ExamGecko
Home Home / MuleSoft / MCIA - Level 1

MuleSoft MCIA - Level 1 Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

Related questions











An organization's governance process requires project teams to get formal approval from all key stakeholders for all new Integration design specifications. An integration Mule application Is being designed that interacts with various backend systems. The Mule application will be created using Anypoint Design Center or Anypoint Studio and will then be deployed to a customer-hosted runtime.

What key elements should be included in the integration design specification when requesting approval for this Mule application?

A.
SLAs and non-functional requirements to access the backend systems
A.
SLAs and non-functional requirements to access the backend systems
Answers
B.
Snapshots of the Mule application's flows, including their error handling
B.
Snapshots of the Mule application's flows, including their error handling
Answers
C.
A list of current and future consumers of the Mule application and their contact details
C.
A list of current and future consumers of the Mule application and their contact details
Answers
D.
The credentials to access the backend systems and contact details for the administrator of each system
D.
The credentials to access the backend systems and contact details for the administrator of each system
Answers
Suggested answer: A

Explanation:

SLAs and non-functional requirements to access the backend systems. Only this option actually speaks to design parameters and reqs. * Below two are technical implementations and not the part of design: - Snapshots of the Mule application's flows, including their error handling - The credentials to access the backend systems and contact details for the administrator of each system * List of consumers is not relevant to the design

A set of integration Mule applications, some of which expose APIs, are being created to enable a new business process. Various stakeholders may be impacted by this. These stakeholders are a combination of semi-technical users (who understand basic integration terminology and concepts such as JSON and XML) and technically skilled potential consumers of the Mule applications and APIs.

What Is an effective way for the project team responsible for the Mule applications and APIs being built to communicate with these stakeholders using Anypoint Platform and its supplied toolset?

A.
Use Anypoint Design Center to implement the Mule applications and APIs and give the various stakeholders access to these Design Center projects, so they can collaborate and provide feedback
A.
Use Anypoint Design Center to implement the Mule applications and APIs and give the various stakeholders access to these Design Center projects, so they can collaborate and provide feedback
Answers
B.
Create Anypoint Exchange entries with pages elaborating the integration design, including API notebooks (where applicable) to help the stakeholders understand and interact with the Mule applications and APIs at various levels of technical depth
B.
Create Anypoint Exchange entries with pages elaborating the integration design, including API notebooks (where applicable) to help the stakeholders understand and interact with the Mule applications and APIs at various levels of technical depth
Answers
C.
Use Anypoint Exchange to register the various Mule applications and APIs and share the RAML definitions with the stakeholders, so they can be discovered
C.
Use Anypoint Exchange to register the various Mule applications and APIs and share the RAML definitions with the stakeholders, so they can be discovered
Answers
D.
Capture documentation about the Mule applications and APIs inline within the Mule integration flows and use Anypoint Studio's Export Documentation feature to provide an HTML version of this documentation to the stakeholders
D.
Capture documentation about the Mule applications and APIs inline within the Mule integration flows and use Anypoint Studio's Export Documentation feature to provide an HTML version of this documentation to the stakeholders
Answers
Suggested answer: B

Explanation:

As the stakeholders are semitechnical users , preferred option is Create Anypoint Exchange entries with pages elaborating the integration design, including API notebooks (where applicable) to help the stakeholders understand and interact with the Mule applications and APIs at various levels of technical depth

An integration Mute application consumes and processes a list of rows from a CSV file. Each row must be read from the CSV file, validated, and the row data sent to a JMS queue, in the exact order as in the CSV file.

If any processing step for a row falls, then a log entry must be written for that row, but processing of other rows must not be affected.

What combination of Mute components is most idiomatic (used according to their intended purpose) when Implementing the above requirements?

A.
Scatter-Gather component On Error Continue scope
A.
Scatter-Gather component On Error Continue scope
Answers
B.
VM connector first Successful scope On Error Propagate scope
B.
VM connector first Successful scope On Error Propagate scope
Answers
C.
For Each scope On Error Continue scope
C.
For Each scope On Error Continue scope
Answers
D.
Async scope On Error Propagate scope
D.
Async scope On Error Propagate scope
Answers
Suggested answer: C

Explanation:

* On Error Propagate halts execution and sends error to the client. In this scenario it's mentioned that "processing of other rows must not be affected" so Option B and C are ruled out.

* Scatter gather is used to club multiple responses together before processing. In this scenario, we need sequential processing. So option A is out of choice.

* Correct answer is For Each scope & On Error Continue scope Below requirement can be fulfilled in the below way

1) Using For Each scope , which will send each row from csv file sequentially. each row needs to be sent sequentially as requirement is to send the message in exactly the same way as it is mentioned in the csv file

2) Also other part of requirement is if any processing step for a row fails then it should log an error but should not affect other record processing . This can be achieved using On error Continue scope on these set of activities. so that error will not halt the processing. Also logger needs to be added in error handling section so that it can be logged.

* Attaching diagram for reference. Here it's try scope, but similar would be the case with For Each loop.

An organization's security policies mandate complete control of the login credentials used to log in to Anypoint Platform. What feature of Anypoint Platform should be used to meet this requirement?

A.
Enterprise Security Module
A.
Enterprise Security Module
Answers
B.
Client ID Secret
B.
Client ID Secret
Answers
C.
Federated Identity Management
C.
Federated Identity Management
Answers
D.
Federated Client Management
D.
Federated Client Management
Answers
Suggested answer: C

Explanation:

Correct answer is Federated Identity Management As the Anypoint Platform organization administrator, you can configure identity management in Anypoint Platform to set up users for single sign-on (SSO). Configure identity management using one of the following single sign-on standards:

OpenID Connect: End user identity verification by an authorization server including SSO SAML 2.0:

Web-based authorization including cross-domain SSO Where as Client Management is where Anypoint Platform acts as a client provider by default, but you can also configure external client providers to authorize client applications. As an API owner, you can apply an OAuth 2.0 policy to authorize client applications that try to access your API. You need an OAuth 2.0 provider to use an OAuth 2.0 policy

Reference: https://help.mulesoft.com/s/article/How-federated-users-are-mapped-to-Anypoint-Platform-Business-Groups-when-External-Identity-is-enabled

https://docs.mulesoft.com/access-management/external-identity

Refer to the exhibit.

An organization is sizing an Anypoint VPC for the non-production deployments of those Mule applications that connect to the organization's on-premises systems. This applies to approx. 60 Mule applications. Each application is deployed to two CloudHub i workers. The organization currently has three non-production environments (DEV, SIT and UAT) that share this VPC. The AWS region of the VPC has two AZs.

The organization has a very mature DevOps approach which automatically progresses each application through all non-production environments before automatically deploying to production.

This process results in several Mule application deployments per hour, using CloudHub's normal zero-downtime deployment feature.

What is a CIDR block for this VPC that results in the smallest usable private IP address range?

A.
10.0.0.0/26 (64 IPS)
A.
10.0.0.0/26 (64 IPS)
Answers
B.
10.0.0.0/25 (128 IPs)
B.
10.0.0.0/25 (128 IPs)
Answers
C.
10.0.0.0/24 (256 IPs)
C.
10.0.0.0/24 (256 IPs)
Answers
D.
10.0.0.0/22 (1024 IPs)
D.
10.0.0.0/22 (1024 IPs)
Answers
Suggested answer: D

Explanation:

Mule applications are deployed in CloudHub workers and each worker is assigned with a dedicated IP

ï For zero downtime deployment, each worker in CloudHub needs additional IP addresses

ï A few IPs in a VPC are reserved for infrastructure (generally 2 IPs)

ï The IP addresses are usually in a private range with a subnet block specifier, such as 10.0.0.1/24

ï The smallest CIDR network subnet block you can assign for your VPC is /24 (256 IP addresses) (60*3 env * 2 worker per application ) + 50% of (total) for zero downtime = 540 In this case correct answer is 10.0.0.0/22 as this provided 1024 IP's .

Other IP's are insufficient.

What Is a recommended practice when designing an integration Mule 4 application that reads a large XML payload as a stream?

A.
The payload should be dealt with as a repeatable XML stream, which must only be traversed (iterated-over) once and CANNOT be accessed randomly from DataWeave expressions and scripts
A.
The payload should be dealt with as a repeatable XML stream, which must only be traversed (iterated-over) once and CANNOT be accessed randomly from DataWeave expressions and scripts
Answers
B.
The payload should be dealt with as an XML stream, without converting it to a single Java object (POJO)
B.
The payload should be dealt with as an XML stream, without converting it to a single Java object (POJO)
Answers
C.
The payload size should NOT exceed the maximum available heap memory of the Mute runtime on which the Mule application executes
C.
The payload size should NOT exceed the maximum available heap memory of the Mute runtime on which the Mule application executes
Answers
D.
The payload must be cached using a Cache scope If It Is to be sent to multiple backend systems
D.
The payload must be cached using a Cache scope If It Is to be sent to multiple backend systems
Answers
Suggested answer: C

Explanation:

If the size of the stream exceeds the maximum, a STREAM_MAXIMUM_SIZE_EXCEEDED error is raised.

Anypoint Exchange is required to maintain the source code of some of the assets committed to it, such as Connectors, Templates, and API specifications.

What is the best way to use an organization's source-code management (SCM) system in this context?

A.
Organizations should continue to use an SCM system of their choice, in addition to keeping source code for these asset types in Anypoint Exchange, thereby enabling parallel development, branching, and merging
A.
Organizations should continue to use an SCM system of their choice, in addition to keeping source code for these asset types in Anypoint Exchange, thereby enabling parallel development, branching, and merging
Answers
B.
Organizations need to use Anypoint Exchange as the main SCM system to centralize versioning and avoid code duplication
B.
Organizations need to use Anypoint Exchange as the main SCM system to centralize versioning and avoid code duplication
Answers
C.
Organizations can continue to use an SCM system of their choice for branching and merging, as long as they follow the branching and merging strategy enforced by Anypoint Exchange
C.
Organizations can continue to use an SCM system of their choice for branching and merging, as long as they follow the branching and merging strategy enforced by Anypoint Exchange
Answers
D.
Organizations need to point Anypoint Exchange to their SCM system so Anypoint Exchange can pull source code when requested by developers and provide it to Anypoint Studio
D.
Organizations need to point Anypoint Exchange to their SCM system so Anypoint Exchange can pull source code when requested by developers and provide it to Anypoint Studio
Answers
Suggested answer: B

Explanation:

* Organization should continue to use SCM system of their choice, in addition to keeping source code for these asset types in Anypoint Exchange, thereby enabling parallel development, branching.

* Reason is that Anypoint exchange is not full fledged version repositories like GitHub.

* But at same time it is tightly coupled with Mule assets

What Anypoint Connectors support transactions?

A.
Database, JMS, VM
A.
Database, JMS, VM
Answers
B.
Database, 3MS, HTTP
B.
Database, 3MS, HTTP
Answers
C.
Database, JMS, VM, SFTP
C.
Database, JMS, VM, SFTP
Answers
D.
Database, VM, File
D.
Database, VM, File
Answers
Suggested answer: A

Explanation:

Below Anypoint Connectors support transactions ? JMS ñ Publish ñ Consume ? VM ñ Publish ñ Consume ? Database ñ All operations

A Mule application is deployed to a cluster of two(2) cusomter-hosted Mule runtimes. Currently the node name Alice is the primary node and node named bob is the secondary node. The mule application has a flow that polls a directory on a file system for new files.

The primary node Alice fails for an hour and then restarted.

After the Alice node completely restarts, from what node are the files polled, and what node is now the primary node for the cluster?

A.
Files are polled from Alice nodeAlice is now the primary node
A.
Files are polled from Alice nodeAlice is now the primary node
Answers
B.
Files are polled form Bob nodeAlice is now the primary node
B.
Files are polled form Bob nodeAlice is now the primary node
Answers
C.
Files are polled from Alice nodeBob is the now the primary node
C.
Files are polled from Alice nodeBob is the now the primary node
Answers
D.
Files are polled form Bob nodeBob is now the primary node
D.
Files are polled form Bob nodeBob is now the primary node
Answers
Suggested answer: D

Explanation:

* Mule High Availability Clustering provides basic failover capability for Mule. * When the primary Mule Runtime becomes unavailable, for example, because of a fatal JVM or hardware failure or it's taken offline for maintenance, a backup Mule Runtime immediately becomes the primary node and resumes processing where the failed instance left off. * After a system administrator recovers a failed Mule Runtime server and puts it back online, that server automatically becomes the backup node. In this case, Alice, once up, will become backup -------------------------------------------------------------------------- -------------------------------------------------------------------- Reference: https://docs.mulesoft.com/muleruntime/ 4.3/hadr-guide So correct choice is : Files are polled form Bob node Bob is now the primary node

An Organization has previously provisioned its own AWS VPC hosting various servers. The organization now needs to use Cloudhub to host a Mule application that will implement a REST API once deployed to Cloudhub, this Mule application must be able to communicate securely with the customer-provisioned AWS VPC resources within the same region, without being interceptable on the public internet.

What Anypoint Platform features should be used to meet these network communication requirements between Cloudhub and the existing customer-provisioned AWS VPC?

A.
Add a Mulesoft hosted Anypoint VPC configured and with VPC Peering to the AWS VPC
A.
Add a Mulesoft hosted Anypoint VPC configured and with VPC Peering to the AWS VPC
Answers
B.
Configure an external identity provider (IDP) in Anypoint Platform with certificates from the customer provisioned AWS VPC
B.
Configure an external identity provider (IDP) in Anypoint Platform with certificates from the customer provisioned AWS VPC
Answers
C.
Add a default API Whitelisting policy to API Manager to automatically whitelist the customer provisioned AWS VPC IP ranges needed by the Mule applicaton
C.
Add a default API Whitelisting policy to API Manager to automatically whitelist the customer provisioned AWS VPC IP ranges needed by the Mule applicaton
Answers
D.
Use VM queues in the Mule application to allow any non-mule assets within the customer provisioned AWS VPC to subscribed to and receive messages
D.
Use VM queues in the Mule application to allow any non-mule assets within the customer provisioned AWS VPC to subscribed to and receive messages
Answers
Suggested answer: A

Explanation:

Correct answer is: Add a Mulesoft hosted Anypoint VPC configured and with VPC Peering to the AWS VPC

* Connecting to your Anypoint VPC extends your corporate network and allows CloudHub workers to access resources behind your corporate firewall.

* You can connect on-premises data centers through a secured VPN tunnel, or a private AWS VPC through VPC peering, or by using AWS Direct Connect.

MuleSoft Doc Reference : https://docs.mulesoft.com/runtime-manager/virtual-private-cloud

Total 244 questions
Go to page: of 25