ExamGecko
Ask Question

Salesforce Certified MuleSoft Integration Architect I Practice Test - Questions Answers, Page 3

List of questions

Question 21

Report
Export
Collapse

Refer to the exhibit.

Salesforce Certified MuleSoft Integration Architect I image Question 21 66038 09232024002916000000

An organization uses a 2-node Mute runtime cluster to host one stateless API implementation. The API is accessed over HTTPS through a load balancer that uses round-robin for load distribution.

Two additional nodes have been added to the cluster and the load balancer has been configured to recognize the new nodes with no other change to the load balancer.

What average performance change is guaranteed to happen, assuming all cluster nodes are fully operational?

50% reduction in the response time of the API
50% reduction in the response time of the API
100% increase in the throughput of the API
100% increase in the throughput of the API
50% reduction In the JVM heap memory consumed by each node
50% reduction In the JVM heap memory consumed by each node
50% reduction In the number of requests being received by each node
50% reduction In the number of requests being received by each node
Suggested answer: D
asked 23/09/2024
Eric Swisher
38 questions

Question 22

Report
Export
Collapse

An integration Mule application is deployed to a customer-hosted multi-node Mule 4 runtime duster. The Mule application uses a Listener operation of a JMS connector to receive incoming messages from a JMS queue.

How are the messages consumed by the Mule application?

Depending on the JMS provider's configuration, either all messages are consumed by ONLY the primary cluster node or else ALL messages are consumed by ALL cluster nodes
Depending on the JMS provider's configuration, either all messages are consumed by ONLY the primary cluster node or else ALL messages are consumed by ALL cluster nodes
Regardless of the Listener operation configuration, all messages are consumed by ALL cluster nodes
Regardless of the Listener operation configuration, all messages are consumed by ALL cluster nodes
Depending on the Listener operation configuration, either all messages are consumed by ONLY the primary cluster node or else EACH message is consumed by ANY ONE cluster node
Depending on the Listener operation configuration, either all messages are consumed by ONLY the primary cluster node or else EACH message is consumed by ANY ONE cluster node
Regardless of the Listener operation configuration, all messages are consumed by ONLY the primary cluster node
Regardless of the Listener operation configuration, all messages are consumed by ONLY the primary cluster node
Suggested answer: C

Explanation:

Correct answer is Depending on the Listener operation configuration, either all messages are consumed by ONLY the primary cluster node or else EACH message is consumed by ANY ONE cluster node

For applications running in clusters, you have to keep in mind the concept of primary node and how the connector will behave. When running in a cluster, the JMS listener default behavior will be to receive messages only in the primary node, no matter what kind of destination you are consuming from. In case of consuming messages from a Queue, you'll want to change this configuration to receive messages in all the nodes of the cluster, not just the primary.

This can be done with the primaryNodeOnly parameter:

<jms:listener config-ref='config' destination='${inputQueue}' primaryNodeOnly='false'/>

asked 23/09/2024
Floran Pikaar
29 questions

Question 23

Report
Export
Collapse

An Integration Mule application is being designed to synchronize customer data between two systems. One system is an IBM Mainframe and the other system is a Salesforce Marketing Cloud (CRM) instance. Both systems have been deployed in their typical configurations, and are to be invoked using the native protocols provided by Salesforce and IBM.

What interface technologies are the most straightforward and appropriate to use in this Mute application to interact with these systems, assuming that Anypoint Connectors exist that implement these interface technologies?

IBM: DB access CRM: gRPC
IBM: DB access CRM: gRPC
IBM: REST CRM:REST
IBM: REST CRM:REST
IBM: Active MQ CRM: REST
IBM: Active MQ CRM: REST
IBM: CICS CRM: SOAP
IBM: CICS CRM: SOAP
Suggested answer: D

Explanation:

Correct answer is IBM: CICS CRM: SOAP

* Within Anypoint Exchange, MuleSoft offers the IBM CICS connector. Anypoint Connector for IBM CICS Transaction Gateway (IBM CTG Connector) provides integration with back-end CICS apps using the CICS Transaction Gateway.

* Anypoint Connector for Salesforce Marketing Cloud (Marketing Cloud Connector) enables you to connect to the Marketing Cloud API web services (now known as the Marketing Cloud API), which is also known as the Salesforce Marketing Cloud. This connector exposes convenient operations via SOAP for exploiting the capabilities of Salesforce Marketing Cloud.

asked 23/09/2024
Sneh Fields
37 questions

Question 24

Report
Export
Collapse

What is required before an API implemented using the components of Anypoint Platform can be managed and governed (by applying API policies) on Anypoint Platform?

The API must be published to Anypoint Exchange and a corresponding API instance ID must be obtained from API Manager to be used in the API implementation
The API must be published to Anypoint Exchange and a corresponding API instance ID must be obtained from API Manager to be used in the API implementation
The API implementation source code must be committed to a source control management system (such as GitHub)
The API implementation source code must be committed to a source control management system (such as GitHub)
A RAML definition of the API must be created in API designer so it can then be published to Anypoint Exchange
A RAML definition of the API must be created in API designer so it can then be published to Anypoint Exchange
The API must be shared with the potential developers through an API portal so API consumers can interact with the API
The API must be shared with the potential developers through an API portal so API consumers can interact with the API
Suggested answer: A

Explanation:

Context of the question is about managing and governing mule applications deployed on Anypoint platform.

Anypoint API Manager (API Manager) is a component of Anypoint Platform that enables you to manage, govern, and secure APIs. It leverages the runtime capabilities of API Gateway and Anypoint Service Mesh, both of which enforce policies, collect and track analytics data, manage proxies, provide encryption and authentication, and manage applications.

Mule Ref Doc :https://docs.mulesoft.com/api-manager/2.x/getting-started-proxy

asked 23/09/2024
Henry Hendricks
26 questions

Question 25

Report
Export
Collapse

Refer to the exhibit.

Salesforce Certified MuleSoft Integration Architect I image Question 25 66042 09232024002916000000

One of the backend systems invoked by an API implementation enforces rate limits on the number of requests a particular client can make. Both the backend system and the API implementation are deployed to several non-production environments in addition to production.

Rate limiting of the backend system applies to all non-production environments. The production environment, however, does NOT have any rate limiting.

What is the most effective approach to conduct performance tests of the API implementation in a staging (non-production) environment?

Create a mocking service that replicates the backend system's production performance characteristics. Then configure the API implementation to use the mocking service and conduct the performance tests
Create a mocking service that replicates the backend system's production performance characteristics. Then configure the API implementation to use the mocking service and conduct the performance tests
Use MUnit to simulate standard responses from the backend system then conduct performance tests to identify other bottlenecks in the system
Use MUnit to simulate standard responses from the backend system then conduct performance tests to identify other bottlenecks in the system
Include logic within the API implementation that bypasses invocations of the backend system in a performance test situation. Instead invoking local stubs that replicate typical backend system responses then conduct performance tests using this API Implementation
Include logic within the API implementation that bypasses invocations of the backend system in a performance test situation. Instead invoking local stubs that replicate typical backend system responses then conduct performance tests using this API Implementation
Conduct scaled-down performance tests in the staging environment against the rate limited backend system then upscale performance results to full production scale
Conduct scaled-down performance tests in the staging environment against the rate limited backend system then upscale performance results to full production scale
Suggested answer: A

Explanation:

Correct answer is Create a mocking service that replicates the backend system's production performance characteristics. Then configure the API implementation to use the mocking service and conduct the performance tests

* MUnit is for only Unit and integration testing for APIs and Mule apps. Not for performance Testing, even if it has the ability to Mock the backend.

* Bypassing the backend invocation defeats the whole purpose of performance testing. Hence it is not a valid answer.

* Scaled down performance tests cant be relied upon as performance of API's is not linear against load.

asked 23/09/2024
Luis Morales
30 questions

Question 26

Report
Export
Collapse

An API has been unit tested and is ready for integration testing. The API is governed by a Client ID Enforcement policy in all environments.

What must the testing team do before they can start integration testing the API in the Staging environment?

They must access the API portal and create an API notebook using the Client ID and Client Secret supplied by the API portal in the Staging environment
They must access the API portal and create an API notebook using the Client ID and Client Secret supplied by the API portal in the Staging environment
They must request access to the API instance in the Staging environment and obtain a Client ID and Client Secret to be used for testing the API
They must request access to the API instance in the Staging environment and obtain a Client ID and Client Secret to be used for testing the API
They must be assigned as an API version owner of the API in the Staging environment
They must be assigned as an API version owner of the API in the Staging environment
They must request access to the Staging environment and obtain the Client ID and Client Secret for that environment to be used for testing the API
They must request access to the Staging environment and obtain the Client ID and Client Secret for that environment to be used for testing the API
Suggested answer: B

Explanation:

* It's mentioned that the API is governed by a Client ID Enforcement policy in all environments.

* Client ID Enforcement policy allows only authorized applications to access the deployed API implementation.

* Each authorized application is configured with credentials: client_id and client_secret.

* At runtime, authorized applications provide the credentials with each request to the API implementation.

MuleSoft

Reference:https://docs.mulesoft.com/api-manager/2.x/policy-mule3-client-id-based-policies

asked 23/09/2024
Nuno Silva
38 questions

Question 27

Report
Export
Collapse

What requires configuration of both a key store and a trust store for an HTTP Listener?

Support for TLS mutual (two-way) authentication with HTTP clients
Support for TLS mutual (two-way) authentication with HTTP clients
Encryption of requests to both subdomains and API resource endpoints fhttPs://aDi.customer.com/ and https://customer.com/api)
Encryption of requests to both subdomains and API resource endpoints fhttPs://aDi.customer.com/ and https://customer.com/api)
Encryption of both HTTP request and HTTP response bodies for all HTTP clients
Encryption of both HTTP request and HTTP response bodies for all HTTP clients
Encryption of both HTTP request header and HTTP request body for all HTTP clients
Encryption of both HTTP request header and HTTP request body for all HTTP clients
Suggested answer: A

Explanation:

1 way SSL :The server presents its certificate to the client and the client adds it to its list of trusted certificate. And so, the client can talk to the server.

2-way SSL:The same principle but both ways. i.e. both the client and the server has to establish trust between themselves using a trusted certificate. In this way of a digital handshake, the server needs to present a certificate to authenticate itself to client and client has to present its certificate to server.

* TLS is a cryptographic protocol that provides communications security for your Mule app.

* TLS offers many different ways of exchanging keys for authentication, encrypting data, and guaranteeing message integrity Keystores and Truststores Truststore and keystore contents differ depending on whether they are used for clients or servers:

For servers:the truststore contains certificates of the trusted clients, the keystore contains the private and public key of the server.For clients:the truststore contains certificates of the trusted servers, the keystore contains the private and public key of the client.

Adding both a keystore and a truststore to the configuration implements two-way TLS authentication also known as mutual authentication.

* in this case, correct answer isSupport for TLS mutual (two-way) authentication with HTTP clients.

Salesforce Certified MuleSoft Integration Architect I image Question 27 explanation 66044 09232024002916000000

asked 23/09/2024
Victor Silveira
28 questions

Question 28

Report
Export
Collapse

A retailer is designing a data exchange interface to be used by its suppliers. The interface must support secure communication over the public internet. The interface must also work with a wide variety of programming languages and IT systems used by suppliers.

What are suitable interface technologies for this data exchange that are secure, cross-platform, and internet friendly, assuming that Anypoint Connectors exist for these interface technologies?

EDJFACT XML over SFTP JSON/REST over HTTPS
EDJFACT XML over SFTP JSON/REST over HTTPS
SOAP over HTTPS HOP over TLS gRPC over HTTPS
SOAP over HTTPS HOP over TLS gRPC over HTTPS
XML over ActiveMQ XML over SFTP XML/REST over HTTPS
XML over ActiveMQ XML over SFTP XML/REST over HTTPS
CSV over FTP YAML over TLS JSON over HTTPS
CSV over FTP YAML over TLS JSON over HTTPS
Suggested answer: C

Explanation:

*As per definition of API by Mulesoft , it is Application Programming Interface using HTTP-based protocols. Non-HTTP-based programmatic interfaces are not APIs.

*HTTP-based programmatic interfaces are APIs even if they don't use REST or JSON. Hence implementation based on Java RMI, CORBA/IIOP, raw TCP/IP interfaces are not API's as they are not using HTTP.

*One more thing to note is FTP was not built to be secure. It is generally considered to be an insecure protocol because it relies on clear-text usernames and passwords for authentication and does not use encryption.

*Data sent via FTP is vulnerable to sniffing, spoofing, and brute force attacks, among other basic attack methods.

Considering the above points only correct option is

-XML over ActiveMQ

- XML over SFTP

- XML/REST over HTTPS

asked 23/09/2024
Sérgio Filipe Soares
43 questions

Question 29

Report
Export
Collapse

An organization currently uses a multi-node Mule runtime deployment model within their datacenter, so each Mule runtime hosts several Mule applications. The organization is planning to transition to a deployment model based on Docker containers in a Kubernetes cluster. The organization has already created a standard Docker image containing a Mule runtime and all required dependencies (including a JVM), but excluding the Mule application itself.

What is an expected outcome of this transition to container-based Mule application deployments?

Required redesign of Mule applications to follow microservice architecture principles
Required redesign of Mule applications to follow microservice architecture principles
Required migration to the Docker and Kubernetes-based Anypoint Platform - Private Cloud Edition
Required migration to the Docker and Kubernetes-based Anypoint Platform - Private Cloud Edition
Required change to the URL endpoints used by clients to send requests to the Mule applications
Required change to the URL endpoints used by clients to send requests to the Mule applications
Guaranteed consistency of execution environments across all deployments of a Mule application
Guaranteed consistency of execution environments across all deployments of a Mule application
Suggested answer: A

Explanation:

* Organization can continue using existing load balancer even if backend application changes are there. So option A is ruled out.* As Mule runtime is within their datacenter, this model is RTF and not PCE. So option C is ruled out.Mule runtime deployment model within their datacenter, so each Mule runtime hosts several Mule applications -- This mean PCE or Hybird not RTF - Also mentioned in Question is that - Mule runtime is hosting several Mule Application, so that also rules out RTF and as for hosting multiple Application it will have Domain project which need redesign to make it microservice architecture---------------------------------------------------------------------------------------------------------------Answer:: Required redesign of Mule applications to follow microservice

asked 23/09/2024
Monterio Weaver
33 questions

Question 30

Report
Export
Collapse

A team would like to create a project skeleton that developers can use as a starting point when creating API Implementations with Anypoint Studio. This skeleton should help drive consistent use of best practices within the team.

What type of Anypoint Exchange artifact(s) should be added to Anypoint Exchange to publish the project skeleton?

A custom asset with the default API implementation
A custom asset with the default API implementation
A RAML archetype and reusable trait definitions to be reused across API implementations
A RAML archetype and reusable trait definitions to be reused across API implementations
An example of an API implementation following best practices
An example of an API implementation following best practices
a Mule application template with the key components and minimal integration logic
a Mule application template with the key components and minimal integration logic
Suggested answer: D

Explanation:

*Sharing Mule applications as templates is a great way to share your work with other people who are in your organization in Anypoint Platform. When they need to build a similar application they can create the mule application using the template project from Anypoint studio.

*Anypoint Templates are designed to make it easier and faster to go from a blank canvas to a production application. They're bit for bit Mule applications requiring only Anypoint Studio to build and design, and are deployable both on-premises and in the cloud.

*Anypoint Templates are based on five common data Integration patterns and can be customized and extended to fit your integration needs. So even if your use case involves different endpoints or connectors than those included in the template, they still offer a great starting point.

Some of the best practices while creating the template project:- Define the common error handler as part of template project, either using pom dependency or mule config file - Define common logger/audit framework as part of the template project - Define the env specific properties and secure properties file as per the requirement - Define global.xml for global configuration - Define the config file for connector configuration like Http,Salesforce,File,FTP etc - Create separate folders to create DWL,Properties,SSL certificates etc - Add the dependency and configure the pom.xml as per the business need - Configure the mule-artifact.json as per the business need

asked 23/09/2024
Abigail Bormann
40 questions
Total 273 questions
Go to page: of 28
Search

Related questions