ExamGecko
Home Home / Salesforce / Certified MuleSoft Developer I

Salesforce Certified MuleSoft Developer I Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions











What Mule application can have API policies applied by

Anypoint Platform to the endpoint exposed by that Mule application?

A) A Mule application that accepts requests over HTTP/1.x

B) A Mule application that accepts JSON requests over TCP but is NOT required to provide a response

C) A Mute application that accepts JSON requests over WebSocket

D) A Mule application that accepts gRPC requests over HTTP/2

A.
Option A
A.
Option A
Answers
B.
Option B
B.
Option B
Answers
C.
Option C
C.
Option C
Answers
D.
Option D
D.
Option D
Answers
Suggested answer: A

Explanation:

Option A. >> Anypoint API Manager and API policies are applicable to all types of HTTP/1.x APIs.>> They are not applicable to WebSocket APIs, HTTP/2 APIs and gRPC APIs

What Anypoint Connectors support transactions?

A.
Database, JMS, VM
A.
Database, JMS, VM
Answers
B.
Database, 3MS, HTTP
B.
Database, 3MS, HTTP
Answers
C.
Database, JMS, VM, SFTP
C.
Database, JMS, VM, SFTP
Answers
D.
Database, VM, File
D.
Database, VM, File
Answers
Suggested answer: A

An organization wants MuleSoft-hosted runtime plane features (such as HTTP load balancing, zero downtime, and horizontal and vertical scaling) in its Azure environment. What runtime plane minimizes the organization's effort to achieve these features?

A.
Anypoint Runtime Fabric
A.
Anypoint Runtime Fabric
Answers
B.
Anypoint Platform for Pivotal Cloud Foundry
B.
Anypoint Platform for Pivotal Cloud Foundry
Answers
C.
CloudHub
C.
CloudHub
Answers
D.
A hybrid combination of customer-hosted and MuleSoft-hosted Mule runtimes
D.
A hybrid combination of customer-hosted and MuleSoft-hosted Mule runtimes
Answers
Suggested answer: A

Explanation:

Anypoint Runtime Fabric. >> When a customer is already having an Azure environment, It is not at all an ideal approach to go with hybrid model having some Mule Runtimes hosted on Azure and some on MuleSoft. This is unnecessary and useless.>> CloudHub is a Mulesoft-hosted Runtime plane and is on AWS. We cannot customize to point CloudHub to customer's Azure environment.>> Anypoint Platform for Pivotal Cloud Foundry is specifically for infrastructure provided by Pivotal Cloud Foundry>> Anypoint Runtime Fabric is right answer as it is a container service that automates the deployment and orchestration of Mule applications and API gateways. Runtime Fabric runs within a customer-managed infrastructure on AWS, Azure, virtual machines (VMs), and bare-metal servers.-Some of the capabilities of Anypoint Runtime Fabric include:-Isolation between applications by running a separate Mule runtime per application.-Ability to run multiple versions of Mule runtime on the same set of resources.-Scaling applications across multiple replicas.-Automated application fail-over.-Application management with Anypoint Runtime Manager.

Say, there is a legacy CRM system called CRM-Z which is offering below functions:

1. Customer creation

2. Amend details of an existing customer

3. Retrieve details of a customer

4. Suspend a customer

A.
Implement a system API named customerManagement which has all the functionalities wrapped in it as various operations/resources
A.
Implement a system API named customerManagement which has all the functionalities wrapped in it as various operations/resources
Answers
B.
Implement different system APIs named createCustomer, amendCustomer, retrieveCustomer and suspendCustomer as they are modular and has seperation of concerns
B.
Implement different system APIs named createCustomer, amendCustomer, retrieveCustomer and suspendCustomer as they are modular and has seperation of concerns
Answers
C.
Implement different system APIs named createCustomerInCRMZ, amendCustomerInCRMZ, retrieveCustomerFromCRMZ and suspendCustomerInCRMZ as they are modular and has seperation of concerns
C.
Implement different system APIs named createCustomerInCRMZ, amendCustomerInCRMZ, retrieveCustomerFromCRMZ and suspendCustomerInCRMZ as they are modular and has seperation of concerns
Answers
Suggested answer: B

Explanation:

Implement different system APIs named createCustomer, amendCustomer, retrieveCustomer and suspendCustomer as they are modular and has seperation of concerns. >> It is quite normal to have a single API and different Verb + Resource combinations. However, this fits well for an Experience API or a Process API but not a best architecture style for System APIs. So, option with just one customerManagement API is not the best choice here.>> The option with APIs in createCustomerInCRMZ format is next close choice w.r.t modularization and less maintenance but the naming of APIs is directly coupled with the legacy system. A better foreseen approach would be to name your APIs by abstracting the backend system names as it allows seamless replacement/migration of any backend system anytime. So, this is not the correct choice too.>> createCustomer, amendCustomer, retrieveCustomer and suspendCustomer is the right approach and is the best fit compared to other options as they are both modular and same time got the names decoupled from backend system and it has covered all requirements a System API needs.

An Anypoint Platform organization has been configured with an external identity provider (IdP) for identity management and client management. What credentials or token must be provided to Anypoint CLI to execute commands against the Anypoint Platform APIs?

A.
The credentials provided by the IdP for identity management
A.
The credentials provided by the IdP for identity management
Answers
B.
The credentials provided by the IdP for client management
B.
The credentials provided by the IdP for client management
Answers
C.
An OAuth 2.0 token generated using the credentials provided by the IdP for client management
C.
An OAuth 2.0 token generated using the credentials provided by the IdP for client management
Answers
D.
An OAuth 2.0 token generated using the credentials provided by the IdP for identity management
D.
An OAuth 2.0 token generated using the credentials provided by the IdP for identity management
Answers
Suggested answer: A

Explanation:

The credentials provided by the IdP for identity management. >> There is no support for OAuth 2.0 tokens from client/identity providers to authenticate via Anypoint CLI. Only possible tokens are 'bearer tokens' that too only generated using Anypoint Organization/Environment Client Id and Secret from https://anypoint.mulesoft.com/accounts/login. Not the client credentials of client provider. So, OAuth 2.0 is not possible. More over, the token is mainly for API Manager purposes and not associated with a user. You can NOT use it to call most APIs (for example Cloudhub and etc) as per this Mulesoft Knowledge article.>> The other option allowed by Anypoint CLI is to use client credentials. It is possible to use client credentials of a client provider but requires setting up Connected Apps in client management but such details are not given in the scenario explained in the question.>> So only option left is to use user credentials from identify provider

A company requires Mule applications deployed to CloudHub to be isolated between non-production and production environments. This is so Mule applications deployed to non-production environments can only access backend systems running in their customer-hosted non-production environment, and so Mule applications deployed to production environments can only access backend systems running in their customer-hosted production environment. How does MuleSoft recommend modifying Mule applications, configuring environments, or changing infrastructure to support this type of per-environment isolation between Mule applications and backend systems?

A.
Modify properties of Mule applications deployed to the production Anypoint Platform environments to prevent access from non-production Mule applications
A.
Modify properties of Mule applications deployed to the production Anypoint Platform environments to prevent access from non-production Mule applications
Answers
B.
Configure firewall rules in the infrastructure inside each customer-hosted environment so that only IP addresses from the corresponding Anypoint Platform environments are allowed to communicate with corresponding backend systems
B.
Configure firewall rules in the infrastructure inside each customer-hosted environment so that only IP addresses from the corresponding Anypoint Platform environments are allowed to communicate with corresponding backend systems
Answers
C.
Create non-production and production environments in different Anypoint Platform business groups
C.
Create non-production and production environments in different Anypoint Platform business groups
Answers
D.
Create separate Anypoint VPCs for non-production and production environments, then configure connections to the backend systems in the corresponding customer-hosted environments
D.
Create separate Anypoint VPCs for non-production and production environments, then configure connections to the backend systems in the corresponding customer-hosted environments
Answers
Suggested answer: D

Explanation:

Create separate Anypoint VPCs for non-production and production environments, then configure connections to the backend systems in the corresponding customer-hosted environments.. >>Creating different Business Groups does NOT make any difference w.r.t accessing the non-prod and prod customer-hosted environments. Still they will be accessing from both Business Groups unless process network restrictions are put in place.>>We need to modify or couple the Mule Application Implementations with the environment. In fact, we should never implements application coupled with environments by binding them in the properties. Only basic things like endpoint URL etc should be bundled in properties but not environment level access restrictions.>>IP addresses on CloudHub are dynamic until unless a special static addresses are assigned. So it is not possible to setup firewall rules in customer-hosted infrastrcture. More over, even if static IP addresses are assigned, there could be 100s of applications running on cloudhub and setting up rules for all of them would be a hectic task, non-maintainable and definitely got a good practice.>>Thebest practice recommendedby Mulesoft (In fact any cloud provider), is to have your Anypoint VPCs seperated for Prod and Non-Prod and perform the VPC peering or VPN tunneling for these Anypoint VPCs to respective Prod and Non-Prod customer-hosted environment networks.Bottom of FormTop of Form

An API has been updated in Anypoint exchange by its API producer from version 3.1.1 to 3.2.0 following accepted semantic versioning practices and the changes have been communicated via the APIs public portal. The API endpoint does NOT change in the new version. How should the developer of an API client respond to this change?

A.
The API producer should be requested to run the old version in parallel with the new one
A.
The API producer should be requested to run the old version in parallel with the new one
Answers
B.
The API producer should be contacted to understand the change to existing functionality
B.
The API producer should be contacted to understand the change to existing functionality
Answers
C.
The API client code only needs to be changed if it needs to take advantage of the new features
C.
The API client code only needs to be changed if it needs to take advantage of the new features
Answers
D.
The API clients need to update the code on their side and need to do full regression
D.
The API clients need to update the code on their side and need to do full regression
Answers
Suggested answer: C

Question 10: Skipped

An API implementation returns three X-RateLimit-* HTTP response headers to a requesting API client. What type of information do these response headers indicate to the API client?

A.
The error codes that result from throttling
A.
The error codes that result from throttling
Answers
B.
A correlation ID that should be sent in the next request
B.
A correlation ID that should be sent in the next request
Answers
C.
The HTTP response size
C.
The HTTP response size
Answers
D.
The remaining capacity allowed by the API implementation
D.
The remaining capacity allowed by the API implementation
Answers
Suggested answer: D

Explanation:

The remaining capacity allowed by the API implementation.. >>

Reference: https://docs.mulesoft.com/api-manager/2.x/rate-limiting-and-throttling-sla-based-policies#response-headers

A retail company with thousands of stores has an API to receive data about purchases and insert it into a single database. Each individual store sends a batch of purchase data to the API about every 30 minutes. The API implementation uses a database bulk insert command to submit all the purchase data to a database using a custom JDBC driver provided by a data analytics solution provider. The API implementation is deployed to a single CloudHub worker. The JDBC driver processes the data into a set of several temporary disk files on the CloudHub worker, and then the data is sent to an analytics engine using a proprietary protocol. This process usually takes less than a few minutes. Sometimes a request fails. In this case, the logs show a message from the JDBC driver indicating an out-of-file-space message. When the request is resubmitted, it is successful. What is the best way to try to resolve this throughput issue?

A.
se a CloudHub autoscaling policy to add CloudHub workers
A.
se a CloudHub autoscaling policy to add CloudHub workers
Answers
B.
Use a CloudHub autoscaling policy to increase the size of the CloudHub worker
B.
Use a CloudHub autoscaling policy to increase the size of the CloudHub worker
Answers
C.
Increase the size of the CloudHub worker(s)
C.
Increase the size of the CloudHub worker(s)
Answers
D.
Increase the number of CloudHub workers
D.
Increase the number of CloudHub workers
Answers
Suggested answer: D

Explanation:

Increase the size of the CloudHub worker(s). The key details that we can take out from the given scenario are:>> API implementation uses a database bulk insert command to submit all the purchase data to a database>> JDBC driver processes the data into a set of several temporary disk files on the CloudHub worker>> Sometimes a request fails and the logs show a message indicating an out-of-file-space messageBased on above details:>> Both auto-scaling options does NOT help because we cannot set auto-scaling rules based on error messages. Auto-scaling rules are kicked-off based on CPU/Memory usages and not due to some given error or disk space issues.>> Increasing the number of CloudHub workers also does NOT help here because the reason for the failure is not due to performance aspects w.r.t CPU or Memory. It is due to disk-space.>> Moreover, the API is doing bulk insert to submit the received batch data. Which means, all data is handled by ONE worker only at a time. So, the disk space issue should be tackled on 'per worker' basis. Having multiple workers does not help as the batch may still fail on any worker when disk is out of space on that particular worker.Therefore, the right way to deal this issue and resolve this is to increase the vCore size of the worker so that a new worker with more disk space will be provisioned.

Due to a limitation in the backend system, a system API can only handle up to 500 requests per second. What is the best type of API policy to apply to the system API to avoid overloading the backend system?

A.
Rate limiting
A.
Rate limiting
Answers
B.
HTTP caching
B.
HTTP caching
Answers
C.
Rate limiting - SLA based
C.
Rate limiting - SLA based
Answers
D.
Spike control
D.
Spike control
Answers
Suggested answer: D

Explanation:

Spike control. >> First things first, HTTP Caching policy is for purposes different than avoiding the backend system from overloading. So this is OUT.>> Rate Limiting and Throttling/ Spike Control policies are designed to limit API access, but have different intentions.>> Rate limiting protects an API by applying a hard limit on its access.>> Throttling/ Spike Control shapes API access by smoothing spikes in traffic.That is why, Spike Control is the right option.

Total 95 questions
Go to page: of 10