ExamGecko
Home Home / MuleSoft / MCIA - Level 1

MuleSoft MCIA - Level 1 Practice Test - Questions Answers, Page 13

Question list
Search
Search

List of questions

Search

Related questions











A Mule application is being designed for deployment to a single CloudHub worker. The Mule application will have a flow that connects to a SaaS system to perform some operations each time the flow is invoked.

The SaaS system connector has operations that can be configured to request a short-lived token (fifteen minutes) that can be reused for subsequent connections within the fifteen minute time window. After the token expires, a new token must be requested and stored.

What is the most performant and idiomatic (used for its intended purpose) Anypoint Platform component or service to use to support persisting and reusing tokens in the Mule application to help speed up reconnecting the Mule application to the SaaS application?

A.
Nonpersistent object store
A.
Nonpersistent object store
Answers
B.
Persistent object store
B.
Persistent object store
Answers
C.
Variable
C.
Variable
Answers
D.
Database
D.
Database
Answers
Suggested answer: D

Explanation:

Reference: https://docs.mulesoft.com/mule-runtime/4.4/reconnection-strategy-about

An organization has an HTTPS-enabled Mule application named Orders API that receives requestsfrom another Mule application named Process Orders.

The communication between these two Mule applications must be secured by TLS mutual authentication (two-way TLS).

At a minimum, what must be stored in each truststore and keystore of these two Mule applications to properly support two-way TLS between the two Mule applications while properly protecting each Mule application's keys?

A.
Orders API truststore: The Orders API public keyProcess Orders keystore: The Process Orders private key and public key
A.
Orders API truststore: The Orders API public keyProcess Orders keystore: The Process Orders private key and public key
Answers
B.
Orders API truststore: The Orders API private key and public keyProcess Orders keystore: The Process Orders private key public key
B.
Orders API truststore: The Orders API private key and public keyProcess Orders keystore: The Process Orders private key public key
Answers
C.
Orders API truststore: The Process Orders public keyOrders API keystore: The Orders API private key and public keyProcess Orders truststore: The Orders API public keyProcess Orders keystore: The Process Orders private key and public key
C.
Orders API truststore: The Process Orders public keyOrders API keystore: The Orders API private key and public keyProcess Orders truststore: The Orders API public keyProcess Orders keystore: The Process Orders private key and public key
Answers
D.
Orders API truststore: The Process Orders public keyOrders API keystore: The Orders API private keyProcess Orders truststore: The Orders API public keyProcess Orders keystore: The Process Orders private key
D.
Orders API truststore: The Process Orders public keyOrders API keystore: The Orders API private keyProcess Orders truststore: The Orders API public keyProcess Orders keystore: The Process Orders private key
Answers
Suggested answer: C

Explanation:

Reference: https://www.caeliusconsulting.com/blogs/one-way-and-two-way-tls-and-theirimplementation-in-mulesoft/

A Mule application is built to support a local transaction for a series of operations on a single database. The Mule application has a Scatter-Gather that participates in the local transaction.

What is the behavior of the Scatter-Gather when running within this local transaction?

A.
Execution of each route within the Scatter-Gather occurs sequentially Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations
A.
Execution of each route within the Scatter-Gather occurs sequentially Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations
Answers
B.
Execution of all routes within the Scatter-Gather occurs in parallel Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations
B.
Execution of all routes within the Scatter-Gather occurs in parallel Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations
Answers
C.
Execution of each route within the Scatter-Gather occurs sequentially Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations
C.
Execution of each route within the Scatter-Gather occurs sequentially Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations
Answers
D.
Execution of each route within the Scatter-Gather occurs in parallel Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations
D.
Execution of each route within the Scatter-Gather occurs in parallel Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations
Answers
Suggested answer: A

Explanation:

Reference: https://docs.mulesoft.com/mule-runtime/4.4/transaction-management

An organization is creating a Mule application that will be deployed to CloudHub. The Mule application has a property named dbPassword that stores a database user's password.

The organization's security standards indicate that the dbPassword property must be hidden from every Anypoint Platform user after the value is set in the Runtime Manager Properties tab.

What configuration in the Mule application helps hide the dbPassword property value in Runtime Manager?

A.
Use secure::dbPassword as the property placeholder name and store the cleartext (unencrypted) value in a secure properties placeholder file
A.
Use secure::dbPassword as the property placeholder name and store the cleartext (unencrypted) value in a secure properties placeholder file
Answers
B.
Use secure::dbPassword as the property placeholder name and store the property encrypted value in a secure properties placeholder file
B.
Use secure::dbPassword as the property placeholder name and store the property encrypted value in a secure properties placeholder file
Answers
C.
Add the dbPassword property to the secureProperties section of the pom.xml file
C.
Add the dbPassword property to the secureProperties section of the pom.xml file
Answers
D.
Add the dbPassword property to the secureProperties section of the mule-artifact.json file
D.
Add the dbPassword property to the secureProperties section of the mule-artifact.json file
Answers
Suggested answer: B

Explanation:

Reference: https://docs.mulesoft.com/runtime-manager/secure-application-properties

An organization is designing a Mule application to periodically poll an SFTP location for new files containing sales order records and then process those sales orders. Each sales order must be processed exactly once.

To support this requirement, the Mule application must identify and filter duplicate sales orders on the basis of a unique ID contained in each sales order record and then only send the new sales orders to the downstream system.

What is the most idiomatic (used for its intended purpose) Anypoint connector, validator, or scope that can be configured in the Mule application to filter duplicate sales orders on the basis of the unique ID field contained in each sales order record?

A.
Configure a Cache scope to filter and store each record from the received file by the order ID
A.
Configure a Cache scope to filter and store each record from the received file by the order ID
Answers
B.
Configure a Database connector to filter and store each record by the order ID
B.
Configure a Database connector to filter and store each record by the order ID
Answers
C.
Configure an Idempotent Message Validator component to filter each record by the order ID
C.
Configure an Idempotent Message Validator component to filter each record by the order ID
Answers
D.
Configure a watermark In an On New or Updated File event source to filter unique records by the order ID
D.
Configure a watermark In an On New or Updated File event source to filter unique records by the order ID
Answers
Suggested answer: C

Explanation:

Reference: https://docs.mulesoft.com/mule-runtime/3.9/idempotent-filter

An organization's security requirements mandate centralized control at all times over authentication and authorization of external applications when invoking web APIs managed on Anypoint Platform.

What Anypoint Platform feature is most idiomatic (used for its intended purpose), straightforward, and maintainable to use to meet this requirement?

A.
Client management configured in access management
A.
Client management configured in access management
Answers
B.
Identity management configured in access management
B.
Identity management configured in access management
Answers
C.
Enterprise Security module coded in Mule applications
C.
Enterprise Security module coded in Mule applications
Answers
D.
External access configured in API Manager
D.
External access configured in API Manager
Answers
Suggested answer: B

Explanation:

Reference: https://blogs.mulesoft.com/dev-guides/api-security-ways-to-authenticate-and-authorize/

An organization has defined a common object model in Java to mediate the communication between different Mule applications in a consistent way. A Mule application is being built to use this common object model to process responses from a SOAP API and a REST API and then write the processed results to an order management system.

The developers want Anypoint Studio to utilize these common objects to assist in creating mappings for various transformation steps in the Mule application.

What is the most idiomatic (used for its intended purpose) and performant way to utilize these common objects to map between the inbound and outbound systems in the Mule application?

A.
Use JAXB (XML) and Jackson (JSON) data bindings
A.
Use JAXB (XML) and Jackson (JSON) data bindings
Answers
B.
Use the WSS module
B.
Use the WSS module
Answers
C.
Use the Java module
C.
Use the Java module
Answers
D.
Use the Transform Message component
D.
Use the Transform Message component
Answers
Suggested answer: A

Explanation:

Reference: https://docs.mulesoft.com/mule-runtime/3.9/understanding-mule-configuration

A marketing organization is designing a Mule application to process campaign dat a. The Mule application will periodically check for a file in a SFTP location and process the records in the file. The size of the file can vary from 10MB to 5GB. Due to the limited availabiltty of vCores, the Mule application is deployed to a single CloudHub worker configured with vCore size 0.2.

The application must transform and send different formats of this file to three different downstream SFTP locations.

What is the most idiomatic (used for its intended purpose) and performant way to configure the SFTP operations or event sources to process the large files to support these deployment requirements?

A.
Use an in-memory repeatable stream
A.
Use an in-memory repeatable stream
Answers
B.
Use a file-stored non-repeatable stream
B.
Use a file-stored non-repeatable stream
Answers
C.
Use an in-memory non-repeatable stream
C.
Use an in-memory non-repeatable stream
Answers
D.
Use a file-stored repeatable stream
D.
Use a file-stored repeatable stream
Answers
Suggested answer: A

Explanation:

Reference: https://docs.mulesoft.com/mule-runtime/4.4/streaming-about

A manufacturing company is planning to deploy Mule applications to its own Azure Kubernetes Service infrastructure.

The organization wants to make the Mule applications more available and robust by deploying each Mule application to an isolated Mule runtime in a Docker container while managing all the Mule applications from the MuleSoft-hosted control plane.

What is the most idiomatic (used for its intended purpose) choice of runtime plane to meet these organizational requirements?

A.
Anypoint Platform Private Cloud Edition
A.
Anypoint Platform Private Cloud Edition
Answers
B.
Anypoint Runtime Fabric
B.
Anypoint Runtime Fabric
Answers
C.
CloudHub
C.
CloudHub
Answers
D.
Anypoint Service Mesh
D.
Anypoint Service Mesh
Answers
Suggested answer: B

Explanation:

Reference: https://blogs.mulesoft.com/dev-guides/how-to-tutorials/anypoint-runtime-fabric/

The AnyAirline organization's passenger reservations center is designing an integration solution that combines invocations of three different System APIs (bookFlight, bookHotel, and bookCar) in a business transaction. Each System API makes calls to a single database.

The entire business transaction must be rolled back when at least one of the APIs fails.

What is the most idiomatic (used for its intended purpose) way to integrate these APIs in near realtime that provides the best balance of consistency, performance, and reliability?

A.
Implement eXtended Architecture (XA) transactions between the API implementations Coordinate between the API implementations using a Saga pattern Implement caching in each API implementation to improve performance
A.
Implement eXtended Architecture (XA) transactions between the API implementations Coordinate between the API implementations using a Saga pattern Implement caching in each API implementation to improve performance
Answers
B.
Implement local transactions within each API implementation Configure each API implementation to also participate in the same eXtended Architecture (XA) transaction Implement caching in each API implementation to improve performance
B.
Implement local transactions within each API implementation Configure each API implementation to also participate in the same eXtended Architecture (XA) transaction Implement caching in each API implementation to improve performance
Answers
C.
Implement local transactions in each API implementationCoordinate between the API implementations using a Saga patternApply various compensating actions depending on where a failure occurs
C.
Implement local transactions in each API implementationCoordinate between the API implementations using a Saga patternApply various compensating actions depending on where a failure occurs
Answers
D.
Implement an eXtended Architecture (XA) transaction manager in a Mule application using a Saga pattern Connect each API implementation with the Mule application using XA transactions Apply various compensating actions depending on where a failure occurs
D.
Implement an eXtended Architecture (XA) transaction manager in a Mule application using a Saga pattern Connect each API implementation with the Mule application using XA transactions Apply various compensating actions depending on where a failure occurs
Answers
Suggested answer: C

Explanation:

Reference: https://aws.amazon.com/blogs/compute/building-a-serverless-distributed-applicationusing-a-saga-orchestration-pattern/

Total 244 questions
Go to page: of 25