ExamGecko
Home Home / Salesforce / Certified MuleSoft Integration Architect I

Salesforce Certified MuleSoft Integration Architect I Practice Test - Questions Answers, Page 26

Question list
Search
Search

List of questions

Search

Related questions











A new Mule application has been deployed through Runtime Manager to CloudHub 1.0 using a CI/CD pipeline with sensitive properties set as cleartext. The Runtime Manager Administrator opened a high priority incident ticket about this violation of their security requirements indicating these sensitive properties values must not be stored or visible in Runtime Manager but should be changeable in Runtime Manager by Administrators with proper permissions.

How can the Mule application be deployed while safely hiding the sensitive properties?

A.
Add an ArrayList of all the sensitive properties' names in the mule-artifact.json file of the application
A.
Add an ArrayList of all the sensitive properties' names in the mule-artifact.json file of the application
Answers
B.
Add encrypted versions of the sensitive properties as global configuration properties in the Mule application
B.
Add encrypted versions of the sensitive properties as global configuration properties in the Mule application
Answers
C.
Add a new wrapper.java.additional.xx parameter for each sensitive property in the wrapper.conf file used by the CI/CD pipeline scripts
C.
Add a new wrapper.java.additional.xx parameter for each sensitive property in the wrapper.conf file used by the CI/CD pipeline scripts
Answers
D.
Create a variable for each sensitive property and declare them as hidden in the CI/CD pipeline scripts
D.
Create a variable for each sensitive property and declare them as hidden in the CI/CD pipeline scripts
Answers
Suggested answer: A

As a part of design , Mule application is required call the Google Maps API to perform a distance computation. The application is deployed to cloudhub.

At the minimum what should be configured in the TLS context of the HTTP request configuration to meet these requirements?

A.
The configuration is built-in and nothing extra is required for the TLS context
A.
The configuration is built-in and nothing extra is required for the TLS context
Answers
B.
Request a private key from Google and create a PKCS12 file with it and add it in keyStore as a part of TLS context
B.
Request a private key from Google and create a PKCS12 file with it and add it in keyStore as a part of TLS context
Answers
C.
Download the Google public certificate from a browser, generate JKS file from it and add it in key store as a part of TLS context
C.
Download the Google public certificate from a browser, generate JKS file from it and add it in key store as a part of TLS context
Answers
D.
Download the Google public certificate from a browser, generate a JKS file from it and add it in Truststore as part of the TLS context
D.
Download the Google public certificate from a browser, generate a JKS file from it and add it in Truststore as part of the TLS context
Answers
Suggested answer: A

A project team is working on an API implementation using the RAML definition as a starting point. The team has updated the definition to include new operations and has published a new version to exchange. Meanwhile another team is working on a mule application consuming the same API implementation.

During the development what has to be performed by the mule application team to take advantage of the newly added operations?

A.
Scaffold the client application with the new definition
A.
Scaffold the client application with the new definition
Answers
B.
Scaffold API implementation application with the new definition
B.
Scaffold API implementation application with the new definition
Answers
C.
Update the REST connector from exchange in the client application
C.
Update the REST connector from exchange in the client application
Answers
D.
Update the API connector in the API implementation and publish to exchange
D.
Update the API connector in the API implementation and publish to exchange
Answers
Suggested answer: C

A company is implementing a new Mule application that supports a set of critical functions driven by a rest API enabled, claims payment rules engine hosted on oracle ERP. As designed the mule application requires many data transformation operations as it performs its batch processing logic.

The company wants to leverage and reuse as many of its existing java-based capabilities (classes, objects, data model etc.) as possible

What approach should be considered when implementing required data mappings and transformations between Mule application and Oracle ERP in the new Mule application?

A.
Create a new metadata RAML classes in Mule from the appropriate Java objects and then perform transformations via Dataweave
A.
Create a new metadata RAML classes in Mule from the appropriate Java objects and then perform transformations via Dataweave
Answers
B.
From the mule application, transform via theXSLT model
B.
From the mule application, transform via theXSLT model
Answers
C.
Transform by calling any suitable Java class from Dataweave
C.
Transform by calling any suitable Java class from Dataweave
Answers
D.
Invoke any of the appropriate Java methods directly, create metadata RAML classes and then perform required transformations via Dataweave
D.
Invoke any of the appropriate Java methods directly, create metadata RAML classes and then perform required transformations via Dataweave
Answers
Suggested answer: C

An insurance company has an existing API which is currently used by customers. API is deployed to customer hosted Mule runtime cluster. The load balancer that is used to access any APIs on the mule cluster is only configured to point to applications hosted on the server at port 443.

Mule application team of a company attempted to deploy a second API using port 443 but the application will not start and checking logs shows an error indicating the address is already in use.

Which steps must the organization take to resolve this error and allow customers to access both the API's?

A.
Change the base path of the HTTP listener configuration in the second API to a different one from the first API
A.
Change the base path of the HTTP listener configuration in the second API to a different one from the first API
Answers
B.
Set HTTP listener configuration in both API's to allow for connections from multiple ports
B.
Set HTTP listener configuration in both API's to allow for connections from multiple ports
Answers
C.
Move the HTTP listener configurations from the API's and package them in a mule domain project using port 443
C.
Move the HTTP listener configurations from the API's and package them in a mule domain project using port 443
Answers
D.
Set the HTTP listener of the second API to use different port than the one used in the first API
D.
Set the HTTP listener of the second API to use different port than the one used in the first API
Answers
Suggested answer: C

Which of the below requirements prevent the usage of Anypoint MQ in a company's network? (Choose two answers)

A.
single message payload can be up to 15 MB
A.
single message payload can be up to 15 MB
Answers
B.
payloads must be encrypted
B.
payloads must be encrypted
Answers
C.
the message broker must be hosted on premises
C.
the message broker must be hosted on premises
Answers
D.
support for point-to-point messaging
D.
support for point-to-point messaging
Answers
E.
ability for a third party outside the company's network to consume events from the queue
E.
ability for a third party outside the company's network to consume events from the queue
Answers
Suggested answer: C, D

An organization plans to migrate its deployment environment from an onpremises cluster to a Runtime Fabric (RTF) cluster. The on-premises Mule applications are currently configured with persistent object stores.

There is a requirement to enable Mule applications deployed to the RTF cluster to store and share data across application replicas and through restarts of the entire RTF cluster,

How can these reliability requirements be met?

A.
Replace persistent object stores with persistent VM queues in each Mule application deployment
A.
Replace persistent object stores with persistent VM queues in each Mule application deployment
Answers
B.
Install the Object Store pod on one of the cluster nodes
B.
Install the Object Store pod on one of the cluster nodes
Answers
C.
Configure Anypoint Object Store v2 to share data between replicas in the RTF cluster
C.
Configure Anypoint Object Store v2 to share data between replicas in the RTF cluster
Answers
D.
Configure the Persistence Gateway in the RTF installation
D.
Configure the Persistence Gateway in the RTF installation
Answers
Suggested answer: A

A payment processing company has implemented a Payment Processing API Mule application to process credit card and debit card transactions, Because the Payment Processing API handles highly sensitive information, the payment processing company requires that data must be encrypted both In-transit and at-rest.

To meet these security requirements, consumers of the Payment Processing API must create request message payloads in a JSON format specified by the API, and the message payload values must be encrypted.

How can the Payment Processing API validate requests received from API consumers?

A.
A Transport Layer Security (TLS) - Inbound policy can be applied in API Manager to decrypt the message payload and the Mule application implementation can then use the JSON Validation module to validate the JSON data
A.
A Transport Layer Security (TLS) - Inbound policy can be applied in API Manager to decrypt the message payload and the Mule application implementation can then use the JSON Validation module to validate the JSON data
Answers
B.
The Mule application implementation can use the APIkit module to decrypt and then validate the JSON data
B.
The Mule application implementation can use the APIkit module to decrypt and then validate the JSON data
Answers
C.
The Mule application implementation can use the Validation module to decrypt and then validate the JSON data
C.
The Mule application implementation can use the Validation module to decrypt and then validate the JSON data
Answers
D.
The Mule application implementation can use DataWeave to decrypt the message payload and then use the JSON Scheme Validation module to validate the JSON data
D.
The Mule application implementation can use DataWeave to decrypt the message payload and then use the JSON Scheme Validation module to validate the JSON data
Answers
Suggested answer: A

Why would an Enterprise Architect use a single enterprise-wide canonical data model (CDM) when designing an integration solution using Anypoint Platform?

A.
To reduce dependencies when integrating multiple systems that use different data formats
A.
To reduce dependencies when integrating multiple systems that use different data formats
Answers
B.
To automate Al-enabled API implementation generation based on normalized backend databases from separate vendors
B.
To automate Al-enabled API implementation generation based on normalized backend databases from separate vendors
Answers
C.
To leverage a data abstraction layer that shields existing Mule applications from nonbackward compatible changes to the model's data structure
C.
To leverage a data abstraction layer that shields existing Mule applications from nonbackward compatible changes to the model's data structure
Answers
D.
To remove the need to perform data transformation when processing message payloads in Mule applications
D.
To remove the need to perform data transformation when processing message payloads in Mule applications
Answers
Suggested answer: A

A stock trading company handles millions of trades a day and requires excellent performance and reliability within its stock trading system. The company operates a number of event-driven APIs Implemented as Mule applications that are hosted on various customer-hosted Mule clusters and needs to enable message exchanges between the APIs within their internal network using shared message queues.

What is an effective way to meet the cross-cluster messaging requirements of its event-driven APIs?

A.
Non-transactional JMS operations with a reliability pattern and manual acknowledgements
A.
Non-transactional JMS operations with a reliability pattern and manual acknowledgements
Answers
B.
Persistent VM queues with automatic acknowledgements
B.
Persistent VM queues with automatic acknowledgements
Answers
C.
JMS transactions with automatic acknowledgements
C.
JMS transactions with automatic acknowledgements
Answers
D.
extended Architecture (XA) transactions and XA connected components with manual acknowledgements
D.
extended Architecture (XA) transactions and XA connected components with manual acknowledgements
Answers
Suggested answer: A
Total 273 questions
Go to page: of 28