ExamGecko
Home Home / MuleSoft / MCIA Level 1 Maintenance

MuleSoft MCIA Level 1 Maintenance Practice Test - Questions Answers, Page 8

Question list
Search
Search

List of questions

Search

Related questions











A Mule application is built to support a local transaction for a series of operations on a single database. The mule application has a Scatter-Gather scope that participates in the local transaction.

What is the behavior of the Scatter-Gather when running within this local transaction?

A.
Execution of all routes within Scatter-Gather occurs in parallel Any error that occurs inside Scatter- Gather will result in a roll back of all the database operations
A.
Execution of all routes within Scatter-Gather occurs in parallel Any error that occurs inside Scatter- Gather will result in a roll back of all the database operations
Answers
B.
Execution of all routes within Scatter-Gather occurs sequentially Any error that occurs inside Scatter-Gather will be handled by error handler and will not result in roll back
B.
Execution of all routes within Scatter-Gather occurs sequentially Any error that occurs inside Scatter-Gather will be handled by error handler and will not result in roll back
Answers
C.
Execution of all routes within Scatter-Gather occurs sequentially Any error that occurs inside Scatter-Gather will result in a roll back of all the database operations
C.
Execution of all routes within Scatter-Gather occurs sequentially Any error that occurs inside Scatter-Gather will result in a roll back of all the database operations
Answers
D.
Execution of all routes within Scatter-Gather occurs in parallel Any error that occurs inside Scatter- Gather will be handled by error handler and will not result in roll back
D.
Execution of all routes within Scatter-Gather occurs in parallel Any error that occurs inside Scatter- Gather will be handled by error handler and will not result in roll back
Answers
Suggested answer: A

How does timeout attribute help inform design decisions while using JMS connector listening for incoming messages in an extended architecture (XA) transaction?

A.
After the timeout is exceeded, stale JMS consumer threads are destroyed and new threads are created
A.
After the timeout is exceeded, stale JMS consumer threads are destroyed and new threads are created
Answers
B.
The timeout specifies the time allowed to pass between receiving JMS messages on the same JMS connection and then after the timeout new JMS connection is established
B.
The timeout specifies the time allowed to pass between receiving JMS messages on the same JMS connection and then after the timeout new JMS connection is established
Answers
C.
The time allowed to pass between committing the transaction and the completion of the mule flow and then after the timeout flow processing triggers an error
C.
The time allowed to pass between committing the transaction and the completion of the mule flow and then after the timeout flow processing triggers an error
Answers
D.
The timeout defines the time that is allowed to pass without the transaction ending explicitly and after the timeout expires, the transaction rolls back
D.
The timeout defines the time that is allowed to pass without the transaction ending explicitly and after the timeout expires, the transaction rolls back
Answers
Suggested answer: D

An auto mobile company want to share inventory updates with dealers Dl and D2 asynchronously and concurrently via queues Q1 and Q2. Dealer Dl must consume the message from the queue Q1 and dealer D2 to must consume a message from the queue Q2.

Dealer D1 has implemented a retry mechanism to reprocess the transaction in case of any errors while processing the inventers updates. Dealer D2 has not implemented any retry mechanism.

How should the dealers acknowledge the message to avoid message loss and minimize impact on the current implementation?

A.
Dealer D1 must use auto acknowledgement and dealer D2 can use manual acknowledgement and acknowledge the message after successful processing
A.
Dealer D1 must use auto acknowledgement and dealer D2 can use manual acknowledgement and acknowledge the message after successful processing
Answers
B.
Dealer D1 can use auto acknowledgement and dealer D2 can use IMMEDIATE acknowledgement and acknowledge the message of successful processing
B.
Dealer D1 can use auto acknowledgement and dealer D2 can use IMMEDIATE acknowledgement and acknowledge the message of successful processing
Answers
C.
Dealer D1 and dealer D2 must use AUTO acknowledgement and acknowledge the message after successful processing
C.
Dealer D1 and dealer D2 must use AUTO acknowledgement and acknowledge the message after successful processing
Answers
D.
Dealer D1 can use AUTO acknowledgement and dealer D2 must use manual acknowledgement and acknowledge the message after successful processing
D.
Dealer D1 can use AUTO acknowledgement and dealer D2 must use manual acknowledgement and acknowledge the message after successful processing
Answers
Suggested answer: D

A company is using Mulesoft to develop API's and deploy them to Cloudhub and on premises targets.

Recently it has decided to enable Runtime Fabric deployment option as well and infrastructure is set up for this option.

What can be used to deploy Runtime Fabric?

A.
AnypointCLI
A.
AnypointCLI
Answers
B.
Anypoint platform REST API's
B.
Anypoint platform REST API's
Answers
C.
Directly uploading ajar file from the Runtime manager
C.
Directly uploading ajar file from the Runtime manager
Answers
D.
Mule maven plug-in
D.
Mule maven plug-in
Answers
Suggested answer: D

As an enterprise architect, what are the two reasons for which you would use a canonical data model in the new integration project using Mulesoft Anypoint platform ( choose two answers )

A.
To have consistent data structure aligned in processes
A.
To have consistent data structure aligned in processes
Answers
B.
To isolate areas within a bounded context
B.
To isolate areas within a bounded context
Answers
C.
To incorporate industry standard data formats
C.
To incorporate industry standard data formats
Answers
D.
There are multiple canonical definitions of each data type
D.
There are multiple canonical definitions of each data type
Answers
E.
Because the model isolates the back and systems and support mule applications from change
E.
Because the model isolates the back and systems and support mule applications from change
Answers
Suggested answer: A, B

A company is planning to migrate its deployment environment from on-premises cluster to a Runtime Fabric (RTF) cluster. It also has a requirement to enable Mule applications deployed to a Mule runtime instance to store and share data across application replicas and restarts.

How can these requirements be met?

A.
Anypoint object store V2 to share data between replicas in the RTF cluster
A.
Anypoint object store V2 to share data between replicas in the RTF cluster
Answers
B.
Install the object store pod on one of the cluster nodes
B.
Install the object store pod on one of the cluster nodes
Answers
C.
Configure Persistence Gateway in any of the servers using Mule Object Store
C.
Configure Persistence Gateway in any of the servers using Mule Object Store
Answers
D.
Configure Persistent Gateway at the RTF
D.
Configure Persistent Gateway at the RTF
Answers
Suggested answer: D

An organization designing a hybrid, load balanced, single cluster production environment. Due to performance service level agreement goals, it is looking into running the Mule applications in an active-active multi node cluster configuration.

What should be considered when running its Mule applications in this type of environment?

A.
All event sources, regardless of time , can be configured as the target source by the primary node in the cluster
A.
All event sources, regardless of time , can be configured as the target source by the primary node in the cluster
Answers
B.
An external load balancer is required to distribute incoming requests throughout the cluster nodes
B.
An external load balancer is required to distribute incoming requests throughout the cluster nodes
Answers
C.
A Mule application deployed to multiple nodes runs in an isolation from the other nodes in the cluster
C.
A Mule application deployed to multiple nodes runs in an isolation from the other nodes in the cluster
Answers
D.
Although the cluster environment is fully installed configured and running, it will not process any requests until an outage condition is detected by the primary node in the cluster.
D.
Although the cluster environment is fully installed configured and running, it will not process any requests until an outage condition is detected by the primary node in the cluster.
Answers
Suggested answer: B

An organization has decided on a cloud migration strategy to minimize the organization's own IT resources. Currently the organization has all of its new applications running on its own premises and uses an on-premises load balancer that exposes all APIs under the base URL (https://api.rutujar.com).

As part of migration strategy, the organization is planning to migrate all of its new applications and load balancer CloudHub.

What is the most straightforward and cost-effective approach to Mule application deployment and load balancing that preserves the public URL's?

A.
Deploy the Mule application to CloudhubCreate a CNAME record for base URL( httpsr://api.rutujar.com) in the Cloudhub shared load balancerthat points to the A record of theon-premises load balancerApply mapping rules in SLB to map URLto their corresponding Mule applications
A.
Deploy the Mule application to CloudhubCreate a CNAME record for base URL( httpsr://api.rutujar.com) in the Cloudhub shared load balancerthat points to the A record of theon-premises load balancerApply mapping rules in SLB to map URLto their corresponding Mule applications
Answers
B.
Deploy the Mule application to CloudhubUpdate a CNAME record for base URL ( https://api.rutujar.com) in the organization's DNS server topoint to the A record of the Cloudhub dedicated load balancerApply mapping rules in DLB to map URLto their corresponding Mule applications
B.
Deploy the Mule application to CloudhubUpdate a CNAME record for base URL ( https://api.rutujar.com) in the organization's DNS server topoint to the A record of the Cloudhub dedicated load balancerApply mapping rules in DLB to map URLto their corresponding Mule applications
Answers
C.
Deploy the Mule application to CloudhubUpdate a CNAME record for base URL ( https://api.rutujar.com) in the organization's DNS server topoint to the A record of the CloudHub shared load balancerApply mapping rules in SLB to map URLto their corresponding Mule applications
C.
Deploy the Mule application to CloudhubUpdate a CNAME record for base URL ( https://api.rutujar.com) in the organization's DNS server topoint to the A record of the CloudHub shared load balancerApply mapping rules in SLB to map URLto their corresponding Mule applications
Answers
D.
For each migrated Mule application, deploy an API proxy application to Cloudhub with all traffic to the mule applications routed through a Cloud Hub Dedicated load balancer (DLB) Update a CNAME record for base URL ( https://api.rutujar.com) in the organization's DNS server to point to the A record of the CloudHub dedicated load balancer Apply mapping rules in DLB to map each API proxy application who is responding new application
D.
For each migrated Mule application, deploy an API proxy application to Cloudhub with all traffic to the mule applications routed through a Cloud Hub Dedicated load balancer (DLB) Update a CNAME record for base URL ( https://api.rutujar.com) in the organization's DNS server to point to the A record of the CloudHub dedicated load balancer Apply mapping rules in DLB to map each API proxy application who is responding new application
Answers
Suggested answer: B

Which Salesforce API is invoked to deploy, retrieve, create or delete customization information such as custom object definitions using a Mule Salesforce connector in a Mule application?

A.
Metadata API
A.
Metadata API
Answers
B.
REST API
B.
REST API
Answers
C.
SOAP API
C.
SOAP API
Answers
D.
Bulk API
D.
Bulk API
Answers
Suggested answer: B

Refer to the exhibit.

The HTTP Listener and the Logger are being handled from which thread pools respectively?

A.
CPU_INTENSIVE and Dedicated Selector pool
A.
CPU_INTENSIVE and Dedicated Selector pool
Answers
B.
UBER and NONBLOCKING
B.
UBER and NONBLOCKING
Answers
C.
Shared Selector Pool and CPU LITE
C.
Shared Selector Pool and CPU LITE
Answers
D.
BLOCKING _IO and UBER
D.
BLOCKING _IO and UBER
Answers
Suggested answer: C
Total 116 questions
Go to page: of 12