ExamGecko
Home Home / Salesforce / Certified MuleSoft Integration Architect I

Salesforce Certified MuleSoft Integration Architect I Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions











Refer to the exhibit.

An organization uses a 2-node Mute runtime cluster to host one stateless API implementation. The API is accessed over HTTPS through a load balancer that uses round-robin for load distribution.

Two additional nodes have been added to the cluster and the load balancer has been configured to recognize the new nodes with no other change to the load balancer.

What average performance change is guaranteed to happen, assuming all cluster nodes are fully operational?

A.
50% reduction in the response time of the API
A.
50% reduction in the response time of the API
Answers
B.
100% increase in the throughput of the API
B.
100% increase in the throughput of the API
Answers
C.
50% reduction In the JVM heap memory consumed by each node
C.
50% reduction In the JVM heap memory consumed by each node
Answers
D.
50% reduction In the number of requests being received by each node
D.
50% reduction In the number of requests being received by each node
Answers
Suggested answer: D

An integration Mule application is deployed to a customer-hosted multi-node Mule 4 runtime duster. The Mule application uses a Listener operation of a JMS connector to receive incoming messages from a JMS queue.

How are the messages consumed by the Mule application?

A.
Depending on the JMS provider's configuration, either all messages are consumed by ONLY the primary cluster node or else ALL messages are consumed by ALL cluster nodes
A.
Depending on the JMS provider's configuration, either all messages are consumed by ONLY the primary cluster node or else ALL messages are consumed by ALL cluster nodes
Answers
B.
Regardless of the Listener operation configuration, all messages are consumed by ALL cluster nodes
B.
Regardless of the Listener operation configuration, all messages are consumed by ALL cluster nodes
Answers
C.
Depending on the Listener operation configuration, either all messages are consumed by ONLY the primary cluster node or else EACH message is consumed by ANY ONE cluster node
C.
Depending on the Listener operation configuration, either all messages are consumed by ONLY the primary cluster node or else EACH message is consumed by ANY ONE cluster node
Answers
D.
Regardless of the Listener operation configuration, all messages are consumed by ONLY the primary cluster node
D.
Regardless of the Listener operation configuration, all messages are consumed by ONLY the primary cluster node
Answers
Suggested answer: C

Explanation:

Correct answer is Depending on the Listener operation configuration, either all messages are consumed by ONLY the primary cluster node or else EACH message is consumed by ANY ONE cluster node

For applications running in clusters, you have to keep in mind the concept of primary node and how the connector will behave. When running in a cluster, the JMS listener default behavior will be to receive messages only in the primary node, no matter what kind of destination you are consuming from. In case of consuming messages from a Queue, you'll want to change this configuration to receive messages in all the nodes of the cluster, not just the primary.

This can be done with the primaryNodeOnly parameter:

<jms:listener config-ref='config' destination='${inputQueue}' primaryNodeOnly='false'/>

An Integration Mule application is being designed to synchronize customer data between two systems. One system is an IBM Mainframe and the other system is a Salesforce Marketing Cloud (CRM) instance. Both systems have been deployed in their typical configurations, and are to be invoked using the native protocols provided by Salesforce and IBM.

What interface technologies are the most straightforward and appropriate to use in this Mute application to interact with these systems, assuming that Anypoint Connectors exist that implement these interface technologies?

A.
IBM: DB access CRM: gRPC
A.
IBM: DB access CRM: gRPC
Answers
B.
IBM: REST CRM:REST
B.
IBM: REST CRM:REST
Answers
C.
IBM: Active MQ CRM: REST
C.
IBM: Active MQ CRM: REST
Answers
D.
IBM: CICS CRM: SOAP
D.
IBM: CICS CRM: SOAP
Answers
Suggested answer: D

Explanation:

Correct answer is IBM: CICS CRM: SOAP

* Within Anypoint Exchange, MuleSoft offers the IBM CICS connector. Anypoint Connector for IBM CICS Transaction Gateway (IBM CTG Connector) provides integration with back-end CICS apps using the CICS Transaction Gateway.

* Anypoint Connector for Salesforce Marketing Cloud (Marketing Cloud Connector) enables you to connect to the Marketing Cloud API web services (now known as the Marketing Cloud API), which is also known as the Salesforce Marketing Cloud. This connector exposes convenient operations via SOAP for exploiting the capabilities of Salesforce Marketing Cloud.

What is required before an API implemented using the components of Anypoint Platform can be managed and governed (by applying API policies) on Anypoint Platform?

A.
The API must be published to Anypoint Exchange and a corresponding API instance ID must be obtained from API Manager to be used in the API implementation
A.
The API must be published to Anypoint Exchange and a corresponding API instance ID must be obtained from API Manager to be used in the API implementation
Answers
B.
The API implementation source code must be committed to a source control management system (such as GitHub)
B.
The API implementation source code must be committed to a source control management system (such as GitHub)
Answers
C.
A RAML definition of the API must be created in API designer so it can then be published to Anypoint Exchange
C.
A RAML definition of the API must be created in API designer so it can then be published to Anypoint Exchange
Answers
D.
The API must be shared with the potential developers through an API portal so API consumers can interact with the API
D.
The API must be shared with the potential developers through an API portal so API consumers can interact with the API
Answers
Suggested answer: A

Explanation:

Context of the question is about managing and governing mule applications deployed on Anypoint platform.

Anypoint API Manager (API Manager) is a component of Anypoint Platform that enables you to manage, govern, and secure APIs. It leverages the runtime capabilities of API Gateway and Anypoint Service Mesh, both of which enforce policies, collect and track analytics data, manage proxies, provide encryption and authentication, and manage applications.

Mule Ref Doc :https://docs.mulesoft.com/api-manager/2.x/getting-started-proxy

Refer to the exhibit.

One of the backend systems invoked by an API implementation enforces rate limits on the number of requests a particular client can make. Both the backend system and the API implementation are deployed to several non-production environments in addition to production.

Rate limiting of the backend system applies to all non-production environments. The production environment, however, does NOT have any rate limiting.

What is the most effective approach to conduct performance tests of the API implementation in a staging (non-production) environment?

A.
Create a mocking service that replicates the backend system's production performance characteristics. Then configure the API implementation to use the mocking service and conduct the performance tests
A.
Create a mocking service that replicates the backend system's production performance characteristics. Then configure the API implementation to use the mocking service and conduct the performance tests
Answers
B.
Use MUnit to simulate standard responses from the backend system then conduct performance tests to identify other bottlenecks in the system
B.
Use MUnit to simulate standard responses from the backend system then conduct performance tests to identify other bottlenecks in the system
Answers
C.
Include logic within the API implementation that bypasses invocations of the backend system in a performance test situation. Instead invoking local stubs that replicate typical backend system responses then conduct performance tests using this API Implementation
C.
Include logic within the API implementation that bypasses invocations of the backend system in a performance test situation. Instead invoking local stubs that replicate typical backend system responses then conduct performance tests using this API Implementation
Answers
D.
Conduct scaled-down performance tests in the staging environment against the rate limited backend system then upscale performance results to full production scale
D.
Conduct scaled-down performance tests in the staging environment against the rate limited backend system then upscale performance results to full production scale
Answers
Suggested answer: A

Explanation:

Correct answer is Create a mocking service that replicates the backend system's production performance characteristics. Then configure the API implementation to use the mocking service and conduct the performance tests

* MUnit is for only Unit and integration testing for APIs and Mule apps. Not for performance Testing, even if it has the ability to Mock the backend.

* Bypassing the backend invocation defeats the whole purpose of performance testing. Hence it is not a valid answer.

* Scaled down performance tests cant be relied upon as performance of API's is not linear against load.

An API has been unit tested and is ready for integration testing. The API is governed by a Client ID Enforcement policy in all environments.

What must the testing team do before they can start integration testing the API in the Staging environment?

A.
They must access the API portal and create an API notebook using the Client ID and Client Secret supplied by the API portal in the Staging environment
A.
They must access the API portal and create an API notebook using the Client ID and Client Secret supplied by the API portal in the Staging environment
Answers
B.
They must request access to the API instance in the Staging environment and obtain a Client ID and Client Secret to be used for testing the API
B.
They must request access to the API instance in the Staging environment and obtain a Client ID and Client Secret to be used for testing the API
Answers
C.
They must be assigned as an API version owner of the API in the Staging environment
C.
They must be assigned as an API version owner of the API in the Staging environment
Answers
D.
They must request access to the Staging environment and obtain the Client ID and Client Secret for that environment to be used for testing the API
D.
They must request access to the Staging environment and obtain the Client ID and Client Secret for that environment to be used for testing the API
Answers
Suggested answer: B

Explanation:

* It's mentioned that the API is governed by a Client ID Enforcement policy in all environments.

* Client ID Enforcement policy allows only authorized applications to access the deployed API implementation.

* Each authorized application is configured with credentials: client_id and client_secret.

* At runtime, authorized applications provide the credentials with each request to the API implementation.

MuleSoft

Reference:https://docs.mulesoft.com/api-manager/2.x/policy-mule3-client-id-based-policies

What requires configuration of both a key store and a trust store for an HTTP Listener?

A.
Support for TLS mutual (two-way) authentication with HTTP clients
A.
Support for TLS mutual (two-way) authentication with HTTP clients
Answers
B.
Encryption of requests to both subdomains and API resource endpoints fhttPs://aDi.customer.com/ and https://customer.com/api)
B.
Encryption of requests to both subdomains and API resource endpoints fhttPs://aDi.customer.com/ and https://customer.com/api)
Answers
C.
Encryption of both HTTP request and HTTP response bodies for all HTTP clients
C.
Encryption of both HTTP request and HTTP response bodies for all HTTP clients
Answers
D.
Encryption of both HTTP request header and HTTP request body for all HTTP clients
D.
Encryption of both HTTP request header and HTTP request body for all HTTP clients
Answers
Suggested answer: A

Explanation:

1 way SSL :The server presents its certificate to the client and the client adds it to its list of trusted certificate. And so, the client can talk to the server.

2-way SSL:The same principle but both ways. i.e. both the client and the server has to establish trust between themselves using a trusted certificate. In this way of a digital handshake, the server needs to present a certificate to authenticate itself to client and client has to present its certificate to server.

* TLS is a cryptographic protocol that provides communications security for your Mule app.

* TLS offers many different ways of exchanging keys for authentication, encrypting data, and guaranteeing message integrity Keystores and Truststores Truststore and keystore contents differ depending on whether they are used for clients or servers:

For servers:the truststore contains certificates of the trusted clients, the keystore contains the private and public key of the server.For clients:the truststore contains certificates of the trusted servers, the keystore contains the private and public key of the client.

Adding both a keystore and a truststore to the configuration implements two-way TLS authentication also known as mutual authentication.

* in this case, correct answer isSupport for TLS mutual (two-way) authentication with HTTP clients.

A retailer is designing a data exchange interface to be used by its suppliers. The interface must support secure communication over the public internet. The interface must also work with a wide variety of programming languages and IT systems used by suppliers.

What are suitable interface technologies for this data exchange that are secure, cross-platform, and internet friendly, assuming that Anypoint Connectors exist for these interface technologies?

A.
EDJFACT XML over SFTP JSON/REST over HTTPS
A.
EDJFACT XML over SFTP JSON/REST over HTTPS
Answers
B.
SOAP over HTTPS HOP over TLS gRPC over HTTPS
B.
SOAP over HTTPS HOP over TLS gRPC over HTTPS
Answers
C.
XML over ActiveMQ XML over SFTP XML/REST over HTTPS
C.
XML over ActiveMQ XML over SFTP XML/REST over HTTPS
Answers
D.
CSV over FTP YAML over TLS JSON over HTTPS
D.
CSV over FTP YAML over TLS JSON over HTTPS
Answers
Suggested answer: C

Explanation:

*As per definition of API by Mulesoft , it is Application Programming Interface using HTTP-based protocols. Non-HTTP-based programmatic interfaces are not APIs.

*HTTP-based programmatic interfaces are APIs even if they don't use REST or JSON. Hence implementation based on Java RMI, CORBA/IIOP, raw TCP/IP interfaces are not API's as they are not using HTTP.

*One more thing to note is FTP was not built to be secure. It is generally considered to be an insecure protocol because it relies on clear-text usernames and passwords for authentication and does not use encryption.

*Data sent via FTP is vulnerable to sniffing, spoofing, and brute force attacks, among other basic attack methods.

Considering the above points only correct option is

-XML over ActiveMQ

- XML over SFTP

- XML/REST over HTTPS

An organization currently uses a multi-node Mule runtime deployment model within their datacenter, so each Mule runtime hosts several Mule applications. The organization is planning to transition to a deployment model based on Docker containers in a Kubernetes cluster. The organization has already created a standard Docker image containing a Mule runtime and all required dependencies (including a JVM), but excluding the Mule application itself.

What is an expected outcome of this transition to container-based Mule application deployments?

A.
Required redesign of Mule applications to follow microservice architecture principles
A.
Required redesign of Mule applications to follow microservice architecture principles
Answers
B.
Required migration to the Docker and Kubernetes-based Anypoint Platform - Private Cloud Edition
B.
Required migration to the Docker and Kubernetes-based Anypoint Platform - Private Cloud Edition
Answers
C.
Required change to the URL endpoints used by clients to send requests to the Mule applications
C.
Required change to the URL endpoints used by clients to send requests to the Mule applications
Answers
D.
Guaranteed consistency of execution environments across all deployments of a Mule application
D.
Guaranteed consistency of execution environments across all deployments of a Mule application
Answers
Suggested answer: A

Explanation:

* Organization can continue using existing load balancer even if backend application changes are there. So option A is ruled out.* As Mule runtime is within their datacenter, this model is RTF and not PCE. So option C is ruled out.Mule runtime deployment model within their datacenter, so each Mule runtime hosts several Mule applications -- This mean PCE or Hybird not RTF - Also mentioned in Question is that - Mule runtime is hosting several Mule Application, so that also rules out RTF and as for hosting multiple Application it will have Domain project which need redesign to make it microservice architecture---------------------------------------------------------------------------------------------------------------Answer:: Required redesign of Mule applications to follow microservice

A team would like to create a project skeleton that developers can use as a starting point when creating API Implementations with Anypoint Studio. This skeleton should help drive consistent use of best practices within the team.

What type of Anypoint Exchange artifact(s) should be added to Anypoint Exchange to publish the project skeleton?

A.
A custom asset with the default API implementation
A.
A custom asset with the default API implementation
Answers
B.
A RAML archetype and reusable trait definitions to be reused across API implementations
B.
A RAML archetype and reusable trait definitions to be reused across API implementations
Answers
C.
An example of an API implementation following best practices
C.
An example of an API implementation following best practices
Answers
D.
a Mule application template with the key components and minimal integration logic
D.
a Mule application template with the key components and minimal integration logic
Answers
Suggested answer: D

Explanation:

*Sharing Mule applications as templates is a great way to share your work with other people who are in your organization in Anypoint Platform. When they need to build a similar application they can create the mule application using the template project from Anypoint studio.

*Anypoint Templates are designed to make it easier and faster to go from a blank canvas to a production application. They're bit for bit Mule applications requiring only Anypoint Studio to build and design, and are deployable both on-premises and in the cloud.

*Anypoint Templates are based on five common data Integration patterns and can be customized and extended to fit your integration needs. So even if your use case involves different endpoints or connectors than those included in the template, they still offer a great starting point.

Some of the best practices while creating the template project:- Define the common error handler as part of template project, either using pom dependency or mule config file - Define common logger/audit framework as part of the template project - Define the env specific properties and secure properties file as per the requirement - Define global.xml for global configuration - Define the config file for connector configuration like Http,Salesforce,File,FTP etc - Create separate folders to create DWL,Properties,SSL certificates etc - Add the dependency and configure the pom.xml as per the business need - Configure the mule-artifact.json as per the business need

Total 273 questions
Go to page: of 28