ExamGecko
Home Home / MuleSoft / MCIA - Level 1

MuleSoft MCIA - Level 1 Practice Test - Questions Answers, Page 17

Question list
Search
Search

List of questions

Search

Related questions











A company is modernizing its legal systems lo accelerate access lo applications and data while supporting the adoption of new technologies. The key to achieving this business goal is unlocking the companies' key systems and dala including microservices miming under Docker and kubernetes containers using apis.

Considering the current aggressive backlog and project delivery requirements the company wants to take a strategic approach in the first phase of its transformation projects by quickly deploying API's in mule runtime that are able lo scale, connect to on premises systems and migrate as needed.

Which runtime deployment option supports company's goals?

A.
Customer hosted self provisioned runtimes
A.
Customer hosted self provisioned runtimes
Answers
B.
Cloudhub runtimes
B.
Cloudhub runtimes
Answers
C.
Runtime fabric on self managed Kubernetes
C.
Runtime fabric on self managed Kubernetes
Answers
D.
Runtime fabric on Vmware metal
D.
Runtime fabric on Vmware metal
Answers
Suggested answer: C

A corporation has deployed multiple mule applications implementing various public and private API's to different cloudhub workers. These API's arc Critical applications that must be highly available and in line with the reliability SLA as defined by stakeholders.

How can API availability (liveliness or readiness) be monitored so that Ops team receives outage notifications?

A.
Enable monitoring of individual applications from Anypoint monitoring
A.
Enable monitoring of individual applications from Anypoint monitoring
Answers
B.
Configure alerts with failure conditions in runtime manager
B.
Configure alerts with failure conditions in runtime manager
Answers
C.
Configure alerts failure conditions in API manager
C.
Configure alerts failure conditions in API manager
Answers
D.
Use any point functional monitoring test API's functional behavior
D.
Use any point functional monitoring test API's functional behavior
Answers
Suggested answer: A

An organization is successfully using API led connectivity, however, as the application network grows, all the manually performed tasks to publish share and discover, register, apply policies to, and deploy an API are becoming repetitive pictures driving the organization to automate this process using efficient CI/'CD pipeline. Considering Anypoint platforms capabilities how should the organization approach automating is API lifecycle?

A.
Use runtime manager rest apis for API management and mavenforAPI deployment
A.
Use runtime manager rest apis for API management and mavenforAPI deployment
Answers
B.
Use Maven with a custom configuration required for the API lifecycle
B.
Use Maven with a custom configuration required for the API lifecycle
Answers
C.
Use Anypoint CLI or Anypoint Platform REST apis with scripting language such as groovy
C.
Use Anypoint CLI or Anypoint Platform REST apis with scripting language such as groovy
Answers
D.
Use Exchange rest api's for API management and MavenforAPI deployment
D.
Use Exchange rest api's for API management and MavenforAPI deployment
Answers
Suggested answer: D

A mule application must periodically process a large dataset which varies from 6 GB lo 8 GB from a back-end database and write transform data lo an FTPS server using a properly configured bad job scope.

The performance requirements of an application are approved to run in the cloud hub 0.2 vCore with 8 GB storage capacity and currency requirements are met.

How can the high rate of records be effectively managed in this application?

A.
Use streaming with a file storage repeatable strategy for reading records from the database and batch aggregator with streaming to write to FTPS
A.
Use streaming with a file storage repeatable strategy for reading records from the database and batch aggregator with streaming to write to FTPS
Answers
B.
Use streaming with an in-memory reputable store strategy for reading records from the database and batch aggregator with streaming to write to FTPS
B.
Use streaming with an in-memory reputable store strategy for reading records from the database and batch aggregator with streaming to write to FTPS
Answers
C.
Use streaming with a file store repeatable strategy for reading records from the database and batch aggregator with an optimal size
C.
Use streaming with a file store repeatable strategy for reading records from the database and batch aggregator with an optimal size
Answers
D.
Use streaming with a file store repeatable strategy reading records from the database and batch aggregator without any required configuration
D.
Use streaming with a file store repeatable strategy reading records from the database and batch aggregator without any required configuration
Answers
Suggested answer: A

An organization has deployed runtime fabric on an eight note cluster with performance profile. An API uses and non persistent object store for maintaining some of its state dat a. What will be the impact to the stale data if server crashes?

A.
State data is preserved
A.
State data is preserved
Answers
B.
State data is rolled back to a previously saved version
B.
State data is rolled back to a previously saved version
Answers
C.
State data is lost
C.
State data is lost
Answers
D.
State data is preserved as long as more than one more is unaffected by the crash
D.
State data is preserved as long as more than one more is unaffected by the crash
Answers
Suggested answer: D

A rale limiting policy has been applied to a soap VI.2 API published in Clondhub. The API implementation catches errors in a global error handler on error propagate in the main flow for HTTP: RETRY_EXHAUSTED with HTTP status set to 429 and any with the HTTP status set to 500.

What is the expected H1TP status when the client exceeds the quota of the API calls?

A.
HTTP status 429 as defined in the HTTP:RETRY EXHAUSTED error handler in the API
A.
HTTP status 429 as defined in the HTTP:RETRY EXHAUSTED error handler in the API
Answers
B.
HTTP status 500 as defined in the ANY error handler in the API since an API:RETRY_EXHAUSTEDwill be generated
B.
HTTP status 500 as defined in the ANY error handler in the API since an API:RETRY_EXHAUSTEDwill be generated
Answers
C.
HTTP status 401 unauthorized for policy violation
C.
HTTP status 401 unauthorized for policy violation
Answers
D.
HTTP status 400 from the rate-limiting policy violation since the call does not reach the back-end
D.
HTTP status 400 from the rate-limiting policy violation since the call does not reach the back-end
Answers
Suggested answer: A

An organization is designing multiple new applications to run on CloudHub in a single Anypoint VPC and that must share data using a common persistent Anypoint object store V2 (OSv2).

Which design gives these mule applications access to the same object store instance?

A.
AVM connector configured to directly access the persistence queue of the persistent object store
A.
AVM connector configured to directly access the persistence queue of the persistent object store
Answers
B.
An Anypoint MQ connector configured to directly access the persistent object store
B.
An Anypoint MQ connector configured to directly access the persistent object store
Answers
C.
Object store V2 can be shared across cloudhub applications with the configured osv2 connector
C.
Object store V2 can be shared across cloudhub applications with the configured osv2 connector
Answers
D.
The object store V2 rest API configured to access the persistent object store
D.
The object store V2 rest API configured to access the persistent object store
Answers
Suggested answer: D

A leading e-commerce giant will use Mulesoft API's on runtime fabric (RTF) to process customer orders. Some customer's sensitive information such as credit card information is also there as a part of a API payload.

What approach minimizes the risk of matching sensitive data to the original and can convert back to the original value whenever and wherever required?

A.
Apply masking to hide the sensitive information and then use API
A.
Apply masking to hide the sensitive information and then use API
Answers
B.
manager to detokenize the masking format to return the original value
B.
manager to detokenize the masking format to return the original value
Answers
C.
create a tokenization format and apply a tokenization policy to the API Gateway
C.
create a tokenization format and apply a tokenization policy to the API Gateway
Answers
D.
Used both masking and tokenization
D.
Used both masking and tokenization
Answers
E.
Apply a field level encryption policy in the API Gateway
E.
Apply a field level encryption policy in the API Gateway
Answers
Suggested answer: A

Customer has deployed mule applications to different customer hosted mule run times. Mule applications are managed from Anypoint platform.

What needs to be configured to monitor these Mule applications from Anypoint monitoring and what sends monitoring data to Anypoint monitoring?

A.
Enable monitoring of individual applications from runtime manager application settings Runtime manager agent sends monitoring data from the mule applications to Anypoint monitoring
A.
Enable monitoring of individual applications from runtime manager application settings Runtime manager agent sends monitoring data from the mule applications to Anypoint monitoring
Answers
B.
Install runtime manager agent on each mule runtimeRuntime manager agent since monitoring data from the mule applications to Anypoint monitoring
B.
Install runtime manager agent on each mule runtimeRuntime manager agent since monitoring data from the mule applications to Anypoint monitoring
Answers
C.
Anypoint monitoring agent on each mule runtimeAnypoint monitoring agent sends monitoring data from the mule applications to Anypoint monitoring
C.
Anypoint monitoring agent on each mule runtimeAnypoint monitoring agent sends monitoring data from the mule applications to Anypoint monitoring
Answers
D.
By default, Anypoint monitoring agent will be installed on each Mule run time Anypoint Monitoring agent automatically sends monitoring data from the Mule applications to Anypoint monitoring
D.
By default, Anypoint monitoring agent will be installed on each Mule run time Anypoint Monitoring agent automatically sends monitoring data from the Mule applications to Anypoint monitoring
Answers
Suggested answer: C

A trading company handles millions of requests a day. Due to nature of its business, it requires excellent performance and reliability within its application.

For this purpose, company uses a number of event-based API's hosted on various mule clusters that communicate across a shared message queue sitting within its network.

Which method should be used to meet the company's requirement for its system?

A.
XA transactions and XA connected components
A.
XA transactions and XA connected components
Answers
B.
JMS transactions
B.
JMS transactions
Answers
C.
JMS manual acknowledgements with a reliability pattern
C.
JMS manual acknowledgements with a reliability pattern
Answers
D.
VM queues with reliability pattern
D.
VM queues with reliability pattern
Answers
Suggested answer: C
Total 244 questions
Go to page: of 25