Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

MCIA-Level-1 MuleSoft Certified Integration Architect - Level 1 Questions and Answers

Questions 4

A corporation has deployed multiple mule applications implementing various public and private API's to different cloudhub workers. These API's arc Critical applications that must be highly available and in line with the reliability SLA as defined by stakeholders.

How can API availability (liveliness or readiness) be monitored so that Ops team receives outage notifications?

Options:

A.

Enable monitoring of individual applications from Anypoint monitoring

B.

Configure alerts with failure conditions in runtime manager

C.

Configure alerts failure conditions in API manager

D.

Use any point functional monitoring test API's functional behavior

Buy Now
Questions 5

A system administrator needs to determine when permissions were last changed for an Anypoint Platform user.

Which Anypoint Platform component should the administrator use to obtain this information?

Options:

A.

Audit Logging

B.

Anypoint Monitoring

C.

Anypiont Studio

D.

Mule Stack Traces

Buy Now
Questions 6

What operation can be performed through a JMX agent enabled in a Mule application?

Options:

A.

View object store entries

B.

Replay an unsuccessful message

C.

Set a particular tog4J2 log level to TRACE

D.

Deploy a Mule application

Buy Now
Questions 7

An organization is designing an integration solution to replicate financial transaction data from a legacy system into a data warehouse (DWH).

The DWH must contain a daily snapshot of financial transactions, to be delivered as a CSV file. Daily transaction volume exceeds tens of millions of records, with significant spikes in volume during popular shopping periods.

What is the most appropriate integration style for an integration solution that meets the organization's current requirements?

Options:

A.

Event-driven architecture

B.

Microservice architecture

C.

API-led connectivity

D.

Batch-triggered ETL

Buy Now
Questions 8

An organization heeds to procure an enterprise software system to increase cross-selling opportunities and better rack prospect data.

Which category of enterprise software has these core capabilities, when used for its typical and intended purpose?

Options:

A.

Supply Chain Management (SCM)

B.

IT Service Management (ITSM)

C.

Business-to-Business (A2B)

D.

Customer Relationship Management (CRM)

Buy Now
Questions 9

Following MuleSoft best practices, what MuleSoft runtime deployment option best meets the company's goals to begin its digital transformation journey?

Options:

A.

Runtime Fabric on VMs/bare metal

B.

CloudHub runtimes

C.

Customer-hosted runtimes provisioned by a MuleSoft services partner

D.

Customer-hosted self-provisioned runtimes

Buy Now
Questions 10

Refer to the exhibit.

A business process involves two APIs that interact with each other asynchronously over HTTP. Each API is implemented as a Mule application. API 1 receives the initial HTTP request and invokes API 2 (in a fire and forget fashion) while API 2, upon completion of the processing, calls back into API l to notify about completion of the asynchronous process.

Each API Is deployed to multiple redundant Mule runtimes and a separate load balancer, and is deployed to a separate network zone.

In the network architecture, how must the firewall rules be configured to enable the above Interaction between API 1 and API 2?

Options:

A.

To authorize the certificate to be used both APIs

B.

To enable communication from each API’s Mule Runtimes and Network zone to the load balancer of the other API

C.

To open direct two-way communication between the Mule Runtimes of both API’s

D.

To allow communication between load balancers used by each API

Buy Now
Questions 11

A mule application uses an HTTP request operation to involve an external API.

The external API follows the HTTP specification for proper status code usage.

What is possible cause when a 3xx status code is returned to the HTTP Request operation from the external API?

Options:

A.

The request was not accepted by the external API

B.

The request was Redirected to a different URL by the external API

C.

The request was NOT RECEIVED by the external API

D.

The request was ACCEPTED by the external API

Buy Now
Questions 12

What is a core pillar of the MuleSoft Catalyst delivery approach?

Options:

A.

Business outcomes

B.

Technology centralization

C.

Process thinking

D.

Scope reduction

Buy Now
Questions 13

Refer to the exhibit.

An organization is designing a Mule application to receive data from one external business partner. The two companies currently have no shared IT infrastructure and do not want to establish one. Instead, all communication should be over the public internet (with no VPN).

What Anypoint Connector can be used in the organization's Mule application to securely receive data from this external business partner?

Options:

A.

File connector

B.

VM connector

C.

SFTP connector

D.

Object Store connector

Buy Now
Questions 14

An organization is not meeting its growth and innovation objectives because IT cannot deliver projects last enough to keep up with the pace of change required by the business.

According to MuleSoft’s IT delivery and operating model, which step should the organization lake to solve this problem?

Options:

A.

Modify IT governance and security controls so that line of business developers can have direct access to the organization's systems of record

B.

Switch from a design-first to a code-first approach for IT development

C.

Adopt a new approach that decouples core IT projects from the innovation that happens within each line of business

D.

Hire more |T developers, architects, and project managers to increase IT delivery

Buy Now
Questions 15

A company is designing a mule application to consume batch data from a partner's ftps server The data files have been compressed and then digitally signed using PGP.

What inputs are required for the application to securely consumed these files?

Options:

A.

ATLS context Key Store requiring the private key and certificate for the company

PGP public key of partner

PGP private key for the company

B.

ATLS context first store containing a public certificate for partner ftps server and the PGP public key of the partner

TLS contact Key Store containing the FTP credentials

C.

TLS context trust or containing a public certificate for the ftps server The FTP username and password The PGP public key of the partner

D.

The PGP public key of the partner

The PGP private key for the company

The FTP username and password

Buy Now
Questions 16

A Mule application is built to support a local transaction for a series of operations on a single database. The Mule application has a Scatter-Gather that participates in the local transaction.

What is the behavior of the Scatter-Gather when running within this local transaction?

Options:

A.

Execution of each route within the Scatter-Gather occurs sequentially

Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations

B.

Execution of all routes within the Scatter-Gather occurs in parallel

Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations

C.

Execution of each route within the Scatter-Gather occurs sequentially

Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations

D.

Execution of each route within the Scatter-Gather occurs in parallel

Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations

Buy Now
Questions 17

An organization has decided on a cloud migration strategy to minimize the organization's own IT resources. Currently the organization has all of its new applications running on its own premises and uses an on-premises load balancer that exposes all APIs under the base URL (https://api.rutujar.com ).

As part of migration strategy, the organization is planning to migrate all of its new applications and load balancer CloudHub.

What is the most straightforward and cost-effective approach to Mule application deployment and load balancing that preserves the public URL's?

Options:

A.

Deploy the Mule application to Cloudhub

Create a CNAME record for base URL( httpsr://api.rutujar.com) in the Cloudhub shared load balancer that points to the A record of theon-premises load balancer

Apply mapping rules in SLB to map URLto their corresponding Mule applications

B.

Deploy the Mule application to Cloudhub

Update a CNAME record for base URL ( https://api.rutujar.com) in the organization 's DNS server to point to the A record of the Cloudhub dedicated load balancer

Apply mapping rules in DLB to map URLto their corresponding Mule applications

C.

Deploy the Mule application to Cloudhub

Update a CNAME record for base URL ( https://api.rutujar.com) in the organization 's DNS server to point to the A record of the CloudHub shared load balancer

Apply mapping rules in SLB to map URLto their corresponding Mule applications

D.

For each migrated Mule application, deploy an API proxy application to Cloudhub with all traffic to the mule applications routed through a Cloud Hub Dedicated load balancer (DLB)

Update a CNAME record for base URL ( https://api.rutujar.com) in the organization 's DNS server to point to the A record of the CloudHub dedicated load balancer

Apply mapping rules in DLB to map each API proxy appl

Buy Now
Questions 18

Organization wants to achieve high availability goal for Mule applications in customer hosted runtime plane. Due to the complexity involved, data cannot be shared among of different instances of same Mule application. What option best suits to this requirement considering high availability is very much critical to the organization?

Options:

A.

The cluster can be configured

B.

Use third party product to implement load balancer

C.

High availability can be achieved only in CloudHub

D.

Use persistent object store

Buy Now
Questions 19

An integration Mule application is deployed to a customer-hosted multi-node Mule 4 runtime duster. The Mule application uses a Listener operation of a JMS connector to receive incoming messages from a JMS queue.

How are the messages consumed by the Mule application?

Options:

A.

Depending on the JMS provider's configuration, either all messages are consumed by ONLY the primary cluster node or else ALL messages are consumed by ALL cluster nodes

B.

Regardless of the Listener operation configuration, all messages are consumed by ALL cluster nodes

C.

Depending on the Listener operation configuration, either all messages are consumed by ONLY the primary cluster node or else EACH message is consumed by ANY ONE cluster node

D.

Regardless of the Listener operation configuration, all messages are consumed by ONLY the primary cluster node

Buy Now
Questions 20

An Organization has previously provisioned its own AWS VPC hosting various servers. The organization now needs to use Cloudhub to host a Mule application that will implement a REST API once deployed to Cloudhub, this Mule application must be able to communicate securely with the customer-provisioned AWS VPC resources within the same region, without being interceptable on the public internet.

What Anypoint Platform features should be used to meet these network communication requirements between Cloudhub and the existing customer-provisioned AWS VPC?

Options:

A.

Add a Mulesoft hosted Anypoint VPC configured and with VPC Peering to the AWS VPC

B.

Configure an external identity provider (IDP) in Anypoint Platform with certificates from the customer provisioned AWS VPC

C.

Add a default API Whitelisting policy to API Manager to automatically whitelist the customer provisioned AWS VPC IP ranges needed by the Mule applicaton

D.

Use VM queues in the Mule application to allow any non-mule assets within the customer provisioned AWS VPC to subscribed to and receive messages

Buy Now
Questions 21

An organization is designing Mule application which connects to a legacy backend. It has been reported that backend services are not highly available and experience downtime quite often. As an integration architect which of the below approach you would propose to achieve high reliability goals?

Options:

A.

Alerts can be configured in Mule runtime so that backend team can be communicated when services are down

B.

Until Successful scope can be implemented while calling backend API's

C.

On Error Continue scope to be used to call in case of error again

D.

Create a batch job with all requests being sent to backend using that job as per the availability of backend API's

Buy Now
Questions 22

A company is planning to migrate its deployment environment from on-premises cluster to a Runtime Fabric (RTF) cluster. It also has a requirement to enable Mule applications deployed to a Mule runtime instance to store and share data across application replicas and restarts.

How can these requirements be met?

Options:

A.

Anypoint object store V2 to share data between replicas in the RTF cluster

B.

Install the object store pod on one of the cluster nodes

C.

Configure Persistence Gateway in any of the servers using Mule Object Store

D.

Configure Persistent Gateway at the RTF

Buy Now
Questions 23

What is true about the network connections when a Mule application uses a JMS connector to interact with a JMS provider (message broker)?

Options:

A.

To complete sending a JMS message, the JMS connector must establish a network connection with the JMS message recipient

B.

To receive messages into the Mule application, the JMS provider initiates a network connection to the JMS connector and pushes messages along this connection

C.

The JMS connector supports both sending and receiving of JMS messages over the protocol determined by the JMS provider

D.

The AMQP protocol can be used by the JMS connector to portably establish connections to various types of JMS providers

Buy Now
Questions 24

According to MuleSoft's IT delivery and operating model, which approach can an organization adopt in order to reduce the frequency of IT project delivery failures?

Options:

A.

Decouple central IT projects from the innovation that happens within each line of business

B.

Adopt an enterprise data model

C.

Prevent technology sprawl by reducing production of API assets

D.

Stop scope creep by centralizing requirements-gathering

Buy Now
Questions 25

An organization is designing the following two Mule applications that must share data via a common persistent object store instance:

- Mule application P will be deployed within their on-premises datacenter.

- Mule application C will run on CloudHub in an Anypoint VPC.

The object store implementation used by CloudHub is the Anypoint Object Store v2 (OSv2).

what type of object store(s) should be used, and what design gives both Mule applications access to the same object store instance?

Options:

A.

Application P uses the Object Store connector to access a persistent object store Application C accesses this persistent object store via the Object Store REST API through an IPsec tunnel

B.

Application C and P both use the Object Store connector to access the Anypoint Object Store v2

C.

Application C uses the Object Store connector to access a persistent object Application P accesses the persistent object store via the Object Store REST API

D.

Application C and P both use the Object Store connector to access a persistent object store

Buy Now
Questions 26

An organization will deploy Mule applications to Cloudhub, Business requirements mandate that all application logs be stored ONLY in an external splunk consolidated logging service and NOT in Cloudhub.

In order to most easily store Mule application logs ONLY in Splunk, how must Mule application logging be configured in Runtime Manager, and where should the log4j2 splunk appender be defined?

Options:

A.

Keep the default logging configuration in RuntimeManager

Define the splunk appender in ONE global log4j.xml file that is uploaded once to Runtime Manager to support at Mule application deployments.

B.

Disable Cloudhub logging in Runtime Manager

Define the splunk appender in EACH Mule application’s log4j2.xml file

C.

Disable Cloudhub logging in Runtime Manager

Define the splunk appender in ONE global log4j.xml file that is uploaded once to Runtime Manger to support at Mule application deployments.

D.

Keep the default logging configuration in Runtime Manager

Define the Splunk appender in EACH Mule application log4j2.xml file

Buy Now
Questions 27

An insurance provider is implementing Anypoint platform to manage its application infrastructure and is using the customer hosted runtime for its business due to certain financial requirements it must meet. It has built a number of synchronous API's and is currently hosting these on a mule runtime on one server

These applications make use of a number of components including heavy use of object stores and VM queues.

Business has grown rapidly in the last year and the insurance provider is starting to receive reports of reliability issues from its applications.

The DevOps team indicates that the API's are currently handling too many requests and this is over loading the server. The team has also mentioned that there is a significant downtime when the server is down for maintenance.

As an integration architect, which option would you suggest to mitigate these issues?

Options:

A.

Add a load balancer and add additional servers in a server group configuration

B.

Add a load balancer and add additional servers in a cluster configuration

C.

Increase physical specifications of server CPU memory and network

D.

Change applications by use an event-driven model

Buy Now
Questions 28

A travel company wants to publish a well-defined booking service API to be shared with its business partners. These business partners have agreed to ONLY consume SOAP services and they want to get the service contracts in an easily consumable way before they start any development. The travel company will publish the initial design documents to Anypoint Exchange, then share those documents with the business partners. When using an API-led approach, what is the first design document the travel company should deliver to its business partners?

Options:

A.

Create a WSDL specification using any XML editor

B.

Create a RAML API specification using any text editor

C.

Create an OAS API specification in Design Center

D.

Create a SOAP API specification in Design Center

Buy Now
Questions 29

An organization's security policies mandate complete control of the login credentials used to log in to Anypoint Platform. What feature of Anypoint Platform should be used to meet this requirement?

Options:

A.

Enterprise Security Module

B.

Client ID Secret

C.

Federated Identity Management

D.

Federated Client Management

Buy Now
Questions 30

An integration team uses Anypoint Platform and follows MuleSoft's recommended approach to full lifecycle API development.

Which step should the team's API designer take before the API developers implement the AP! Specification?

Options:

A.

Generate test cases using MUnit so the API developers can observe the results of running the API

B.

Use the scaffolding capability of Anypoint Studio to create an API portal based on the API specification

C.

Publish the API specification to Exchange and solicit feedback from the API's consumers

D.

Use API Manager to version the API specification

Buy Now
Questions 31

What limits if a particular Anypoint Platform user can discover an asset in Anypoint Exchange?

Options:

A.

Design Center and RAML were both used to create the asset

B.

The existence of a public Anypoint Exchange portal to which the asset has been published

C.

The type of the asset in Anypoint Exchange

D.

The business groups to which the user belongs

Buy Now
Questions 32

As a part of project , existing java implementation is being migrated to Mulesoft. Business is very tight on the budget and wish to complete the project in most economical way possible.

Canonical object model using java is already a part of existing implementation. Same object model is required by mule application for a business use case. What is the best way to achieve this?

Options:

A.

Make use of Java module

B.

Create similar model for Mule applications

C.

Create a custom application to read Java code and make it available for Mule application

D.

Use Anypoint exchange

Buy Now
Questions 33

An organization is designing an integration Mule application to process orders by submitting them to a back-end system for offline processing. Each order will be received by the Mule application through an HTTPS POST and must be acknowledged immediately. Once acknowledged, the order will be submitted to a back-end system. Orders that cannot be successfully submitted due to rejections from the back-end system will need to be processed manually (outside the back-end system).

The Mule application will be deployed to a customer-hosted runtime and is able to use an existing ActiveMQ broker if needed. The ActiveMQ broker is located inside the organization’s firewall. The back-end system has a track record of unreliability due to both minor network connectivity issues and longer outages.

What idiomatic (used for their intended purposes) combination of Mule application components and ActiveMQ queues are required to ensure automatic submission of orders to the back-end system while supporting but minimizing manual order processing?

Options:

A.

An Until Successful scope to call the back-end system

One or more ActiveMQ long-retry queues

One or more ActiveMQ dead-letter queues for manual processing

B.

One or more On Error scopes to assist calling the back-end system

An Until Successful scope containing VM components for long retries

A persistent dead-letter VM queue configured in CloudHub

C.

One or more On Error scopes to assist calling the back-end system

One or more ActiveMQ long-retry queues

A persistent dead-letter object store configured in the CloudHub Object Store service

D.

A Batch Job scope to call the back-end system

An Until Successful scope containing Object Store components for long retries

A dead-letter object store configured in the Mule application

Buy Now
Questions 34

A mule application designed to fulfil two requirements

a) Processing files are synchronously from an FTPS server to a back-end database using VM intermediary queues for load balancing VM events

b) Processing a medium rate of records from a source to a target system using batch job scope

Considering the processing reliability requirements for FTPS files, how should VM queues be configured for processing files as well as for the batch job scope if the application is deployed to Cloudhub workers?

Options:

A.

Use Cloud hub persistent queues for FTPS files processing

There is no need to configure VM queues for the batch jobs scope as it uses by default the worker's disc for VM queueing

B.

Use Cloud hub persistent VM queue for FTPS file processing

There is no need to configure VM queues for the batch jobs scope as it uses by default the worker's JVM memory for VM queueing

C.

Use Cloud hub persistent VM queues for FTPS file processing

Disable VM queue for the batch job scope

D.

Use VM connector persistent queues for FTPS file processing Disable VM queue for the batch job scope

Buy Now
Questions 35

Which Anypoint Platform component should a MuleSoft developer use to create an API specification prior to building the API implementation?

Options:

A.

MUnit

B.

API Designer

C.

API Manager

D.

Runtime Manager

Buy Now
Questions 36

Refer to the exhibit.

Anypoint Platform supports role-based access control (RBAC) to features of the platform. An organization has configured an external Identity Provider for identity management with Anypoint Platform.

What aspects of RBAC must ALWAYS be controlled from the Anypoint Platform control plane and CANNOT be controlled via the external Identity Provider?

Options:

A.

Controlling the business group within Anypoint Platform to which the user belongs

B.

Assigning Anypoint Platform permissions to a role

C.

Assigning Anypoint Platform role(s) to a user

D.

Removing a user's access to Anypoint Platform when they no longer work for the organization

Buy Now
Questions 37

An organization is designing a Mule application to periodically poll an SFTP location for new files containing sales order records and then process those sales orders. Each sales order must be processed exactly once.

To support this requirement, the Mule application must identify and filter duplicate sales orders on the basis of a unique ID contained in each sales order record and then only send the new sales orders to the downstream system.

What is the most idiomatic (used for its intended purpose) Anypoint connector, validator, or scope that can be configured in the Mule application to filter duplicate sales orders on the basis of the unique ID field contained in each sales order record?

Options:

A.

Configure a Cache scope to filter and store each record from the received file by the order ID

B.

Configure a Database connector to filter and store each record by the order ID

C.

Configure an Idempotent Message Validator component to filter each record by the order ID

D.

Configure a watermark In an On New or Updated File event source to filter unique records by the order ID

Buy Now
Questions 38

An application deployed to a runtime fabric environment with two cluster replicas is designed to periodically trigger of flow for processing a high-volume set of records from the source system and synchronize with the SaaS system using the Batch job scope

After processing 1000 records in a periodic synchronization of 1 lakh records, the replicas in which batch job instance was started went down due to unexpected failure in the runtime fabric environment

What is the consequence of losing the replicas that run the Batch job instance?

Options:

A.

The remaining 99000 records will be lost and left and processed

B.

The second replicas will take over processing the remaining

99000 records

C.

A new replacement replica will be available and will be process all 1,00,000 records from scratch leading to duplicate record processing

D.

A new placement replica will be available and will take or processing the remaining 99,000 records

Buy Now
Questions 39

A banking company is developing a new set of APIs for its online business. One of the critical API's is a master lookup API which is a system API. This master lookup API uses persistent object store. This API will be used by all other APIs to provide master lookup data.

Master lookup API is deployed on two cloudhub workers of 0.1 vCore each because there is a lot of master data to be cached. Master lookup data is stored as a key value pair. The cache gets refreshed if they key is not found in the cache.

Doing performance testing it was observed that the Master lookup API has a higher response time due to database queries execution to fetch the master lookup data.

Due to this performance issue, go-live of the online business is on hold which could cause potential financial loss to Bank.

As an integration architect, which of the below option you would suggest to resolve performance issue?

Options:

A.

Implement HTTP caching policy for all GET endpoints for the master lookup API and implement locking to synchronize access to object store

B.

Upgrade vCore size from 0.1 vCore to 0,2 vCore

C.

Implement HTTP caching policy for all GET endpoints for master lookup API

D.

Add an additional Cloudhub worker to provide additional capacity

Buy Now
Questions 40

An organization uses a four(4) node customer hosted Mule runtime cluster to host one(1) stateless api implementation. The API is accessed over HTTPS through a load balancer that uses round-robin for load distribution. Each node in the cluster has been sized to be able to accept four(4) times the current number of requests.

Two(2) nodes in the cluster experience a power outage and are no longer available. The load balancer directs the outage and blocks the two unavailable the nodes from receiving further HTTP requests.

What performance-related consequence is guaranteed to happen to average, assuming the remaining cluster nodes are fully operational?

Options:

A.

100% increase in the average response time of the API

B.

50% reduction in the throughput of the API

C.

100% increase in the number of requests received by each remaining node

D.

50% increase in the JVM heap memory consumed by each remaining node

Buy Now
Questions 41

Customer has deployed mule applications to different customer hosted mule run times. Mule applications are managed from Anypoint platform.

What needs to be configured to monitor these Mule applications from Anypoint monitoring and what sends monitoring data to Anypoint monitoring?

Options:

A.

Enable monitoring of individual applications from runtime manager application settings

Runtime manager agent sends monitoring data from the mule applications to Anypoint monitoring

B.

Install runtime manager agent on each mule runtime

Runtime manager agent since monitoring data from the mule applications to Anypoint monitoring

C.

Anypoint monitoring agent on each mule runtime

Anypoint monitoring agent sends monitoring data from the mule applications to Anypoint monitoring

D.

By default, Anypoint monitoring agent will be installed on each Mule run time

Anypoint Monitoring agent automatically sends monitoring data from the Mule applications to Anypoint monitoring

Buy Now
Questions 42

In preparation for a digital transformation initiative, an organization is reviewing related IT integration projects that failed for various for reason.

According to MuleSoft’s surveys of global IT leaders, what is a common cause of IT project failure that this organization may likely discover in its assessment?

Options:

A.

Following an Agile delivery methodology

B.

Reliance on an Integration-Platform-as-a-Service (iPaaS)

C.

Spending too much time on enablement

D.

Lack of alignment around business outcomes

Buy Now
Questions 43

A Mule application is built to support a local transaction for a series of operations on a single database. The mule application has a Scatter-Gather scope that participates in the local transaction.

What is the behavior of the Scatter-Gather when running within this local transaction?

Options:

A.

Execution of all routes within Scatter-Gather occurs in parallel Any error that occurs inside Scatter-Gather will result in a roll back of all the database operations

B.

Execution of all routes within Scatter-Gather occurs sequentially Any error that occurs inside Scatter-Gather will be handled by error handler and will not result in roll back

C.

Execution of all routes within Scatter-Gather occurs sequentially Any error that occurs inside Scatter-Gather will result in a roll back of all the database operations

D.

Execution of all routes within Scatter-Gather occurs in parallel Any error that occurs inside Scatter-Gather will be handled by error handler and will not result in roll back

Buy Now
Questions 44

An organization is creating a Mule application that will be deployed to CloudHub. The Mule application has a property named dbPassword that stores a database user’s password.

The organization's security standards indicate that the dbPassword property must be hidden from every Anypoint Platform user after the value is set in the Runtime Manager Properties tab.

What configuration in the Mule application helps hide the dbPassword property value in Runtime Manager?

Options:

A.

Use secure::dbPassword as the property placeholder name and store the cleartext (unencrypted) value in a secure properties placeholder file

B.

Use secure::dbPassword as the property placeholder name and store the property encrypted value in a secure properties placeholder file

C.

Add the dbPassword property to the secureProperties section of the pom.xml file

D.

Add the dbPassword property to the secureProperties section of the mule-artifact.json file

Buy Now
Questions 45

A DevOps team has adequate observability of individual system behavior and performance, but it struggles to track the entire lifecycle of each request across different microservices.

Which additional observability approach should this team consider adopting?

Options:

A.

Analytics

B.

Metrics

C.

Tracing

D.

Data mining

Buy Now
Questions 46

An organization has an HTTPS-enabled Mule application named Orders API that receives requests from another Mule application named Process Orders.

The communication between these two Mule applications must be secured by TLS mutual authentication (two-way TLS).

At a minimum, what must be stored in each truststore and keystore of these two Mule applications to properly support two-way TLS between the two Mule applications while properly protecting each Mule application's keys?

Options:

A.

Orders API truststore: The Orders API public key

Process Orders keystore: The Process Orders private key and public key

B.

Orders API truststore: The Orders API private key and public key

Process Orders keystore: The Process Orders private key public key

C.

Orders API truststore: The Process Orders public key

Orders API keystore: The Orders API private key and public key

Process Orders truststore: The Orders API public key

Process Orders keystore: The Process Orders private key and public key

D.

Orders API truststore: The Process Orders public key

Orders API keystore: The Orders API private key

Process Orders truststore: The Orders API public key

Process Orders keystore: The Process Orders private key

Buy Now
Questions 47

49 of A popular retailer is designing a public API for its numerous business partners. Each business partner will invoke the API at the URL 58. https://api.acme.com/partnefs/vl. The API implementation is estimated to require deployment to 5 CloudHub workers.

The retailer has obtained a public X.509 certificate for the name apl.acme.com, signed by a reputable CA, to be used as the server certificate.

Where and how should the X.509 certificate and Mule applications be used to configure load balancing among the 5 CloudHub workers, and what DNS entries should be configured in order for the retailer to support its numerous business partners?

Options:

A.

Add the X.509 certificate to the Mule application's deployable archive, then configure a CloudHub Dedicated Load Balancer (DLB) for each of the Mule application's CloudHub workers

Create a CNAME for api.acme.com pointing to the DLB's A record

B.

Add the X.509 certificate to the CloudHub Shared Load Balancer (SLB), not to the Mule application

Create a CNAME for api.acme.com pointing to the SLB's A record

C.

Add the X.509 certificate to a CloudHub Dedicated Load Balancer (DLB), not to the Mule application

Create a CNAME for api.acme.com pointing to the DLB's A record

D.

Add the x.509 certificate to the Mule application's deployable archive, then configure the CloudHub Shared Load Balancer (SLB)

for each of the Mule application's CloudHub workers

Create a CNAME for api.acme.com pointing to the SLB's A record

Buy Now
Questions 48

An API has been unit tested and is ready for integration testing. The API is governed by a Client ID Enforcement policy in all environments.

What must the testing team do before they can start integration testing the API in the Staging environment?

Options:

A.

They must access the API portal and create an API notebook using the Client ID and Client Secret supplied by the API portal in the Staging environment

B.

They must request access to the API instance in the Staging environment and obtain a Client ID and Client Secret to be used for testing the API

C.

They must be assigned as an API version owner of the API in the Staging environment

D.

They must request access to the Staging environment and obtain the Client ID and Client Secret for that environment to be used for testing the API

Buy Now
Questions 49

What comparison is true about a CloudHub Dedicated Load Balancer (DLB) vs. the CloudHub Shared Load Balancer (SLB)?

Options:

A.

Only a DLB allows the configuration of a custom TLS server certificate

B.

Only the SLB can forward HTTP traffic to the VPC-internal ports of the CloudHub workers

C.

Both a DLB and the SLB allow the configuration of access control via IP whitelists

D.

Both a DLB and the SLB implement load balancing by sending HTTP requests to workers with the lowest workloads

Buy Now
Questions 50

A retailer is designing a data exchange interface to be used by its suppliers. The interface must support secure communication over the public internet. The interface must also work with a wide variety of programming languages and IT systems used by suppliers.

What are suitable interface technologies for this data exchange that are secure, cross-platform, and internet friendly, assuming that Anypoint Connectors exist for these interface technologies?

Options:

A.

EDJFACT XML over SFTP JSON/REST over HTTPS

B.

SOAP over HTTPS HOP over TLS gRPC over HTTPS

C.

XML over ActiveMQ XML over SFTP XML/REST over HTTPS

D.

CSV over FTP YAML over TLS JSON over HTTPS

Buy Now
Questions 51

Which key DevOps practice and associated Anypoint Platform component should a MuteSoft integration team adopt to improve delivery quality?

Options:

A.

A Continuous design with API Designer

B.

Automated testing with MUnit

C.

Passive monitoring with Anypoint Monitoring

D.

Manual testing with Anypoint Studio

Buy Now
Questions 52

According to MuleSoft, which system integration term describes the method, format, and protocol used for communication between two system?

Options:

A.

Component

B.

interaction

C.

Message

D.

Interface

Buy Now
Questions 53

A Mule application is being designed to do the following:

Step 1: Read a SalesOrder message from a JMS queue, where each SalesOrder consists of a header and a list of SalesOrderLineltems.

Step 2: Insert the SalesOrder header and each SalesOrderLineltem into different tables in an RDBMS.

Step 3: Insert the SalesOrder header and the sum of the prices of all its SalesOrderLineltems into a table In a different RDBMS.

No SalesOrder message can be lost and the consistency of all SalesOrder-related information in both RDBMSs must be ensured at all times.

What design choice (including choice of transactions) and order of steps addresses these requirements?

Options:

A.

1) Read the JMS message (NOT in an XA transaction)

2) Perform BOTH DB inserts in ONE DB transaction

3) Acknowledge the JMS message

B.

1) Read the JMS message (NOT in an XA transaction)

2) Perform EACH DB insert in a SEPARATE DB transaction

3) Acknowledge the JMS message

C.

1) Read the JMS message in an XA transaction

2) In the SAME XA transaction, perform BOTH DB inserts but do NOT acknowledge the JMS message

D.

1) Read and acknowledge the JMS message (NOT in an XA transaction)

2) In a NEW XA transaction, perform BOTH DB inserts

Buy Now
Questions 54

A Mule application uses the Database connector.

What condition can the Mule application automatically adjust to or recover from without needing to restart or redeploy the Mule application?

Options:

A.

One of the stored procedures being called by the Mule application has been renamed

B.

The database server was unavailable for four hours due to a major outage but is now fully operational again

C.

The credentials for accessing the database have been updated and the previous credentials are no longer valid

D.

The database server has been updated and hence the database driver library/JAR needs a minor version upgrade

Buy Now
Questions 55

What requires configuration of both a key store and a trust store for an HTTP Listener?

Options:

A.

Support for TLS mutual (two-way) authentication with HTTP clients

B.

Encryption of requests to both subdomains and API resource endpoints fhttPs://aDi.customer.com/ and https://customer.com/api)

C.

Encryption of both HTTP request and HTTP response bodies for all HTTP clients

D.

Encryption of both HTTP request header and HTTP request body for all HTTP clients

Buy Now
Questions 56

A Mule application currently writes to two separate SQL Server database instances across the internet using a single XA transaction. It is 58. proposed to split this one transaction into two separate non-XA transactions with no other changes to the Mule application.

What non-functional requirement can be expected to be negatively affected when implementing this change?

Options:

A.

Throughput

B.

Consistency

C.

Response time

D.

Availability

Buy Now
Questions 57

According to MuleSoft’s recommended REST conventions, which HTTP method should an API use to specify how AP\ clients can request data from a specified resource?

Options:

A.

POST

B.

PUT

C.

PATCH

D.

GET

Buy Now
Questions 58

A team has completed the build and test activities for a Mule application that implements a System API for its application network.

Which Anypoint Platform component should the team now use to both deploy and monitor the System AP\ implementation?

Options:

A.

API Manager

B.

Design Center

C.

Anypoint Exchange

D.

Runtime Manager

Buy Now
Questions 59

How are the API implementation , API client, and API consumer combined to invoke and process an API ?

Options:

A.

The API consumer creates an API implementation , which receives API invocations from an API such that they are processed for an API client

B.

The API consumer creates an API client which sends API invocations to an API such that they are processed by an API implementation

C.

An API client creates an API consumer, which receives API invocation from an API such that they are processed for an API implementation

D.

The API client creates an API consumer which sends API invocations to an API such that they are processed by API implementation

Buy Now
Questions 60

How does timeout attribute help inform design decisions while using JMS connector listening for incoming messages in an extended architecture (XA) transaction?

Options:

A.

After the timeout is exceeded, stale JMS consumer threads are destroyed and new threads are created

B.

The timeout specifies the time allowed to pass between receiving JMS messages on the same JMS connection and then after the timeout new JMS connection is established

C.

The time allowed to pass between committing the transaction and the completion of the mule flow and then after the timeout flow processing triggers an error

D.

The timeout defines the time that is allowed to pass without the transaction ending explicitly and after the timeout expires, the transaction rolls back

Buy Now
Questions 61

What best describes the Fully Qualified Domain Names (FQDNs), also known as DNS entries, created when a Mule application is deployed to the CloudHub Shared Worker Cloud?

Options:

A.

A fixed number of FQDNs are created, IRRESPECTIVE of the environment and VPC design

B.

The FQDNs are determined by the application name chosen, IRRESPECTIVE of the region

C.

The FQDNs are determined by the application name, but can be modified by an administrator after deployment

D.

The FQDNs are determined by both the application name and the region

Buy Now
Questions 62

A Mule application contains a Batch Job with two Batch Steps (Batch_Step_l and Batch_Step_2). A payload with 1000 records is received by the Batch Job.

How many threads are used by the Batch Job to process records, and how does each Batch Step process records within the Batch Job?

Options:

A.

Each Batch Job uses SEVERAL THREADS for the Batch Steps Each Batch Step instance receives ONE record at a time as the payload, and RECORDS are processed IN PARALLEL within and between the two Batch Steps

B.

Each Batch Job uses a SINGLE THREAD for all Batch steps Each Batch step instance receives ONE record at a time as the payload, and RECORDS are processed IN ORDER, first through Batch_Step_l and then through Batch_Step_2

C.

Each Batch Job uses a SINGLE THREAD to process a configured block size of record Each Batch Step instance receives A BLOCK OF records as the payload, and BLOCKS of records are processed IN ORDER

D.

Each Batch Job uses SEVERAL THREADS for the Batch Steps Each Batch Step instance receives ONE record at a time as the payload, and BATCH STEP INSTANCES execute IN PARALLEL to process records and Batch Steps in ANY order as fast as possible

Buy Now
Questions 63

An organization uses one specific CloudHub (AWS) region for all CloudHub deployments. How are CloudHub workers assigned to availability zones (AZs) when the organization's Mule applications are deployed to CloudHub in that region?

Options:

A.

Workers belonging to a given environment are assigned to the same AZ within that region.

B.

AZs are selected as part of the Mule application's deployment configuration.

C.

Workers are randomly distributed across available AZs within that region.

D.

An AZ is randomly selected for a Mule application, and all the Mule application's CloudHub workers are assigned to that one AZ

Buy Now
Questions 64

An organization is successfully using API led connectivity, however, as the application network grows, all the manually performed tasks to publish share and discover, register, apply policies to, and deploy an API are becoming repetitive pictures driving the organization to automate this process using efficient CI/'CD pipeline. Considering Anypoint platforms capabilities how should the organization approach automating is API lifecycle?

Options:

A.

Use runtime manager rest apis for API management and mavenforAPI deployment

B.

Use Maven with a custom configuration required for the API lifecycle

C.

Use Anypoint CLI or Anypoint Platform REST apis with scripting language such as groovy

D.

Use Exchange rest api's for API management and MavenforAPI deployment

Buy Now
Questions 65

Which Salesforce API is invoked to deploy, retrieve, create, update, or delete customization information, such as custom object definitions using Mule Salesforce Connectors in a Mule application?

Options:

A.

sObject Platform Action API

B.

User Interface API

C.

Metadata API

D.

Process Rules API

Buy Now
Questions 66

According to MuleSoft's API development best practices, which type of API development approach starts with writing and approving an API contract?

Options:

A.

Implement-first

B.

Catalyst

C.

Agile

D.

Design-first

Buy Now
Questions 67

What requirement prevents using Anypoint MQ as the messaging broker for a Mule application?

Options:

A.

When the payload sent through the message broker must use XML format

B.

When the payload sent through the message broker must be encrypted

C.

When the messaging broker must support point-to-point messaging

D.

When the messaging broker must be deployed on-premises

Buy Now
Questions 68

A large life sciences customer plans to use the Mule Tracing module with the Mapped Diagnostic Context (MDC) logging operations to enrich logging in its Mule application and to improve tracking by providing more context in the Mule application logs. The customer also wants to improve throughput and lower the message processing latency in its Mule application flows.

After installing the Mule Tracing module in the Mule application, how should logging be performed in flows in Mule applications, and what should be changed In the log4j2.xml files?

Options:

A.

In the flows, add Mule Tracing module Set logging variable operations before any Core Logger components.

In log4j2.xml files, change the appender's pattern layout to use %MDC and then assign the appender to a Logger or Root element.

B.

In the flows, add Mule Tracing module Set logging variable operations before any Core

Logger components.

In log4j2.xmI files, change the appender’s pattern layout to use the %MDC placeholder and then assign the appender to an AsyncLogger element.

C.

In the flows, add Mule Tracing module Set logging variable operations before any Core

Logger components.

In log4j2.xmI files, change the appender’'s pattern layout to use %asyncLogger placeholder and then assign the appender to an AsyncLogger element.

D.

In the flows, wrap Logger components in Async scopes. In log4j2.xmI files, change the appender's pattern layout to use the %asyncLogger

placeholder and then assign the appender to a Logger or Root element.

Buy Now
Questions 69

An integration team follows MuleSoft’s recommended approach to full lifecycle API development.

Which activity should this team perform during the API implementation phase?

Options:

A.

Validate the API specification

B.

Use the API specification to build the MuleSoft application

C.

Design the API specification

D.

Use the API specification to monitor the MuleSoft application

Buy Now
Questions 70

When designing an upstream API and its implementation, the development team has been advised to not set timeouts when invoking downstream API. Because the downstream API has no SLA that can be relied upon. This is the only donwstream API dependency of that upstream API. Assume the downstream API runs uninterrupted without crashing. What is the impact of this advice?

Options:

A.

The invocation of the downstream API will run to completion without timing out.

B.

An SLA for the upstream API CANNOT be provided.

C.

A default timeout of 500 ms will automatically be applied by the Mule runtime in which the upstream API implementation executes.

D.

A load-dependent timeout of less than 1000 ms will be applied by the Mule runtime in which the downstream API implementation executes.

Buy Now
Questions 71

An organization plans to migrate its deployment environment from an onpremises cluster to a Runtime Fabric (RTF) cluster. The on-premises Mule applications are currently configured with persistent object stores.

There is a requirement to enable Mule applications deployed to the RTF cluster to store and share data across application replicas and through restarts of the entire RTF cluster,

How can these reliability requirements be met?

Options:

A.

Replace persistent object stores with persistent VM queues in each Mule application deployment

B.

Install the Object Store pod on one of the cluster nodes

C.

Configure Anypoint Object Store v2 to share data between replicas in the RTF cluster

D.

Configure the Persistence Gateway in the RTF installation

Buy Now
Questions 72

Refer to the exhibit.

An organization deploys multiple Mule applications to the same customer -hosted Mule runtime. Many of these Mule applications must expose an HTTPS endpoint on the same port using a server-side certificate that rotates often.

What is the most effective way to package the HTTP Listener and package or store the server-side certificate when deploying these Mule applications, so the disruption caused by certificate rotation is minimized?

Options:

A.

Package the HTTPS Listener configuration in a Mule DOMAIN project, referencing it from all Mule applications that need to expose an HTTPS endpoint Package the server-side certificate in ALL Mule APPLICATIONS that need to expose an HTTPS endpoint

B.

Package the HTTPS Listener configuration in a Mule DOMAIN project, referencing it from all Mule applications that need to expose an HTTPS endpoint. Store the server-side certificate in a shared filesystem location in the Mule runtime's classpath, OUTSIDE the Mule DOMAIN or any Mule APPLICATION

C.

Package an HTTPS Listener configuration In all Mule APPLICATIONS that need to expose an HTTPS endpoint Package the server-side certificate in a NEW Mule DOMAIN project

D.

Package the HTTPS Listener configuration in a Mule DOMAIN project, referencing It from all Mule applications that need to expose an HTTPS endpoint. Package the server-side certificate in the SAME Mule DOMAIN project Go to Set

Buy Now
Questions 73

An organization is creating a set of new services that are critical for their business. The project team prefers using REST for all services but is willing to use SOAP with common WS-" standards if a particular service requires it.

What requirement would drive the team to use SOAP/WS-* for a particular service?

Options:

A.

Must use XML payloads for the service and ensure that it adheres to a specific schema

B.

Must publish and share the service specification (including data formats) with the consumers of the service

C.

Must support message acknowledgement and retry as part of the protocol

D.

Must secure the service, requiring all consumers to submit a valid SAML token

Buy Now
Questions 74

Mule applications need to be deployed to CloudHub so they can access on-premises database systems. These systems store sensitive and hence tightly protected data, so are not accessible over the internet.

What network architecture supports this requirement?

Options:

A.

An Anypoint VPC connected to the on-premises network using an IPsec tunnel or AWS DirectConnect, plus matching firewall rules in the VPC and on-premises network

B.

Static IP addresses for the Mule applications deployed to the CloudHub Shared Worker Cloud, plus matching firewall rules and IP

whitelisting in the on-premises network

C.

An Anypoint VPC with one Dedicated Load Balancer fronting each on-premises database system, plus matching IP whitelisting in the load balancer and firewall rules in the VPC and on-premises network

D.

Relocation of the database systems to a DMZ in the on-premises network, with Mule applications deployed to the CloudHub Shared Worker Cloud connecting only to the DMZ

Buy Now
Questions 75

A trading company handles millions of requests a day. Due to nature of its business, it requires excellent

performance and reliability within its application.

For this purpose, company uses a number of event-based API's hosted on various mule clusters that communicate across a shared message queue sitting within its network.

Which method should be used to meet the company's requirement for its system?

Options:

A.

XA transactions and XA connected components

B.

JMS transactions

C.

JMS manual acknowledgements with a reliability pattern

D.

VM queues with reliability pattern

Buy Now
Questions 76

According to MuleSoft, what Action should an IT organization take regarding its technology assets in order to close the IT delivery.

Options:

A.

Make assets easily discoverable via a central repository

B.

Focus project delivery efforts on custom assets that meet the specific requirements of each individual line of business

C.

Create weekly meetings that all members of IT attend to present justification and request approval to use existing assets

D.

Hire additional staff to meet the demand for asset creation required for approved projects and timelines

Buy Now
Questions 77

An organization has just developed a Mule application that implements a REST API. The mule application will be deployed to a cluster of customer hosted Mule runtimes.

What additional infrastructure component must the customer provide in order to distribute inbound API requests across the Mule runtimes of the cluster?

Options:

A.

A message broker

B.

An HTTP Load Balancer

C.

A database

D.

An Object Store

Buy Now
Questions 78

An organization uses Mule runtimes which are managed by Anypoint Platform - Private Cloud Edition. What MuleSoft component is responsible for feeding analytics data to non-MuleSoft analytics platforms?

Options:

A.

Anypoint Exchange

B.

The Mule runtimes

C.

Anypoint API Manager

D.

Anypoint Runtime Manager

Buy Now
Questions 79

What condition requires using a CloudHub Dedicated Load Balancer?

Options:

A.

When cross-region load balancing is required between separate deployments of the same Mule application

B.

When custom DNS names are required for API implementations deployed to customer-hosted Mule runtimes

C.

When API invocations across multiple CloudHub workers must be load balanced

D.

When server-side load-balanced TLS mutual authentication is required between API implementations and API clients

Buy Now
Questions 80

What is not true about Mule Domain Project?

Options:

A.

This allows Mule applications to share resources

B.

Expose multiple services within the Mule domain on the same port

C.

Only available Anypoint Runtime Fabric

D.

Send events (messages) to other Mule applications using VM queues

Buy Now
Questions 81

An external REST client periodically sends an array of records in a single POST request to a Mule application API endpoint.

The Mule application must validate each record of the request against a JSON schema before sending it to a downstream system in the same order that it was received in the array

Record processing will take place inside a router or scope that calls a child flow. The child flow has its own error handling defined. Any validation or communication failures should not prevent further processing of the remaining records.

To best address these requirements what is the most idiomatic(used for it intended purpose) router or scope to used in the parent flow, and what type of error handler should be used in the child flow?

Options:

A.

First Successful router in the parent flow

On Error Continue error handler in the child flow

B.

For Each scope in the parent flow

On Error Continue error handler in the child flow

C.

Parallel For Each scope in the parent flow

On Error Propagate error handler in the child flow

D.

Until Successful router in the parent flow

On Error Propagate error handler in the child flow

Buy Now
Exam Code: MCIA-Level-1
Exam Name: MuleSoft Certified Integration Architect - Level 1
Last Update: Jul 26, 2024
Questions: 273
MCIA-Level-1 pdf

MCIA-Level-1 PDF

$28  $80
MCIA-Level-1 Engine

MCIA-Level-1 Testing Engine

$33.25  $95
MCIA-Level-1 PDF + Engine

MCIA-Level-1 PDF + Testing Engine

$45.5  $130