ExamGecko
Home Home / Salesforce / Certified MuleSoft Integration Architect I

Salesforce Certified MuleSoft Integration Architect I Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions











A Mule application is built to support a local transaction for a series of operations on a single database. The Mule application has a Scatter-Gather that participates in the local transaction.

What is the behavior of the Scatter-Gather when running within this local transaction?

A.
Execution of each route within the Scatter-Gather occurs sequentially Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations
A.
Execution of each route within the Scatter-Gather occurs sequentially Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations
Answers
B.
Execution of all routes within the Scatter-Gather occurs in parallel Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations
B.
Execution of all routes within the Scatter-Gather occurs in parallel Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations
Answers
C.
Execution of each route within the Scatter-Gather occurs sequentially Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations
C.
Execution of each route within the Scatter-Gather occurs sequentially Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations
Answers
D.
Execution of each route within the Scatter-Gather occurs in parallel Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations
D.
Execution of each route within the Scatter-Gather occurs in parallel Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations
Answers
Suggested answer: A

An organization is creating a Mule application that will be deployed to CloudHub. The Mule application has a property named dbPassword that stores a database user's password.

The organization's security standards indicate that the dbPassword property must be hidden from every Anypoint Platform user after the value is set in the Runtime Manager Properties tab.

What configuration in the Mule application helps hide the dbPassword property value in Runtime Manager?

A.
Use secure::dbPassword as the property placeholder name and store the cleartext (unencrypted) value in a secure properties placeholder file
A.
Use secure::dbPassword as the property placeholder name and store the cleartext (unencrypted) value in a secure properties placeholder file
Answers
B.
Use secure::dbPassword as the property placeholder name and store the property encrypted value in a secure properties placeholder file
B.
Use secure::dbPassword as the property placeholder name and store the property encrypted value in a secure properties placeholder file
Answers
C.
Add the dbPassword property to the secureProperties section of the pom.xml file
C.
Add the dbPassword property to the secureProperties section of the pom.xml file
Answers
D.
Add the dbPassword property to the secureProperties section of the mule-artifact.json file
D.
Add the dbPassword property to the secureProperties section of the mule-artifact.json file
Answers
Suggested answer: B

An organization's governance process requires project teams to get formal approval from all key stakeholders for all new Integration design specifications. An integration Mule application Is being designed that interacts with various backend systems. The Mule application will be created using Anypoint Design Center or Anypoint Studio and will then be deployed to a customer-hosted runtime.

What key elements should be included in the integration design specification when requesting approval for this Mule application?

A.
SLAs and non-functional requirements to access the backend systems
A.
SLAs and non-functional requirements to access the backend systems
Answers
B.
Snapshots of the Mule application's flows, including their error handling
B.
Snapshots of the Mule application's flows, including their error handling
Answers
C.
A list of current and future consumers of the Mule application and their contact details
C.
A list of current and future consumers of the Mule application and their contact details
Answers
D.
The credentials to access the backend systems and contact details for the administrator of each system
D.
The credentials to access the backend systems and contact details for the administrator of each system
Answers
Suggested answer: A

Explanation:

SLAs and non-functional requirements to access the backend systems. Only this option actually speaks to design parameters and reqs.*Below two are technical implementations and not the part of design: - Snapshots of the Mule application's flows, including their error handling - The credentials to access the backend systems and contact details for the administrator of each system*List of consumers is not relevant to the design

A set of integration Mule applications, some of which expose APIs, are being created to enable a new business process. Various stakeholders may be impacted by this. These stakeholders are a combination of semi-technical users (who understand basic integration terminology and concepts such as JSON and XML) and technically skilled potential consumers of the Mule applications and APIs.

What Is an effective way for the project team responsible for the Mule applications and APIs being built to communicate with these stakeholders using Anypoint Platform and its supplied toolset?

A.
Use Anypoint Design Center to implement the Mule applications and APIs and give the various stakeholders access to these Design Center projects, so they can collaborate and provide feedback
A.
Use Anypoint Design Center to implement the Mule applications and APIs and give the various stakeholders access to these Design Center projects, so they can collaborate and provide feedback
Answers
B.
Create Anypoint Exchange entries with pages elaborating the integration design, including API notebooks (where applicable) to help the stakeholders understand and interact with the Mule applications and APIs at various levels of technical depth
B.
Create Anypoint Exchange entries with pages elaborating the integration design, including API notebooks (where applicable) to help the stakeholders understand and interact with the Mule applications and APIs at various levels of technical depth
Answers
C.
Use Anypoint Exchange to register the various Mule applications and APIs and share the RAML definitions with the stakeholders, so they can be discovered
C.
Use Anypoint Exchange to register the various Mule applications and APIs and share the RAML definitions with the stakeholders, so they can be discovered
Answers
D.
Capture documentation about the Mule applications and APIs inline within the Mule integration flows and use Anypoint Studio's Export Documentation feature to provide an HTML version of this documentation to the stakeholders
D.
Capture documentation about the Mule applications and APIs inline within the Mule integration flows and use Anypoint Studio's Export Documentation feature to provide an HTML version of this documentation to the stakeholders
Answers
Suggested answer: B

Explanation:

As the stakeholders are semitechnical users , preferred option is Create Anypoint Exchange entries with pages elaborating the integration design, including API notebooks (where applicable) to help the stakeholders understand and interact with the Mule applications and APIs at various levels of technical depth

An integration Mute application consumes and processes a list of rows from a CSV file. Each row must be read from the CSV file, validated, and the row data sent to a JMS queue, in the exact order as in the CSV file.

If any processing step for a row falls, then a log entry must be written for that row, but processing of other rows must not be affected.

What combination of Mute components is most idiomatic (used according to their intended purpose) when Implementing the above requirements?

A.
Scatter-Gather component On Error Continue scope
A.
Scatter-Gather component On Error Continue scope
Answers
B.
VM connector first Successful scope On Error Propagate scope
B.
VM connector first Successful scope On Error Propagate scope
Answers
C.
For Each scope On Error Continue scope
C.
For Each scope On Error Continue scope
Answers
D.
Async scope On Error Propagate scope
D.
Async scope On Error Propagate scope
Answers
Suggested answer: C

Explanation:

* On Error Propagate halts execution and sends error to the client. In this scenario it's mentioned that 'processing of other rows must not be affected' so Option B and C are ruled out.

* Scatter gather is used to club multiple responses together before processing. In this scenario, we need sequential processing. So option A is out of choice.

* Correct answer is For Each scope & On Error Continue scope Below requirement can be fulfilled in the below way

1) Using For Each scope , which will send each row from csv file sequentially. each row needs to be sent sequentially as requirement is to send the message in exactly the same way as it is mentioned in the csv file

2) Also other part of requirement is if any processing step for a row fails then it should log an error but should not affect other record processing . This can be achieved using On error Continue scope on these set of activities. so that error will not halt the processing. Also logger needs to be added in error handling section so that it can be logged.

* Attaching diagram for reference. Here it's try scope, but similar would be the case with For Each loop.

An organization's security policies mandate complete control of the login credentials used to log in to Anypoint Platform. What feature of Anypoint Platform should be used to meet this requirement?

A.
Enterprise Security Module
A.
Enterprise Security Module
Answers
B.
Client ID Secret
B.
Client ID Secret
Answers
C.
Federated Identity Management
C.
Federated Identity Management
Answers
D.
Federated Client Management
D.
Federated Client Management
Answers
Suggested answer: C

Explanation:

Correct answer is Federated Identity Management As the Anypoint Platform organization administrator, you can configure identity management in Anypoint Platform to set up users for single sign-on (SSO). Configure identity management using one of the following single sign-on standards: OpenID Connect: End user identity verification by an authorization server including SSO SAML 2.0: Web-based authorization including cross-domain SSO Where as Client Management is where Anypoint Platform acts as a client provider by default, but you can also configure external client providers to authorize client applications. As an API owner, you can apply an OAuth 2.0 policy to authorize client applications that try to access your API. You need an OAuth 2.0 provider to use an OAuth 2.0 policy

https://docs.mulesoft.com/access-management/external-identity

Refer to the exhibit.

An organization is sizing an Anypoint VPC for the non-production deployments of those Mule applications that connect to the organization's on-premises systems. This applies to approx. 60 Mule applications. Each application is deployed to two CloudHub i workers. The organization currently has three non-production environments (DEV, SIT and UAT) that share this VPC. The AWS region of the VPC has two AZs.

The organization has a very mature DevOps approach which automatically progresses each application through all non-production environments before automatically deploying to production. This process results in several Mule application deployments per hour, using CloudHub's normal zero-downtime deployment feature.

What is a CIDR block for this VPC that results in the smallest usable private IP address range?

A.
10.0.0.0/26 (64 IPS)
A.
10.0.0.0/26 (64 IPS)
Answers
B.
10.0.0.0/25 (128 IPs)
B.
10.0.0.0/25 (128 IPs)
Answers
C.
10.0.0.0/24 (256 IPs)
C.
10.0.0.0/24 (256 IPs)
Answers
D.
10.0.0.0/22 (1024 IPs)
D.
10.0.0.0/22 (1024 IPs)
Answers
Suggested answer: D

Explanation:

Mule applications are deployed in CloudHub workers and each worker is assigned with a dedicated IP * For zero downtime deployment, each worker in CloudHub needs additional IP addresses * A few IPs in a VPC are reserved for infrastructure (generally 2 IPs) * The IP addresses are usually in a private range with a subnet block specifier, such as 10.0.0.1/24 * The smallest CIDR network subnet block you can assign for your VPC is /24 (256 IP addresses) (60*3 env * 2 worker per application ) + 50% of (total) for zero downtime = 540 In this case correct answer is 10.0.0.0/22 as this provided 1024 IP's .

Other IP's are insufficient.

What Is a recommended practice when designing an integration Mule 4 application that reads a large XML payload as a stream?

A.
The payload should be dealt with as a repeatable XML stream, which must only be traversed (iterated-over) once and CANNOT be accessed randomly from DataWeave expressions and scripts
A.
The payload should be dealt with as a repeatable XML stream, which must only be traversed (iterated-over) once and CANNOT be accessed randomly from DataWeave expressions and scripts
Answers
B.
The payload should be dealt with as an XML stream, without converting it to a single Java object (POJO)
B.
The payload should be dealt with as an XML stream, without converting it to a single Java object (POJO)
Answers
C.
The payload size should NOT exceed the maximum available heap memory of the Mute runtime on which the Mule application executes
C.
The payload size should NOT exceed the maximum available heap memory of the Mute runtime on which the Mule application executes
Answers
D.
The payload must be cached using a Cache scope If It Is to be sent to multiple backend systems
D.
The payload must be cached using a Cache scope If It Is to be sent to multiple backend systems
Answers
Suggested answer: C

Explanation:

If the size of the stream exceeds the maximum, a STREAM_MAXIMUM_SIZE_EXCEEDED error is raised.

Anypoint Exchange is required to maintain the source code of some of the assets committed to it, such as Connectors, Templates, and API specifications.

What is the best way to use an organization's source-code management (SCM) system in this context?

A.
Organizations should continue to use an SCM system of their choice, in addition to keeping source code for these asset types in Anypoint Exchange, thereby enabling parallel development, branching, and merging
A.
Organizations should continue to use an SCM system of their choice, in addition to keeping source code for these asset types in Anypoint Exchange, thereby enabling parallel development, branching, and merging
Answers
B.
Organizations need to use Anypoint Exchange as the main SCM system to centralize versioning and avoid code duplication
B.
Organizations need to use Anypoint Exchange as the main SCM system to centralize versioning and avoid code duplication
Answers
C.
Organizations can continue to use an SCM system of their choice for branching and merging, as long as they follow the branching and merging strategy enforced by Anypoint Exchange
C.
Organizations can continue to use an SCM system of their choice for branching and merging, as long as they follow the branching and merging strategy enforced by Anypoint Exchange
Answers
D.
Organizations need to point Anypoint Exchange to their SCM system so Anypoint Exchange can pull source code when requested by developers and provide it to Anypoint Studio
D.
Organizations need to point Anypoint Exchange to their SCM system so Anypoint Exchange can pull source code when requested by developers and provide it to Anypoint Studio
Answers
Suggested answer: B

Explanation:

* Organization should continue to use SCM system of their choice, in addition to keeping source code for these asset types in Anypoint Exchange, thereby enabling parallel development, branching.

* Reason is that Anypoint exchange is not full fledged version repositories like GitHub.

* But at same time it is tightly coupled with Mule assets

What Anypoint Connectors support transactions?

A.
Database, JMS, VM
A.
Database, JMS, VM
Answers
B.
Database, 3MS, HTTP
B.
Database, 3MS, HTTP
Answers
C.
Database, JMS, VM, SFTP
C.
Database, JMS, VM, SFTP
Answers
D.
Database, VM, File
D.
Database, VM, File
Answers
Suggested answer: A

Explanation:

Below Anypoint Connectors support transactions JMS -- Publish -- Consume VM -- Publish -- Consume Database -- All operations

Total 273 questions
Go to page: of 28