend application and display them on the online platform the online banking platform. The online banking platform will send an array of accounts to Mule API get the account balances.

As a part of the processing the Mule API needs to insert the data into the database for auditing purposes and this process should not have any performance related implications on the account balance retrieval flow

How should this requirement be implemented to achieve better throughput?

Options:

A.

Implement the Async scope fetch the data from the backend application and to insert records in the Audit database

B.

Implement a for each scope to fetch the data from the back-end application and to insert records into the Audit database

C.

Implement a try-catch scope to fetch the data from the back-end application and use the Async scope to insert records into the Audit database

D.

Implement parallel for each scope to fetch the data from the backend application and use Async scope to insert the records into the Audit database

Buy Now
Questions 8

A mule application is being designed to perform product orchestration. The Mule application needs to join together the responses from an inventory API and a Product Sales History API with the least latency.

To minimize the overall latency. What is the most idiomatic (used for its intended purpose) design to call each API request in the Mule application?

Options:

A.

Call each API request in a separate lookup call from Dataweave reduce operator

B.

Call each API request in a separate route of a Scatter-Gather

C.

Call each API request in a separate route of a Parallel For Each scope

D.

Call each API request in a separate Async scope

Buy Now
Questions 9

An organization's IT team follows an API-led connectivity approach and must use Anypoint Platform to implement a System AP\ that securely accesses customer data. The organization uses Salesforce as the system of record for all customer data, and its most important objective is to reduce the overall development time to release the System API.

The team's integration architect has identified four different approaches to access the customer data from within the implementation of the System API by using different Anypoint Connectors that all meet the technical requirements of the project.

Options:

A.

Use the Anypoint Connector for Database to connect to a MySQL database to access a copy of the customer data

B.

Use the Anypoint Connector for HTTP to connect to the Salesforce APIs to directly access the customer data

C.

Use the Anypoint Connector for Salesforce to connect to the Salesforce APIs to directly access the customer data

D.

Use the Anypoint Connector tor FTP to download a file containing a recent near-real time extract of the customer data

Buy Now
Questions 10

A corporation has deployed multiple mule applications implementing various public and private API's to different cloudhub workers. These API's arc Critical applications that must be highly available and in line with the reliability SLA as defined by stakeholders.

How can API availability (liveliness or readiness) be monitored so that Ops team receives outage notifications?

Options:

A.

Enable monitoring of individual applications from Anypoint monitoring

B.

Configure alerts with failure conditions in runtime manager

C.

Configure alerts failure conditions in API manager

D.

Use any point functional monitoring test API's functional behavior

Buy Now
Questions 11

What operation can be performed through a JMX agent enabled in a Mule application?

Options:

A.

View object store entries

B.

Replay an unsuccessful message

C.

Set a particular tog4J2 log level to TRACE

D.

Deploy a Mule application

Buy Now
Questions 12

An API has been unit tested and is ready for integration testing. The API is governed by a Client ID Enforcement policy in all environments.

What must the testing team do before they can start integration testing the API in the Staging environment?

Options:

A.

They must access the API portal and create an API notebook using the Client ID and Client Secret supplied by the API portal in the Staging environment

B.

They must request access to the API instance in the Staging environment and obtain a Client ID and Client Secret to be used for testing the API

C.

They must be assigned as an API version owner of the API in the Staging environment

D.

They must request access to the Staging environment and obtain the Client ID and Client Secret for that environment to be used for testing the API

Buy Now
Questions 13

What condition requires using a CloudHub Dedicated Load Balancer?

Options:

A.

When cross-region load balancing is required between separate deployments of the same Mule application

B.

When custom DNS names are required for API implementations deployed to customer-hosted Mule runtimes

C.

When API invocations across multiple CloudHub workers must be load balanced

D.

When server-side load-balanced TLS mutual authentication is required between API implementations and API clients

Buy Now
Questions 14

As a part of project requirement, client will send a stream of data to mule application. Payload size can vary between 10mb to 5GB. Mule application is required to transform the data and send across multiple sftp servers. Due to the cost cuttings in the organization, mule application can only be allocated one worker with size of 0.2 vCore.

As an integration architect , which streaming strategy you would suggest to handle this scenario?

Options:

A.

In-memory non repeatable stream

B.

File based non-repeatable stream

C.

In-memory repeatable stream

D.

File based repeatable storage

Buy Now
Questions 15

According to MuleSoft, which system integration term describes the method, format, and protocol used for communication between two system?

Options:

A.

Component

B.

interaction

C.

Message

D.

Interface

Buy Now
Questions 16

A Mule application is built to support a local transaction for a series of operations on a single database. The Mule application has a Scatter-Gather that participates in the local transaction.

What is the behavior of the Scatter-Gather when running within this local transaction?

Options:

A.

Execution of each route within the Scatter-Gather occurs sequentially

Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations

B.

Execution of all routes within the Scatter-Gather occurs in parallel

Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations

C.

Execution of each route within the Scatter-Gather occurs sequentially

Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations

D.

Execution of each route within the Scatter-Gather occurs in parallel

Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations

Buy Now
Questions 17

A company is planning to migrate its deployment environment from on-premises cluster to a Runtime Fabric (RTF) cluster. It also has a requirement to enable Mule applications deployed to a Mule runtime instance to store and share data across application replicas and restarts.

How can these requirements be met?

Options:

A.

Anypoint object store V2 to share data between replicas in the RTF cluster

B.

Install the object store pod on one of the cluster nodes

C.

Configure Persistence Gateway in any of the servers using Mule Object Store

D.

Configure Persistent Gateway at the RTF

Buy Now
Questions 18

In a Mule Application, a flow contains two (2) JMS consume operations that are used to connect to a JMS broker and consume messages from two(2) JMS destination. The Mule application then joins the two JMS messages together.

The JMS broker does not implement high availability (HA) and periodically experiences scheduled outages of upto 10 mins for routine maintenance.

What is the most idiomatic (used for its intented purpose) way to build the mule flow so it can best recover from the expected outages?

Options:

A.

Configure a reconnection strategy for the JMS connector

B.

Enclose the two(2) JMS operation in an Until Successful scope

C.

Consider a transaction for the JMS connector

D.

Enclose the two(2) JMS operations in a Try scope with an Error Continue error handler

Buy Now
Questions 19

An organization has an HTTPS-enabled Mule application named Orders API that receives requests from another Mule application named Process Orders.

The communication between these two Mule applications must be secured by TLS mutual authentication (two-way TLS).

At a minimum, what must be stored in each truststore and keystore of these two Mule applications to properly support two-way TLS between the two Mule applications while properly protecting each Mule application's keys?

Options:

A.

Orders API truststore: The Orders API public key

Process Orders keystore: The Process Orders private key and public key

B.

Orders API truststore: The Orders API private key and public key

Process Orders keystore: The Process Orders private key public key

C.

Orders API truststore: The Process Orders public key

Orders API keystore: The Orders API private key and public key

Process Orders truststore: The Orders API public key

Process Orders keystore: The Process Orders private key and public key

D.

Orders API truststore: The Process Orders public key

Orders API keystore: The Orders API private key

Process Orders truststore: The Orders API public key

Process Orders keystore: The Process Orders private key

Buy Now
Questions 20

A mule application is deployed to a Single Cloudhub worker and the public URL appears in Runtime Manager as the APP URL.

Requests are sent by external web clients over the public internet to the mule application App url. Each of these requests routed to the HTTPS Listener event source of the running Mule application.

Later, the DevOps team edits some properties of this running Mule application in Runtime Manager.

Immediately after the new property values are applied in runtime manager, how is the current Mule application deployment affected and how will future web client requests to the Mule application be handled?

Options:

A.

Cloudhub will redeploy the Mule application to the OLD Cloudhub worker

New web client requests will RETURN AN ERROR until the Mule application is redeployed to the OLD Cloudhub worker

B.

CloudHub will redeploy the Mule application to a NEW Cloudhub worker

New web client requests will RETURN AN ERROR until the NEW Cloudhub worker is available

C.

Cloudhub will redeploy the Mule application to a NEW Cloudhub worker

New web client requests are ROUTED to the OLD Cloudhub worker until the NEW Cloudhub worker is available.

D.

Cloudhub will redeploy the mule application to the OLD Cloudhub worker

New web client requests are ROUTED to the OLD Cloudhub worker BOTH before and after the Mule application is redeployed.

Buy Now
Questions 21

A mule application designed to fulfil two requirements

a) Processing files are synchronously from an FTPS server to a back-end database using VM intermediary queues for load balancing VM events

b) Processing a medium rate of records from a source to a target system using batch job scope

Considering the processing reliability requirements for FTPS files, how should VM queues be configured for processing files as well as for the batch job scope if the application is deployed to Cloudhub workers?

Options:

A.

Use Cloud hub persistent queues for FTPS files processing

There is no need to configure VM queues for the batch jobs scope as it uses by default the worker's disc for VM queueing

B.

Use Cloud hub persistent VM queue for FTPS file processing

There is no need to configure VM queues for the batch jobs scope as it uses by default the worker's JVM memory for VM queueing

C.

Use Cloud hub persistent VM queues for FTPS file processing

Disable VM queue for the batch job scope

D.

Use VM connector persistent queues for FTPS file processing Disable VM queue for the batch job scope

Buy Now
Questions 22

An organization has defined a common object model in Java to mediate the communication between different Mule applications in a consistent way. A Mule application is being built to use this common object model to process responses from a SOAP API and a REST API and then write the processed results to an order management system.

The developers want Anypoint Studio to utilize these common objects to assist in creating mappings for various transformation steps in the Mule application.

What is the most idiomatic (used for its intended purpose) and performant way to utilize these common objects to map between the inbound and outbound systems in the Mule application?

Options:

A.

Use JAXB (XML) and Jackson (JSON) data bindings

B.

Use the WSS module

C.

Use the Java module

D.

Use the Transform Message component

Buy Now
Questions 23

What API policy would LEAST likely be applied to a Process API?

Options:

A.

Custom circuit breaker

B.

Client ID enforcement

C.

Rate limiting

D.

JSON threat protection

Buy Now
Questions 24

The AnyAirline organization's passenger reservations center is designing an integration solution that combines invocations of three different System APIs (bookFlight, bookHotel, and bookCar) in a business transaction. Each System API makes calls to a single database.

The entire business transaction must be rolled back when at least one of the APIs fails.

What is the most idiomatic (used for its intended purpose) way to integrate these APIs in near real-time that provides the best balance of consistency, performance, and reliability?

Options:

A.

Implement eXtended Architecture (XA) transactions between the API implementations

Coordinate between the API implementations using a Saga pattern

Implement caching in each API implementation to improve performance

B.

Implement local transactions within each API implementation

Configure each API implementation to also participate in the same eXtended Architecture (XA) transaction

Implement caching in each API implementation to improve performance

C.

Implement local transactions in each API implementation

Coordinate between the API implementations using a Saga pattern

Apply various compensating actions depending on where a failure occurs

D.

Implement an eXtended Architecture (XA) transaction manager in a Mule application using a Saga pattern

Connect each API implementation with the Mule application using XA transactions

Apply various compensating actions depending on where a failure occurs

Buy Now
Questions 25

A large life sciences customer plans to use the Mule Tracing module with the Mapped Diagnostic Context (MDC) logging operations to enrich logging in its Mule application and to improve tracking by providing more context in the Mule application logs. The customer also wants to improve throughput and lower the message processing latency in its Mule application flows.

After installing the Mule Tracing module in the Mule application, how should logging be performed in flows in Mule applications, and what should be changed In the log4j2.xml files?

Options:

A.

In the flows, add Mule Tracing module Set logging variable operations before any Core Logger components.

In log4j2.xml files, change the appender's pattern layout to use %MDC and then assign the appender to a Logger or Root element.

B.

In the flows, add Mule Tracing module Set logging variable operations before any Core

Logger components.

In log4j2.xmI files, change the appender’s pattern layout to use the %MDC placeholder and then assign the appender to an AsyncLogger element.

C.

In the flows, add Mule Tracing module Set logging variable operations before any Core

Logger components.

In log4j2.xmI files, change the appender’'s pattern layout to use %asyncLogger placeholder and then assign the appender to an AsyncLogger element.

D.

In the flows, wrap Logger components in Async scopes. In log4j2.xmI files, change the appender's pattern layout to use the %asyncLogger

placeholder and then assign the appender to a Logger or Root element.

Buy Now
Questions 26

According to the National Institute of Standards and Technology (NIST), which cloud computing deployment model describes a composition of two or more distinct clouds that support data and application portability?

Options:

A.

Private cloud

B.

Hybrid cloud 4

C.

Public cloud

D.

Community cloud

Buy Now
Questions 27

A company is implementing a new Mule application that supports a set of critical functions driven by a rest API enabled, claims payment rules engine hosted on oracle ERP. As designed the mule application requires many data transformation operations as it performs its batch processing logic.

The company wants to leverage and reuse as many of its existing java-based capabilities (classes, objects, data model etc.) as possible

What approach should be considered when implementing required data mappings and transformations between Mule application and Oracle ERP in the new Mule application?

Options:

A.

Create a new metadata RAML classes in Mule from the appropriate Java objects and then perform transformations via Dataweave

B.

From the mule application, transform via theXSLT model

C.

Transform by calling any suitable Java class from Dataweave

D.

Invoke any of the appropriate Java methods directly, create metadata RAML classes and then perform required transformations via Dataweave

Buy Now
Questions 28

Refer to the exhibit.

What is the type data format shown in the exhibit?

Options:

A.

JSON

B.

XML

C.

YAML

D.

CSV

Buy Now
Questions 29

A Kubernetes controller automatically adds another pod replica to the resource pool in response to increased application load.

Which scalability option is the controller implementing?

Options:

A.

Down

B.

Diagonal

C.

Vertical

D.

Horizontal

Buy Now
Questions 30

An organization has decided on a cloudhub migration strategy that aims to minimize the organizations own IT resources. Currently, the organizational has all of its Mule applications running on its own premises and uses an premises load balancer that exposes all APIs under the base URL https://api.acme.com

As part of the migration strategy, the organization plans to migrate all of its Mule applications and load balancer to cloudhub

What is the most straight-forward and cost effective approach to the Mule applications deployment and load balancing that preserves the public URLs?

Options:

A.

Deploy the Mule applications to Cloudhub

Update the CNAME record for an api.acme.com in the organizations DNS server pointing to the A record of a cloudhub dedicated load balancer(DLB)

Apply mapping rules in the DLB to map URLs to their corresponding Mule applications

B.

For each migrated Mule application, deploy an API proxy Mule application to Cloudhub with all applications under the control of a dedicated load balancer(CLB)

Update the CNAME record for api.acme.com in the organization DNS server pointing to the A record of a cloudhub dedicated load balancer(DLB)

Apply mapping rules in the DLB to map each API proxy application to its corresponding Mule applications

C.

Deploy the Mule applications to Cloudhub

Create CNAME record for api.acme.com in the Cloudhub Shared load balancer (SLB) pointing to the A record of the on-premise load balancer

Apply mapping rules in the SLB to map URLs to their corresponding Mule applications

D.

Deploy the Mule applications to Cloudhub

Update the CNAME record for api.acme.com in the organization DNS server pointing to the A record of the cloudhub shared load balancer(SLB)

Apply mapping rules in the SLB to map URLs to their corresponding Mule applications.

Buy Now
Questions 31

A project uses Jenkins to implement CI/CD process. It was observed that each Mule package contains some of the Jenkins files and folders for configurations of CI/CD jobs.

As these files and folders are not part of the actual package, expectation is that these should not be part of deployed archive.

Which file can be used to exclude these files and folders from the deployed archive?

Options:

A.

muleignore

B.

_unTrackMule

C.

mulelnclude

D.

_muleExclude

Buy Now
Questions 32

An organization is evaluating using the CloudHub shared Load Balancer (SLB) vs creating a CloudHub dedicated load balancer (DLB). They are evaluating how this choice affects the various types of certificates used by CloudHub deplpoyed Mule applications, including MuleSoft-provided, customer-provided, or Mule application-provided certificates.

What type of restrictions exist on the types of certificates that can be exposed by the CloudHub Shared Load Balancer (SLB) to external web clients over the public internet?

Options:

A.

Only MuleSoft-provided certificates are exposed.

B.

Only customer-provided wildcard certificates are exposed.

C.

Only customer-provided self-signed certificates are exposed.

D.

Only underlying Mule application certificates are exposed (pass-through)

Questions 33

A Mule application is being designed To receive nightly a CSV file containing millions of records from an external vendor over SFTP, The records from the file need to be validated, transformed. And then written to a database. Records can be inserted into the database in any order.

In this use case, what combination of Mule components provides the most effective and performant way to write these records to the database?

Options:

A.

Use a Parallel for Each scope to Insert records one by one into the database

B.

Use a Scatter-Gather to bulk insert records into the database

C.

Use a Batch job scope to bulk insert records into the database.

D.

Use a DataWeave map operation and an Async scope to insert records one by one into the database.

Buy Now
Questions 34

A company is designing an integration Mule application to process orders by submitting them to a back-end system for offline processing. Each order will be received by the Mule application through an HTTP5 POST and must be acknowledged immediately.

Once acknowledged the order will be submitted to a back-end system. Orders that cannot be successfully submitted due to the rejections from the back-end system will need to be processed manually (outside the banking system).

The mule application will be deployed to a customer hosted runtime and will be able to use an existing ActiveMQ broker if needed. The ActiveMQ broker is located inside the organization's firewall. The back-end system has a track record of unreliability due to both minor network connectivity issues and longer outages.

Which combination of Mule application components and ActiveMQ queues are required to ensure automatic submission of orders to the back-end system while supporting but minimizing manual order processing?

Options:

A.

One or more On Error scopes to assist calling the back-end system An Untill successful scope containing VM components for long retries A persistent dead-letter VM queue configure in Cloud hub

B.

An Until Successful scope to call the back-end system One or more ActiveMQ long-retry queues One or more ActiveMQ dead-letter queues for manual processing

C.

One or more on-Error scopes to assist calling the back-end system one or more ActiveMQ long-retry queues A persistent dead-letter Object store configuration in the CloudHub object store service

D.

A batch job scope to call the back in system An Untill successful scope containing Object Store components for long retries. A dead-letter object store configured in the Mule application

Buy Now
Questions 35

An insurance company is implementing a MuleSoft API to get inventory details from the two vendors. Due to network issues, the invocations to vendor applications are getting timed-out intermittently. But the transactions are successful upon reprocessing

What is the most performant way of implementing this requirement?

Options:

A.

Implement a scatter-gather scope to invoke the two vendor

applications on two different route

Use the Until-Successful scope to implement the retry mechanism

for timeout errors on each route

B.

Implement a Choice scope to invoke the two vendor applications on two different route

Use the try-catch scope to implement the retry mechanism for timeout errors on each route

C.

Implement a For-Each scope to invoke the two vendor applications

Use until successful scope to implement the retry mechanism for the timeout errors

D.

Implement Round-Robin scope to invoke the two vendor applications on two different routes

Use the Try-Catch scope to implement retry mechanism for timeout errors on each route

Buy Now
Questions 36

A developer needs to discover which API specifications have been created within the organization before starting a new project.

Which Anypoint Platform component can the developer use to find and try out the currently released API specifications?

Options:

A.

Anypoint Exchange

B.

Runtime Manager

C.

API Manager

D.

Object Store

Buy Now
Questions 37

An organization will deploy Mule applications to Cloudhub, Business requirements mandate that all application logs be stored ONLY in an external splunk consolidated logging service and NOT in Cloudhub.

In order to most easily store Mule application logs ONLY in Splunk, how must Mule application logging be configured in Runtime Manager, and where should the log4j2 splunk appender be defined?

Options:

A.

Keep the default logging configuration in RuntimeManager

Define the splunk appender in ONE global log4j.xml file that is uploaded once to Runtime Manager to support at Mule application deployments.

B.

Disable Cloudhub logging in Runtime Manager

Define the splunk appender in EACH Mule application’s log4j2.xml file

C.

Disable Cloudhub logging in Runtime Manager

Define the splunk appender in ONE global log4j.xml file that is uploaded once to Runtime Manger to support at Mule application deployments.

D.

Keep the default logging configuration in Runtime Manager

Define the Splunk appender in EACH Mule application log4j2.xml file

Buy Now
Questions 38

Which Salesforce API is invoked to deploy, retrieve, create or delete customization information such as custom object definitions using a Mule Salesforce connector in a Mule application?

Options:

A.

Metadata API

B.

REST API

C.

SOAP API

D.

Bulk API

Buy Now
Questions 39

Refer to the exhibit.

A Mule 4 application has a parent flow that breaks up a JSON array payload into 200 separate items, then sends each item one at a time inside an Async scope to a VM queue.

A second flow to process orders has a VM Listener on the same VM queue. The rest of this flow processes each received item by writing the item to a database.

This Mule application is deployed to four CloudHub workers with persistent queues enabled.

What message processing guarantees are provided by the VM queue and the CloudHub workers, and how are VM messages routed among the CloudHub workers for each invocation of the parent flow under normal operating conditions where all the CloudHub workers remain online?

Options:

A.

EACH item VM message is processed AT MOST ONCE by ONE CloudHub worker, with workers chosen in a deterministic round-robin fashion Each of the four CloudHub workers can be expected to process 1/4 of the Item VM messages (about 50 items)

B.

EACH item VM message is processed AT LEAST ONCE by ONE ARBITRARY CloudHub worker Each of the four CloudHub workers can be expected to process some item VM messages

C.

ALL Item VM messages are processed AT LEAST ONCE by the SAME CloudHub worker where the parent flow was invoked

This one CloudHub worker processes ALL 200 item VM messages

D.

ALL item VM messages are processed AT MOST ONCE by ONE ARBITRARY CloudHub worker

This one CloudHub worker processes ALL 200 item VM messages

Buy Now
Questions 40

An organization if struggling frequent plugin version upgrades and external plugin project dependencies. The team wants to minimize the impact on applications by creating best practices that will define a set of default dependencies across all new and in progress projects.

How can these best practices be achieved with the applications having the least amount of responsibility?

Options:

A.

Create a Mule plugin project with all the dependencies and add it as a dependency in each application's POM.xml file

B.

Create a mule domain project with all the dependencies define in its POM.xml file and add each application to the domain Project

C.

Add all dependencies in each application's POM.xml file

D.

Create a parent POM of all the required dependencies and reference each in each application's POM.xml file

Buy Now
Questions 41

A project team is working on an API implementation using the RAML definition as a starting point. The team has updated the definition to include new operations and has published a new version to exchange. Meanwhile another team is working on a mule application consuming the same API implementation.

During the development what has to be performed by the mule application team to take advantage of the newly added operations?

Options:

A.

Scaffold the client application with the new definition

B.

Scaffold API implementation application with the new definition

C.

Update the REST connector from exchange in the client application

D.

Update the API connector in the API implementation and publish to exchange

Buy Now
Questions 42

An organization has strict unit test requirement that mandate every mule application must have an MUnit test suit with a test case defined for each flow and a minimum test coverage of 80%.

A developer is building Munit test suit for a newly developed mule application that sends API request to an external rest API.

What is the effective approach for successfully executing the Munit tests of this new application while still achieving the required test coverage for the Munit tests?

Options:

A.

Invoke the external endpoint of the rest API from the mule floors

B.

Mark the rest API invocations in the Munits and then call the mocking service flow that simulates standard responses from the REST API

C.

Mock the rest API invocation in the Munits and return a mock response for those invocations

D.

Create a mocking service flow to simulate standard responses from the rest API and then configure the mule flows to call the marking service flow

Buy Now
Questions 43

An organization is designing the following two Mule applications that must share data via a common persistent object store instance:

- Mule application P will be deployed within their on-premises datacenter.

- Mule application C will run on CloudHub in an Anypoint VPC.

The object store implementation used by CloudHub is the Anypoint Object Store v2 (OSv2).

what type of object store(s) should be used, and what design gives both Mule applications access to the same object store instance?

Options:

A.

Application P uses the Object Store connector to access a persistent object store Application C accesses this persistent object store via the Object Store REST API through an IPsec tunnel

B.

Application C and P both use the Object Store connector to access the Anypoint Object Store v2

C.

Application C uses the Object Store connector to access a persistent object Application P accesses the persistent object store via the Object Store REST API

D.

Application C and P both use the Object Store connector to access a persistent object store

Buy Now
Questions 44

A Mule application is being designed for deployment to a single CloudHub worker. The Mule application will have a flow that connects to a SaaS system to perform some operations each time the flow is invoked.

The SaaS system connector has operations that can be configured to request a short-lived token (fifteen minutes) that can be reused for subsequent connections within the fifteen minute time window. After the token expires, a new token must be requested and stored.

What is the most performant and idiomatic (used for its intended purpose) Anypoint Platform component or service to use to support persisting and reusing tokens in the Mule application to help speed up reconnecting the Mule application to the SaaS application?

Options:

A.

Nonpersistent object store

B.

Persistent object store

C.

Variable

D.

Database

Buy Now
Questions 45

What is a key difference between synchronous and asynchronous logging from Mule applications?

Options:

A.

Synchronous logging writes log messages in a single logging thread but does not block the Mule event being processed by the next event processor

B.

Asynchronous logging can improve Mule event processing throughput while also reducing the processing time for each Mule event

C.

Asynchronous logging produces more reliable audit trails with more accurate timestamps

D.

Synchronous logging within an ongoing transaction writes log messages in the same thread that processes the current Mule event

Buy Now
Questions 46

As part of a growth strategy, a supplier signs a trading agreement with a large customer. The customer sends purchase orders to the supplier according to the ANSI X12 EDI standard, and the supplier creates the orders in its ERP system using the information in the EDI document.

The agreement also requires that the supplier provide a new RESTful API to process request from the customer for current product inventory level from the supplier’ s ERP system.

Which two fundamental integration use cases does the supplier need to deliver to provide an end-to-end solution for this business scenario? (Choose two.)

Options:

A.

Synchronized data transfer

B.

Sharing data with external partners

C.

User interface integration

D.

Streaming data ingestion

E.

Data mashups

Buy Now
Questions 47

A stock trading company handles millions of trades a day and requires excellent performance and reliability within its stock trading system. The company operates a number of event-driven APIs Implemented as Mule applications that are hosted on various customer-hosted Mule clusters and needs to enable message exchanges between the APIs within their internal network using shared message queues.

What is an effective way to meet the cross-cluster messaging requirements of its event-driven APIs?

Options:

A.

Non-transactional JMS operations with a reliability pattern and manual acknowledgements

B.

Persistent VM queues with automatic acknowledgements

C.

JMS transactions with automatic acknowledgements

D.

extended Architecture (XA) transactions and XA connected components with manual acknowledgements

Buy Now
Questions 48

A team would like to create a project skeleton that developers can use as a starting point when creating API Implementations with Anypoint Studio. This skeleton should help drive consistent use of best practices within the team.

What type of Anypoint Exchange artifact(s) should be added to Anypoint Exchange to publish the project skeleton?

Options:

A.

A custom asset with the default API implementation

B.

A RAML archetype and reusable trait definitions to be reused across API implementations

C.

An example of an API implementation following best practices

D.

a Mule application template with the key components and minimal integration logic

Buy Now
Questions 49

Refer to the exhibit.

A Mule application is being designed to expose a SOAP web service to its clients.

What language is typically used inside the web service's interface definition to define the data structures that the web service Is expected to exchange with its clients?

Options:

A.

WSDL

B.

XSD

C.

JSON Schema

D.

RAMI

Buy Now
Questions 50

A Mule application is built to support a local transaction for a series of operations on a single database. The mule application has a Scatter-Gather scope that participates in the local transaction.

What is the behavior of the Scatter-Gather when running within this local transaction?

Options:

A.

Execution of all routes within Scatter-Gather occurs in parallel Any error that occurs inside Scatter-Gather will result in a roll back of all the database operations

B.

Execution of all routes within Scatter-Gather occurs sequentially Any error that occurs inside Scatter-Gather will be handled by error handler and will not result in roll back

C.

Execution of all routes within Scatter-Gather occurs sequentially Any error that occurs inside Scatter-Gather will result in a roll back of all the database operations

D.

Execution of all routes within Scatter-Gather occurs in parallel Any error that occurs inside Scatter-Gather will be handled by error handler and will not result in roll back

Buy Now
Questions 51

According to the Internet Engineering Task Force (IETF), which supporting protocol does File Transfer Protocol (FTP) use for reliable communication?

Options:

A.

A Secure Sockets Layer (SSL)

B.

B Transmission Control Protocol (TCP)

C.

Lightweight Directory Access Protocol (LDAP)

D.

Hypertext Transfer Protocol (HTTP)

Buy Now
Questions 52

Refer to the exhibit.

A Mule application is deployed to a cluster of two customer-hosted Mute runtimes. The Mute application has a flow that polls a database and another flow with an HTTP Listener.

HTTP clients send HTTP requests directly to individual cluster nodes.

What happens to database polling and HTTP request handling in the time after the primary (master) node of the cluster has railed, but before that node is restarted?

Options:

A.

Database polling continues Only HTTP requests sent to the remaining node continue to be accepted

B.

Database polling stops All HTTP requests continue to be accepted

C.

Database polling continues All HTTP requests continue to be accepted, but requests to the failed node Incur increased latency

D.

Database polling stops All HTTP requests are rejected

Buy Now
Questions 53

What aspects of a CI/CD pipeline for Mule applications can be automated using MuleSoft-provided Maven plugins?

Options:

A.

Compile, package, unit test, validate unit test coverage, deploy

B.

Compile, package, unit test, deploy, integration test (Incorrect)

C.

Compile, package, unit test, deploy, create associated API instances in API Manager

D.

Import from API designer, compile, package, unit test, deploy, publish to Anypoint Exchange

Buy Now
Questions 54

An organization is designing a mule application to support an all or nothing transaction between serval database operations and some other connectors so that they all roll back if there is a problem with any of the connectors

Besides the database connector , what other connector can be used in the transaction.

Options:

A.

VM

B.

Anypoint MQ

C.

SFTP

D.

ObjectStore

Buy Now
Questions 55

The implementation of a Process API must change. What is a valid approach that minimizes the impact of this change on API clients?

Options:

A.

Implement required changes to the Process API implementation so that whenever possible, the Process API's RAML definition remains unchanged

B.

Update the RAML definition of the current Process API and notify API client developers by sending them links to the updated RAML definition

C.

Postpone changes until API consumers acknowledge they are ready to migrate to a new Process API or API version

D.

Implement the Process API changes in a new API implementation, and have the old API implementation return an HTTP status code 301 - Moved Permanently to inform API clients they should be calling the new API implementation

Buy Now
Questions 56

A Mule application is synchronizing customer data between two different database systems.

What is the main benefit of using eXtended Architecture (XA) transactions over local transactions to synchronize these two different database systems?

Options:

A.

An XA transaction synchronizes the database systems with the least amount of Mule configuration or coding

B.

An XA transaction handles the largest number of requests in the shortest time

C.

An XA transaction automatically rolls back operations against both database systems if any operation falls

D.

An XA transaction writes to both database systems as fast as possible

Buy Now
Questions 57

How should the developer update the logging configuration in order to enable this package specific debugging?

Options:

A.

In Anypoint Monitoring, define a logging search query with class property set to org.apache.cxf and level set to DEBUG

B.

In the Mule application's log4j2.xml file, add an AsyncLogger element with name property set to org.apache.cxf and level set to DEBUG, then redeploy the Mule application in the CloudHub production environment

C.

In the Mule application's log4j2.xmI file, change the root logger's level property to DEBUG, then redeploy the Mule application to the CloudHub production environment

D.

In Anypoint Runtime Manager, in the Deployed Application Properties tab for the Mule application, add a line item with DEBUG level for package org.apache.cxf and apply the changes

Buy Now
Questions 58

Refer to the exhibit.

A Mule application has an HTTP Listener that accepts HTTP DELETE requests. This Mule application Is deployed to three CloudHub workers under the control of the CloudHub Shared Load Balancer.

A web client makes a sequence of requests to the Mule application's public URL.

How is this sequence of web client requests distributed among the HTTP Listeners running in the three CloudHub workers?

Options:

A.

Each request is routed to the PRIMARY CloudHub worker in the PRIMARY Availability Zone (AZ)

B.

Each request is routed to ONE ARBiTRARY CloudHub worker in the PRIMARY Availability Zone (AZ)

C.

Each request Is routed to ONE ARBiTRARY CloudHub worker out of ALL three CloudHub workers

D.

Each request is routed (scattered) to ALL three CloudHub workers at the same time

Buy Now
Questions 59

Refer to the exhibit.

An organization uses a 2-node Mute runtime cluster to host one stateless API implementation. The API is accessed over HTTPS through a load balancer that uses round-robin for load distribution.

Two additional nodes have been added to the cluster and the load balancer has been configured to recognize the new nodes with no other change to the load balancer.

What average performance change is guaranteed to happen, assuming all cluster nodes are fully operational?

Options:

A.

50% reduction in the response time of the API

B.

100% increase in the throughput of the API

C.

50% reduction In the JVM heap memory consumed by each node

D.

50% reduction In the number of requests being received by each node

Buy Now
Questions 60

An application deployed to a runtime fabric environment with two cluster replicas is designed to periodically trigger of flow for processing a high-volume set of records from the source system and synchronize with the SaaS system using the Batch job scope

After processing 1000 records in a periodic synchronization of 1 lakh records, the replicas in which batch job instance was started went down due to unexpected failure in the runtime fabric environment

What is the consequence of losing the replicas that run the Batch job instance?

Options:

A.

The remaining 99000 records will be lost and left and processed

B.

The second replicas will take over processing the remaining

99000 records

C.

A new replacement replica will be available and will be process all 1,00,000 records from scratch leading to duplicate record processing

D.

A new placement replica will be available and will take or processing the remaining 99,000 records

Buy Now
Questions 61

During a planning session with the executive leadership, the development team director presents plans for a new API to expose the data in the company’s order database. An earlier effort to build an API on top of this data failed, so the director is recommending a design-first approach.

Which characteristics of a design-first approach will help make this API successful?

Options:

A.

Building MUnit tests so administrators can confirm code coverage percentage during deployment

B.

Publishing the fully implemented API to Exchange so all developers can reuse the API

C.

Adding global policies to the API so all developers automatically secure the implementation before coding anything

D.

Developing a specification so consumers can test before the implementation is built

Buy Now
Questions 62

In which order are the API Client, API Implementation, and API interface components called in a typical REST request?

Options:

A.

API Client > API implementation > API Interface

B.

API interface > API Client > API Implementation

C.

API Client > API Interface > API implementation

D.

API Implementation > API Interface > API Client

Buy Now
Questions 63

An organization has various integrations implemented as Mule applications. Some of these Mule applications are deployed to custom hosted Mule runtimes (on-premises) while others execute in the MuleSoft-hosted runtime plane (CloudHub). To perform the Integra functionality, these Mule applications connect to various backend systems, with multiple applications typically needing to access the backend systems.

How can the organization most effectively avoid creating duplicates in each Mule application of the credentials required to access the backend systems?

Options:

A.

Create a Mule domain project that maintains the credentials as Mule domain-shared resources Deploy the Mule applications to the Mule domain, so the credentials are available to the Mule applications

B.

Store the credentials in properties files in a shared folder within the organization's data center Have the Mule applications load properties files from this shared location at startup

C.

Segregate the credentials for each backend system into environment-specific properties files Package these properties files in each Mule application, from where they are loaded at startup

D.

Configure or create a credentials service that returns the credentials for each backend system, and that is accessible from customer-hosted and MuleSoft-hosted Mule runtimes Have the Mule applications toad the properties at startup by invoking that credentials service

Buy Now
Questions 64

An organization’s IT team must secure all of the internal APIs within an integration solution by using an API proxy to apply required authentication and authorization policies.

Which integration technology, when used for its intended purpose, should the team choose to meet these requirements if all other relevant factors are equal?

Options:

A.

API Management (APIM)

B.

Robotic Process Automation (RPA)

C.

Electronic Data Interchange (EDI)

D.

Integration Platform-as-a-service (PaaS)

Buy Now
Questions 65

How are the API implementation , API client, and API consumer combined to invoke and process an API ?

Options:

A.

The API consumer creates an API implementation , which receives API invocations from an API such that they are processed for an API client

B.

The API consumer creates an API client which sends API invocations to an API such that they are processed by an API implementation

C.

An API client creates an API consumer, which receives API invocation from an API such that they are processed for an API implementation

D.

The API client creates an API consumer which sends API invocations to an API such that they are processed by API implementation

Buy Now
Questions 66

Mule application A receives a request Anypoint MQ message REQU with a payload containing a variable-length list of request objects. Application A uses the For Each scope to split the list into individual objects and sends each object as a message to an Anypoint MQ queue.

Service S listens on that queue, processes each message independently of all other messages, and sends a response message to a response queue.

Application A listens on that response queue and must in turn create and publish a response Anypoint MQ message RESP with a payload containing the list of responses sent by service S in the same order as the request objects originally sent in REQU.

Assume successful response messages are returned by service S for all request messages.

What is required so that application A can ensure that the length and order of the list of objects in RESP and REQU match, while at the same time maximizing message throughput?

Options:

A.

Use a Scatter-Gather within the For Each scope to ensure response message order Configure the Scatter-Gather with a persistent object store

B.

Perform all communication involving service S synchronously from within the For Each scope, so objects in RESP are in the exact same order as request objects in REQU

C.

Use an Async scope within the For Each scope and collect response messages in a second For Each scope in the order In which they arrive, then send RESP using this list of responses

D.

Keep track of the list length and all object indices in REQU, both in the For Each scope and in all communication involving service Use persistent storage when creating RESP

Buy Now
Questions 67

How does timeout attribute help inform design decisions while using JMS connector listening for incoming messages in an extended architecture (XA) transaction?

Options:

A.

After the timeout is exceeded, stale JMS consumer threads are destroyed and new threads are created

B.

The timeout specifies the time allowed to pass between receiving JMS messages on the same JMS connection and then after the timeout new JMS connection is established

C.

The time allowed to pass between committing the transaction and the completion of the mule flow and then after the timeout flow processing triggers an error

D.

The timeout defines the time that is allowed to pass without the transaction ending explicitly and after the timeout expires, the transaction rolls back

Buy Now
Questions 68

A DevOps team has adequate observability of individual system behavior and performance, but it struggles to track the entire lifecycle of each request across different microservices.

Which additional observability approach should this team consider adopting?

Options:

A.

Analytics

B.

Metrics

C.

Tracing

D.

Data mining

Buy Now
Questions 69

An organization is designing Mule application which connects to a legacy backend. It has been reported that backend services are not highly available and experience downtime quite often. As an integration architect which of the below approach you would propose to achieve high reliability goals?

Options:

A.

Alerts can be configured in Mule runtime so that backend team can be communicated when services are down

B.

Until Successful scope can be implemented while calling backend API's

C.

On Error Continue scope to be used to call in case of error again

D.

Create a batch job with all requests being sent to backend using that job as per the availability of backend API's

Buy Now
Questions 70

A set of integration Mule applications, some of which expose APIs, are being created to enable a new business process. Various stakeholders may be impacted by this. These stakeholders are a combination of semi-technical users (who understand basic integration terminology and concepts such as JSON and XML) and technically skilled potential consumers of the Mule applications and APIs.

What Is an effective way for the project team responsible for the Mule applications and APIs being built to communicate with these stakeholders using Anypoint Platform and its supplied toolset?

Options:

A.

Use Anypoint Design Center to implement the Mule applications and APIs and give the various stakeholders access to these Design Center projects, so they can collaborate and provide feedback

B.

Create Anypoint Exchange entries with pages elaborating the integration design, including API notebooks (where applicable) to help the stakeholders understand and interact with the Mule applications and APIs at various levels of technical depth

C.

Use Anypoint Exchange to register the various Mule applications and APIs and share the RAML definitions with the stakeholders, so they can be discovered

D.

Capture documentation about the Mule applications and APIs inline within the Mule integration flows and use Anypoint Studio's Export Documentation feature to provide an HTML version of this documentation to the stakeholders

Buy Now
Questions 71

What is an example of data confidentiality?

Options:

A.

Signing a file digitally and sending it using a file transfer mechanism

B.

Encrypting a file containing personally identifiable information (PV)

C.

Providing a server's private key to a client for secure decryption of data during a two-way SSL handshake

D.

De-masking a person's Social Security number while inserting it into a database

Buy Now
Questions 72

An organization plans to use the Anypoint Platform audit logging service to log Anypoint MQ actions.

What consideration must be kept in mind when leveraging Anypoint MQ Audit Logs?

Options:

A.

Anypoint MQ Audit Logs include logs for sending, receiving, or browsing messages

B.

Anypoint MQ Audit Logs include fogs for failed Anypoint MQ operations

C.

Anypoint MQ Audit Logs include logs for queue create, delete, modify, and purge operations

Buy Now
Questions 73

A Mule application is being designed to do the following:

Step 1: Read a SalesOrder message from a JMS queue, where each SalesOrder consists of a header and a list of SalesOrderLineltems.

Step 2: Insert the SalesOrder header and each SalesOrderLineltem into different tables in an RDBMS.

Step 3: Insert the SalesOrder header and the sum of the prices of all its SalesOrderLineltems into a table In a different RDBMS.

No SalesOrder message can be lost and the consistency of all SalesOrder-related information in both RDBMSs must be ensured at all times.

What design choice (including choice of transactions) and order of steps addresses these requirements?

Options:

A.

1) Read the JMS message (NOT in an XA transaction)

2) Perform BOTH DB inserts in ONE DB transaction

3) Acknowledge the JMS message

B.

1) Read the JMS message (NOT in an XA transaction)

2) Perform EACH DB insert in a SEPARATE DB transaction

3) Acknowledge the JMS message

C.

1) Read the JMS message in an XA transaction

2) In the SAME XA transaction, perform BOTH DB inserts but do NOT acknowledge the JMS message

D.

1) Read and acknowledge the JMS message (NOT in an XA transaction)

2) In a NEW XA transaction, perform BOTH DB inserts

Buy Now
Questions 74

A system administrator needs to determine when permissions were last changed for an Anypoint Platform user.

Which Anypoint Platform component should the administrator use to obtain this information?

Options:

A.

Audit Logging

B.

Anypoint Monitoring

C.

Anypiont Studio

D.

Mule Stack Traces

Buy Now
Questions 75

As a part of project , existing java implementation is being migrated to Mulesoft. Business is very tight on the budget and wish to complete the project in most economical way possible.

Canonical object model using java is already a part of existing implementation. Same object model is required by mule application for a business use case. What is the best way to achieve this?

Options:

A.

Make use of Java module

B.

Create similar model for Mule applications

C.

Create a custom application to read Java code and make it available for Mule application

D.

Use Anypoint exchange

Buy Now
Questions 76

An organization has deployed runtime fabric on an eight note cluster with performance profile. An API uses and non persistent object store for maintaining some of its state data. What will be the impact to the stale data if server crashes?

Options:

A.

State data is preserved

B.

State data is rolled back to a previously saved version

C.

State data is lost

D.

State data is preserved as long as more than one more is unaffected by the crash

Buy Now
Questions 77

A new Mule application under development must implement extensive data transformation logic. Some of the data transformation functionality is already available as external transformation services that are mature and widely used across the organization; the rest is highly specific to the new Mule application.

The organization follows a rigorous testing approach, where every service and application must be extensively acceptance tested before it is allowed to go into production.

What is the best way to implement the data transformation logic for this new Mule application while minimizing the overall testing effort?

Options:

A.

Implement and expose all transformation logic as mlaoservices using DataWeave, so it can be reused by any application component that needs it, including the new Mule application

B.

Implement transformation logic in the new Mute application using DataWeave, replicating the transformation logic of existing transformation services

C.

Extend the existing transformation services with new transformation logic and Invoke them from the new Mule application

D.

Implement transformation logic in the new Mute application using DataWeave, invoking existing transformation services when possible

Buy Now
Questions 78

As a part of project requirement, Java Invoke static connector in a mule 4 application needs to invoke a static method in a dependency jar file. What are two ways to add the dependency to be visible by the connectors class loader?

(Choose two answers)

Options:

A.

In the Java Invoke static connector configuration, configure a path and name of the dependency jar file

B.

Add the dependency jar file to the java classpath by setting the JVM parameters

C.

Use Maven command to include the dependency jar file when packaging the application

D.

Configure the dependency as a shared library in the project POM

E.

Update mule-artefact.json to export the Java package

Buy Now
Questions 79

A mule application uses an HTTP request operation to involve an external API.

The external API follows the HTTP specification for proper status code usage.

What is possible cause when a 3xx status code is returned to the HTTP Request operation from the external API?

Options:

A.

The request was not accepted by the external API

B.

The request was Redirected to a different URL by the external API

C.

The request was NOT RECEIVED by the external API

D.

The request was ACCEPTED by the external API

Buy Now
Questions 80

Why would an Enterprise Architect use a single enterprise-wide canonical data model (CDM) when designing an integration solution using Anypoint Platform?

Options:

A.

To reduce dependencies when integrating multiple systems that use different data formats

B.

To automate Al-enabled API implementation generation based on normalized backend databases from separate vendors

C.

To leverage a data abstraction layer that shields existing Mule applications from nonbackward compatible changes to the model's data structure

D.

To remove the need to perform data transformation when processing message payloads in Mule applications

Buy Now
Questions 81

An API implementation is being developed to expose data from a production database via HTTP requests. The API implementation executes a database SELECT statement that is dynamically created based upon data received from each incoming HTTP request. The developers are planning to use various types of testing to make sure the Mule application works as expected, can handle specific workloads, and behaves correctly from an API consumer perspective. What type of testing would typically mock the results from each SELECT statement rather than actually execute it in the production database?

Options:

A.

Unit testing (white box)

B.

Integration testing

C.

Functional testing (black box)

D.

Performance testing

Buy Now
Exam Code: MuleSoft-Integration-Architect-I
Exam Name: Salesforce Certified MuleSoft Integration Architect 1 (SU24) Exam
Last Update: Sep 11, 2024
Questions: 270
$64  $159.99
$48  $119.99
$40  $99.99
buy now MuleSoft-Integration-Architect-I