ExamGecko
Home Home / Salesforce / Certified MuleSoft Integration Architect I

Salesforce Certified MuleSoft Integration Architect I Practice Test - Questions Answers, Page 25

Question list
Search
Search

List of questions

Search

Related questions











An organization is in the process of building automated deployments using a CI/CD process. As a part of automated deployments, it wants to apply policies to API Instances.

What tool can the organization use to promote and deploy API Manager policies?

A.
Anypoint CLI
A.
Anypoint CLI
Answers
B.
MUnit Maven plugin
B.
MUnit Maven plugin
Answers
C.
Mule Maven plugin
C.
Mule Maven plugin
Answers
D.
Runtime Manager agent
D.
Runtime Manager agent
Answers
Suggested answer: A

What is the MuleSoft-recommended best practice to share the connector and configuration information among the APIs?

A.
Build a Mule domain project, add the Database connector and configuration to it, and reference this one domain project from each System API
A.
Build a Mule domain project, add the Database connector and configuration to it, and reference this one domain project from each System API
Answers
B.
Build a separate Mule domain project for each API, and configure each of them to use a file on a shared file store to load the configuration information dynamically
B.
Build a separate Mule domain project for each API, and configure each of them to use a file on a shared file store to load the configuration information dynamically
Answers
C.
Build another System API that connects to the database, and refactor all the other APIs to make requests through the new System API to access the database
C.
Build another System API that connects to the database, and refactor all the other APIs to make requests through the new System API to access the database
Answers
D.
Create an API proxy for each System API and share the Database connector configuration with all the API proxies via an automated policy
D.
Create an API proxy for each System API and share the Database connector configuration with all the API proxies via an automated policy
Answers
Suggested answer: A

An external API frequently invokes an Employees System API to fetch employee data from a MySQL database. The architect must design a caching strategy to query the database only when there Is an update to the Employees table or else return a cached response in order to minimize the number of redundant transactions being handled by the database.

A.
Use an On Table Row operation configured with the Employees table, call invalidate cache, and hardcode the new Employees data to cache. Use an object-store-caching-strategy and set the expiration interval to 1 hour.
A.
Use an On Table Row operation configured with the Employees table, call invalidate cache, and hardcode the new Employees data to cache. Use an object-store-caching-strategy and set the expiration interval to 1 hour.
Answers
B.
Use an On Table Row operation configured with the Employees table and cail invalidate cache. Use an object-store-caching-strategy and the default expiration interval.
B.
Use an On Table Row operation configured with the Employees table and cail invalidate cache. Use an object-store-caching-strategy and the default expiration interval.
Answers
C.
Use a Scheduler with a fixed frequency set to every hour to trigger an invalidate cache flow. Use an object-store-caching-strategy and the default expiration interval.
C.
Use a Scheduler with a fixed frequency set to every hour to trigger an invalidate cache flow. Use an object-store-caching-strategy and the default expiration interval.
Answers
D.
Use a Scheduler with a fixed frequency set to every hour, triggering an invalidate cache flow. Use an object-store-caching-strategy and set the expiration interval to 1 hour.
D.
Use a Scheduler with a fixed frequency set to every hour, triggering an invalidate cache flow. Use an object-store-caching-strategy and set the expiration interval to 1 hour.
Answers
Suggested answer: A

What approach configures an API gateway to hide sensitive data exchanged between API consumers and API implementations, but can convert tokenized fields back to their original value for other API requests or responses, without having to recode the API implementations?

A.
Create both masking and tokenization formats and use both to apply a tokenization policy in an API gateway to mask sensitive values in message payloads withcharacters, and apply a corresponding detokenization policy to return the original values to other APIs
A.
Create both masking and tokenization formats and use both to apply a tokenization policy in an API gateway to mask sensitive values in message payloads withcharacters, and apply a corresponding detokenization policy to return the original values to other APIs
Answers
B.
Create a masking format and use it to apply a tokenization policy in an API gateway to mask sensitive values in message payloads with characters, and apply a corresponding detokenization policy to return the original values to other APIs
B.
Create a masking format and use it to apply a tokenization policy in an API gateway to mask sensitive values in message payloads with characters, and apply a corresponding detokenization policy to return the original values to other APIs
Answers
C.
Use a field-level encryption policy in an API gateway to replace sensitive fields in message payload with encrypted values, and apply a corresponding field-level decryption policy to return the original values to other APIs
C.
Use a field-level encryption policy in an API gateway to replace sensitive fields in message payload with encrypted values, and apply a corresponding field-level decryption policy to return the original values to other APIs
Answers
D.
Create a tokenization format and use it to apply a tokenization policy in an API gateway to replace sensitive fields in message payload with similarly formatted tokenized values, and apply a corresponding detokenization policy to return the original values to other APIs
D.
Create a tokenization format and use it to apply a tokenization policy in an API gateway to replace sensitive fields in message payload with similarly formatted tokenized values, and apply a corresponding detokenization policy to return the original values to other APIs
Answers
Suggested answer: A

A leading eCommerce giant will use MuleSoft APIs on Runtime Fabric (RTF) to process customer orders. Some customer-sensitive information, such as credit card information, is required in request payloads or is included in response payloads in some of the APIs. Other API requests and responses are not authorized to access some of this customer-sensitive information but have been implemented to validate and transform based on the structure and format of this customer-sensitive information (such as account IDs, phone numbers, and postal codes).

What approach configures an API gateway to hide sensitive data exchanged between API consumers and API implementations, but can convert tokenized fields back to their original value for other API requests or responses, without having to recode the API implementations?

Later, the project team requires all API specifications to be augmented with an additional non-functional requirement (NFR) to protect the backend services from a high rate of requests, according to defined service-level agreements (SLAs). The NFR's SLAs are based on a new tiered subscription level 'Gold', 'Silver', or 'Platinum' that must be tied to a new parameter that is being added to the Accounts object in their enterprise data model.

Following MuleSoft's recommended best practices, how should the project team now convey the necessary non-functional requirement to stakeholders?

A.
Create and deploy API proxies in API Manager for the NFR, change the baseurl in each API specification to the corresponding API proxy implementation endpoint, and publish each modified API specification to Exchange
A.
Create and deploy API proxies in API Manager for the NFR, change the baseurl in each API specification to the corresponding API proxy implementation endpoint, and publish each modified API specification to Exchange
Answers
B.
Update each API specification with comments about the NFR's SLAs and publish each modified API specification to Exchange
B.
Update each API specification with comments about the NFR's SLAs and publish each modified API specification to Exchange
Answers
C.
Update each API specification with a shared RAML fragment required to implement the NFR and publish the RAML fragment and each modified API specification to Exchange
C.
Update each API specification with a shared RAML fragment required to implement the NFR and publish the RAML fragment and each modified API specification to Exchange
Answers
D.
Create a shared RAML fragment required to implement the NFR, list each API implementation endpoint in the RAML fragment, and publish the RAML fragment to Exchange
D.
Create a shared RAML fragment required to implement the NFR, list each API implementation endpoint in the RAML fragment, and publish the RAML fragment to Exchange
Answers
Suggested answer: A

When a Mule application using VM queues is deployed to a customer-hosted cluster or multiple CloudHub v1.0 workers/replicas, how are messages consumed across the nodes?

A.
Sequentially, from a dedicated Anypoint MQ queue
A.
Sequentially, from a dedicated Anypoint MQ queue
Answers
B.
Sequentially, only from the primary node
B.
Sequentially, only from the primary node
Answers
C.
In a non-deterministic way
C.
In a non-deterministic way
Answers
D.
Round-robin, within an XA transaction
D.
Round-robin, within an XA transaction
Answers
Suggested answer: A

A retail company is implementing a MuleSoft API to get inventory details from two vendors by Invoking each vendor's online applications. Due to network issues, the invocations to the vendor applications are timing out intermittently, but the requests are successful after re-invoking each

What is the most performant way of implementing the API to invoke each vendor application and to retry invocations that generate timeout errors?

A.
Use a For-Each scope to invoke the two vendor applications in series, one after the other. Place the For-Each scope inside an Until-Successful scope to retry requests that raise timeout errors.
A.
Use a For-Each scope to invoke the two vendor applications in series, one after the other. Place the For-Each scope inside an Until-Successful scope to retry requests that raise timeout errors.
Answers
B.
Use a Choice scope to Invoke each vendor application on a separate route. Place the Choice scope inside an Until-Successful scope to retry requests that raise timeout errors.
B.
Use a Choice scope to Invoke each vendor application on a separate route. Place the Choice scope inside an Until-Successful scope to retry requests that raise timeout errors.
Answers
C.
Use a Scatter-Gather scope to invoke each vendor application on a separate route. Use an Until-Successful scope in each route to retry requests that raise timeout errors.
C.
Use a Scatter-Gather scope to invoke each vendor application on a separate route. Use an Until-Successful scope in each route to retry requests that raise timeout errors.
Answers
D.
Use a Round-Robin scope to invoke each vendor application on a separate route. Use a Try-Catch scope in each route to retry requests that raise timeout errors.
D.
Use a Round-Robin scope to invoke each vendor application on a separate route. Use a Try-Catch scope in each route to retry requests that raise timeout errors.
Answers
Suggested answer: A

An organization plans to use the Anypoint Platform audit logging service to log Anypoint MQ actions.

What consideration must be kept in mind when leveraging Anypoint MQ Audit Logs?

A.
Anypoint MQ Audit Logs include logs for sending, receiving, or browsing messages
A.
Anypoint MQ Audit Logs include logs for sending, receiving, or browsing messages
Answers
B.
Anypoint MQ Audit Logs include fogs for failed Anypoint MQ operations
B.
Anypoint MQ Audit Logs include fogs for failed Anypoint MQ operations
Answers
C.
Anypoint MQ Audit Logs include logs for queue create, delete, modify, and purge operations
C.
Anypoint MQ Audit Logs include logs for queue create, delete, modify, and purge operations
Answers
Suggested answer: A

What requirement prevents using Anypoint MQ as the messaging broker for a Mule application?

A.
When the payload sent through the message broker must use XML format
A.
When the payload sent through the message broker must use XML format
Answers
B.
When the payload sent through the message broker must be encrypted
B.
When the payload sent through the message broker must be encrypted
Answers
C.
When the messaging broker must support point-to-point messaging
C.
When the messaging broker must support point-to-point messaging
Answers
D.
When the messaging broker must be deployed on-premises
D.
When the messaging broker must be deployed on-premises
Answers
Suggested answer: A

The company's FTPS server login username and password

A.
TLS context trust store containing a public certificate for the company. The company's PGP public key that was used to sign the files
A.
TLS context trust store containing a public certificate for the company. The company's PGP public key that was used to sign the files
Answers
B.
The partner's PGP public key used by the company to login to the FTPS server. A TLS context key store containing the private key for the company The partner's PGP private key that was used to sign the files
B.
The partner's PGP public key used by the company to login to the FTPS server. A TLS context key store containing the private key for the company The partner's PGP private key that was used to sign the files
Answers
C.
The company's FTPS server login username and password. A TLS context trust store containing a public certificate for ftps.partner.com The partner's PGP public key that was used to sign the files
C.
The company's FTPS server login username and password. A TLS context trust store containing a public certificate for ftps.partner.com The partner's PGP public key that was used to sign the files
Answers
D.
The partner's PGP public key used by the company to login to the FTPS server. A TLS context key store containing the private key for ftps.partner.com The company's PGP private key that was used to sign the files
D.
The partner's PGP public key used by the company to login to the FTPS server. A TLS context key store containing the private key for ftps.partner.com The company's PGP private key that was used to sign the files
Answers
Suggested answer: A
Total 273 questions
Go to page: of 28