New Year Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

MuleSoft-Platform-Architect-I Sample Questions Answers

Questions 4

A retail company with thousands of stores has an API to receive data about purchases and insert it into a single database. Each individual store sends a batch of purchase data to the API about every 30 minutes. The API implementation uses a database bulk insert command to submit all the purchase data to a database using a custom JDBC driver provided by a data analytics solution provider. The API implementation is deployed to a single CloudHub worker. The JDBC driver processes the data into a set of several temporary disk files on the CloudHub worker, and then the data is sent to an analytics engine using a proprietary protocol. This process usually takes less than a few minutes. Sometimes a request fails. In this case, the logs show a message from the JDBC driver indicating an out-of-file-space message. When the request is resubmitted, it is successful. What is the best way to try to resolve this throughput issue?

Options:

A.

se a CloudHub autoscaling policy to add CloudHub workers

B.

Use a CloudHub autoscaling policy to increase the size of the CloudHub worker

C.

Increase the size of the CloudHub worker(s)

D.

Increase the number of CloudHub workers

Buy Now
Questions 5

An operations team is analyzing the effort needed to set up monitoring of their application network. They are looking at which API invocation metrics can be used to identify and predict trouble without having to write custom scripts or install additional analytics software or tools.

Which type of metrics can satisfy this goal of directly identifying and predicting failures?

Options:

A.

The number and types of API policy violations per day

B.

The effectiveness of the application network based on the level of reuse

C.

The number and types of past API invocations across the application network

D.

The ROI from each APT invocation

Buy Now
Questions 6

Refer to the exhibit.

What is a valid API in the sense of API-led connectivity and application networks?

A) Java RMI over TCP

B) Java RMI over TCP

C) CORBA over HOP

D) XML over UDP

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 7

Which layer in the API-led connectivity focuses on unlocking key systems, legacy systems, data sources etc and exposes the functionality?

Options:

A.

Experience Layer

B.

Process Layer

C.

System Layer

Buy Now
Questions 8

A Platinum customer uses the U.S. control plane and deploys applications to CloudHub in Singapore with a default log configuration.

The compliance officer asks where the logs and monitoring data reside?

Options:

A.

Logs are held in:Singapore and monitoring data is held in the United States

B.

Logs and monitoring data are held in the United States

C.

Logs are held in the United States and monitoring data is held in Singapore

D.

Logs and monitoring data are held in Singapore

Buy Now
Questions 9

A company is building an application network using MuleSoft's recommendations for various API layers.

What is the main (default) role of a process API in an application network?

Options:

A.

To secure and optimize the data synchronization processing of large data dumps between back-end systems

B.

To manage and process the secure direct communication between a back-end system and an end-user client of mobile device in the application network

C.

To automate parts of business processes by coordinating and orchestrating the invocation of other APIs in the application network

D.

To secure, Manage, and process communication with specific types of end-user client applications or devices in the application network

Buy Now
Questions 10

A company deployed an API to a single worker/replica in the shared cloud in the U.S. West Region.

What happens when the Availability Zone experiences an outage?

Options:

A.

CloudHub will auto-redeploy the APL in the U.S. East Region

B.

The APT will be unavailable until the availability comes back online, at which time the worker/replica will be auto-restarted

C.

CloudHub will auto-redeploy the API in another Availability Zone in the U.S. West Region

D.

The Anypoint Platform admin is alerted when the AP] is experiencing an outage and needs the trigger the CI/CD pipeline to redeploy to the US. East Region

Buy Now
Questions 11

When should idempotency be taken into account?

Options:

A.

When making requests to update currently locked entities

B.

When storing the results of s previous request for use in response to subsequent requests

C.

When sending concurrent update requests for the same entity

D.

When preventing duplicate processing from multiple sent requests

Buy Now
Questions 12

A Mule application implements an API. The Mule application has an HTTP Listener whose connector configuration sets the HTTPS protocol and hard-codes the port

value. The Mule application is deployed to an Anypoint VPC and uses the CloudHub 1.0 Shared Load Balancer (SLB) for all incoming traffic.

Which port number must be assigned to the HTTP Listener's connector configuration so that the Mule application properly receives HTTPS API invocations routed through the

SLB?

Options:

A.

8082

B.

8092

C.

80

D.

443

Buy Now
Questions 13

A company has created a successful enterprise data model (EDM). The company is committed to building an application network by adopting modern APIs as a core enabler of the company's IT operating model. At what API tiers (experience, process, system) should the company require reusing the EDM when designing modern API data models?

Options:

A.

At the experience and process tiers

B.

At the experience and system tiers

C.

At the process and system tiers

D.

At the experience, process, and system tiers

Buy Now
Questions 14

Which statement is true about Spike Control policy and Rate Limiting policy?

Options:

A.

All requests are rejected after the limit is reached in Rate Limiting policy, whereas the requests are queued in Spike Control policy after the limit is reached

B.

In a clustered environment, the Rate Limiting.and Spike Control policies are applied to each node in the cluster

C.

To protect Experience APIs by limiting resource consumption, Rate Limiting policy must be applied

D.

In order to apply Rate Limiting and Spike Control policies, a contract to bind client application and API is needed for both

Buy Now
Questions 15

An organization uses various cloud-based SaaS systems and multiple on-premises systems. The on-premises systems are an important part of the organization's application network and can only be accessed from within the organization's intranet.

What is the best way to configure and use Anypoint Platform to support integrations with both the cloud-based SaaS systems and on-premises systems?

A) Use CloudHub-deployed Mule runtimes in an Anypoint VPC managed by Anypoint Platform Private Cloud Edition control plane

B) Use CloudHub-deployed Mule runtimes in the shared worker cloud managed by the MuleSoft-hosted Anypoint Platform control plane

C) Use an on-premises installation of Mule runtimes that are completely isolated with NO external network access, managed by the Anypoint Platform Private Cloud Edition control plane

D) Use a combination of Cloud Hub-deployed and manually provisioned on-premises Mule runtimes managed by the MuleSoft-hosted Anypoint Platform control plane

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 16

Say, there is a legacy CRM system called CRM-Z which is offering below functions:

1. Customer creation

2. Amend details of an existing customer

3. Retrieve details of a customer

4. Suspend a customer

Options:

A.

Implement a system API named customerManagement which has all the functionalities wrapped in it as various operations/resources

B.

Implement different system APIs named createCustomer, amendCustomer, retrieveCustomer and suspendCustomer as they are modular and has seperation of concerns

C.

Implement different system APIs named createCustomerInCRMZ, amendCustomerInCRMZ, retrieveCustomerFromCRMZ and suspendCustomerInCRMZ as they are modular and has seperation of concerns

Buy Now
Questions 17

A customer wants to host their MuleSoft applications in CloudHub 1.0, and these applications should be available at the domain https://api.acmecorp.com.

After creating a dedicated load balancer (DLB) called acme-dib-prod, which further action must the customer take to complete the configuration?

Options:

A.

Configure the DLB with a TLS certificate for api.acmecorp.com and create an A record for api.acmecorp.com to the public IP addresses associated with their DLB

B.

Configure the DLB with a TLS certificate for api.acmecorp.com and create a CNAME record from api.acmecorp.com to acme-dib-prod.|lb.anypointdns.net

C.

Configure the DLB with a TLS certificate for acme-dib-prod.Jb.anypointdns.net and create a CNAME record from api.acmecorp:com to acme-dlb-prod.lb.anypointdns.net

D.

Configure the DLB with a TLS certificate for aplacmecorp.com and create a CNAME record from api.aomecorp.com to acme-dib-prod.ei.cloubhub.io

Buy Now
Questions 18

A client has several applications running on the Salesforce service cloud. The business requirement for integration is to get daily data changes from Account and Case

Objects. Data needs to be moved to the client's private cloud AWS DynamoDB instance as a single JSON and the business foresees only wanting five attributes from the

Account object, which has 219 attributes (some custom) and eight attributes from the Case Object.

What design should be used to support the API/ Application data model?

Options:

A.

Create separate entities for Account and Case Objects by mimicking all the attributes in SAPI, which are combined by the PAPI and filtered to provide JSON output containing 13 attributes.

B.

Request client’s AWS project team to replicate all the attributes and create Account and Case JSON table in DynamoDB. Then create separate entities for Account and Case Objects by mimicking all the attributes in SAPI to

transfer ISON data to DynamoD for respective Objects

C.

Start implementing an Enterprise Data Model by defining enterprise Account and Case Objects and implement SAPI and DynamoDB tables based on the Enterprise Data Model,

D.

Create separate entities for Account with five attributes and Case with eight attributes in SAPI, which are combined by the PAPI to provide JSON output containing 13 attributes.

Buy Now
Questions 19

4A developer for a transportation organization is implementing exactly one processing functionality in a Reservation Mule application to process and store passenger

records. This Reservation application will be deployed to multiple CloudHub workers/replicas. It is possible that several external systems could send duplicate passenger records

to the Reservation application.

An appropriate storage mechanism must be selected to help the Reservation application process each passenger record exactly once as much as possible. The selected storage

mechanism must be shared by all the CloudHub workers/replicas in order to synchronize the state information to assist attempting exactly once processing of each passenger

record by the deployed Reservation Mule application.

Which type of simple storage mechanism in Anypoint Platform allows the Reservation Mule application to update and share data between the CloudHub workers/replicas exactly

once, with minimal development effort?

Options:

A.

Persistent Object Store

B.

Runtime Fabric Object Store

C.

Non-persistent Object Store

D.

In-memory Mule Object Store

Buy Now
Questions 20

An eCommerce company is adding a new Product Details feature to their website, A customer will launch the product catalog page, a new Product Details link will

appear by product where they can click to retrieve the product detail description. Product detail data is updated with product update releases, once or twice a year, Presently

the database response time has been very slow due to high volume.

What action retrieves the product details with the lowest response time, fault tolerant, and consistent data?

Options:

A.

Select the product details from a database in a Cache scope and return them within the API response

B.

Select the product details from a database and put them in Anypoint MQ; the Anypoint MO subseriber will receive the product details and return them within the API response

C.

Use an object store to store and retrieve the product details originally read from a database and return them within the API response

D.

Select the product details from a database and return them within the API response

Buy Now
Questions 21

When must an API implementation be deployed to an Anypoint VPC?

Options:

A.

When the API Implementation must invoke publicly exposed services that are deployed outside of CloudHub in a customer- managed AWS instance

B.

When the API implementation must be accessible within a subnet of a restricted customer-hosted network that does not allow public access

C.

When the API implementation must be deployed to a production AWS VPC using the Mule Maven plugin

D.

When the API Implementation must write to a persistent Object Store

Buy Now
Questions 22

What do the API invocation metrics provided by Anypoint Platform provide?

Options:

A.

ROI metrics from APIs that can be directly shared with business users

B.

Measurements of the effectiveness of the application network based on the level of reuse

C.

Data on past API invocations to help identify anomalies and usage patterns across various APIs

D.

Proactive identification of likely future policy violations that exceed a given threat threshold

Buy Now
Questions 23

A large lending company has developed an API to unlock data from a database server and web server. The API has been deployed to Anypoint Virtual Private Cloud

(VPC) on CloudHub 1.0.

The database server and web server are in the customer's secure network and are not accessible through the public internet. The database server is in the customer's AWS

VPC, whereas the web server is in the customer's on-premises corporate data center.

How can access be enabled for the API to connect with the database server and the web server?

Options:

A.

Set up VPC peering with AWS VPC and a VPN tunnel to the customer's on-premises corporate data center

B.

Set up VPC peering with AWS VPC and the customer's on-premises corporate data center

C.

Setup a transit gateway to the customer's on-premises corporate data center through AWS VPC

D.

Set up VPC peering with the customer's on-premises corporate data center and a VPN tunnel to AWS VPC

Buy Now
Questions 24

An organization requires several APIs to be secured with OAuth 2.0, and PingFederate has been identified as the identity provider for API client authorization, The

PingFederate Client Provider is configured in access management, and the PingFederate OAuth 2.0 Token Enforcement policy is configured for the API instances required by the

organization. The API instances reside in two business groups (Group A and Group B) within the Master Organization (Master Org).

What should be done to allow API consumers to access the API instances?

Options:

A.

The API administrator should configure the correct client discovery URL in both child business groups, and the API consumer should request access to the API in Ping Identity

B.

The API administrator should grant access to the API consumers by creating contracts in the relevant API instances in API Manager

C.

The APL consumer should create a client application and request access to the APT in Anypoint Exchange, and the API administrator should approve the request

D.

The APT consumer should create a client application and request access to the API in Ping Identity, and the organization's Ping Identity workflow will grant access

Buy Now
Questions 25

What is a typical result of using a fine-grained rather than a coarse-grained API deployment model to implement a given business process?

Options:

A.

A decrease in the number of connections within the application network supporting the business process

B.

A higher number of discoverable API-related assets in the application network

C.

A better response time for the end user as a result of the APIs being smaller in scope and complexity

D.

An overall tower usage of resources because each fine-grained API consumes less resources

Buy Now
Questions 26

A company deploys Mule applications with default configurations through Runtime Manager to customer-hosted Mule runtimes. Each Mule application is an API

implementation that exposes RESTful interfaces to API clients. The Mule runtimes are managed by the MuleSoft-hosted control plane. The payload is never used by any Logger

components.

When an API client sends an HTTP request to a customer-hosted Mule application, which metadata or data (payload) is pushed to the MuleSoft-hosted control plane?

Options:

A.

Only the data

B.

No data

C.

The data and metadata

D.

Only the metadata

Buy Now
Questions 27

Version 3.0.1 of a REST API implementation represents time values in PST time using ISO 8601 hh:mm:ss format. The API implementation needs to be changed to instead represent time values in CEST time using ISO 8601 hh:mm:ss format. When following the semver.org semantic versioning specification, what version should be assigned to the updated API implementation?

Options:

A.

3.0.2

B.

4.0.0

C.

3.1.0

D.

3.0.1

Buy Now
Questions 28

Once an API Implementation is ready and the API is registered on API Manager, who should request the access to the API on Anypoint Exchange?

Options:

A.

None

B.

Both

C.

API Client

D.

API Consumer

Buy Now
Questions 29

An Anypoint Platform organization has been configured with an external identity provider (IdP) for identity management and client management. What credentials or token must be provided to Anypoint CLI to execute commands against the Anypoint Platform APIs?

Options:

A.

The credentials provided by the IdP for identity management

B.

The credentials provided by the IdP for client management

C.

An OAuth 2.0 token generated using the credentials provided by the IdP for client management

D.

An OAuth 2.0 token generated using the credentials provided by the IdP for identity management

Buy Now
Questions 30

An organization wants MuleSoft-hosted runtime plane features (such as HTTP load balancing, zero downtime, and horizontal and vertical scaling) in its Azure environment. What runtime plane minimizes the organization's effort to achieve these features?

Options:

A.

Anypoint Runtime Fabric

B.

Anypoint Platform for Pivotal Cloud Foundry

C.

CloudHub

D.

A hybrid combination of customer-hosted and MuleSoft-hosted Mule runtimes

Buy Now
Questions 31

A large company wants to implement IT infrastructure in its own data center, based on the corporate IT policy requirements that data and metadata reside locally.

Which combination of Mule control plane and Mule runtime plane(s) meets the requirements?

Options:

A.

Anypoint Platform Private Cloud Edition for the control plane and the MuleSoft-hosted runtime plane

B.

The MuleSoft-hosted control plane and Anypoint Runtime Fabric for the runtime plane

C.

The MuleSoft-hosted control plane and customer-hosted Mule runtimes for the runtime plane

D.

Anypoint Platform Private Cloud Edition for the control plane and customer-hosted Mule runtimes for the runtime plane

Buy Now
Questions 32

Refer to the exhibit. An organization is running a Mule standalone runtime and has configured Active Directory as the Anypoint Platform external Identity Provider. The organization does not have budget for other system components.

What policy should be applied to all instances of APIs in the organization to most effecuvelyKestrict access to a specific group of internal users?

Options:

A.

Apply a basic authentication - LDAP policy; the internal Active Directory will be configured as the LDAP source for authenticating users

B.

Apply a client ID enforcement policy; the specific group of users will configure their client applications to use their specific client credentials

C.

Apply an IP whitelist policy; only the specific users' workstations will be in the whitelist

D.

Apply an OAuth 2.0 access token enforcement policy; the internal Active Directory will be configured as the OAuth server

Buy Now
Questions 33

True or False. We should always make sure that the APIs being designed and developed are self-servable even if it needs more man-day effort and resources.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 34

A large organization with an experienced central IT department is getting started using MuleSoft. There is a project to connect a siloed back-end system to a new

Customer Relationship Management (CRM) system. The Center for Enablement is coaching them to use API-led connectivity.

What action would support the creation of an application network using API-led connectivity?

Options:

A.

Invite the business analyst to create a business process model to specify the canonical data model between the two systems

B.

Determine if the new CRM system supports the creation of custom: REST APIs, establishes 4 private network with CloudHub, and supports GAuth 2.0 authentication

C.

To expedite this project, central IT should extend the CRM system and back-end systems to connect to one another using built in integration interfaces

D.

Create a System API to unlock the data on the back-end system using a REST API

Buy Now
Questions 35

What is true about API implementations when dealing with legal regulations that require all data processing to be performed within a certain jurisdiction (such as in the USA or the EU)?

Options:

A.

They must avoid using the Object Store as it depends on services deployed ONLY to the US East region

B.

They must use a Jurisdiction-local external messaging system such as Active MQ rather than Anypoint MQ

C.

They must te deployed to Anypoint Platform runtime planes that are managed by Anypoint Platform control planes, with both planes in the same Jurisdiction

D.

They must ensure ALL data is encrypted both in transit and at rest

Buy Now
Questions 36

What best describes the Fully Qualified Domain Names (FQDNs), also known as DNS entries, created when a Mule application is deployed to the CloudHub Shared Worker Cloud?

Options:

A.

A fixed number of FQDNs are created, IRRESPECTIVE of the environment and VPC design

B.

The FQDNs are determined by the application name chosen, IRRESPECTIVE of the region

C.

The FQDNs are determined by the application name, but can be modified by an administrator after deployment

D.

The FQDNs are determined by both the application name and the Anypoint Platform organization

Buy Now
Questions 37

Which component monitors APIs and endpoints at scheduled intervals, receives reports about whether tests pass or fail, and displays statistics about API and endpoint

performance?

Options:

A.

API Analytics

B.

Anypoint Monitoring dashboards

C.

APT Functional Monitoring

D.

Anypoint Runtime Manager alerts

Buy Now
Questions 38

How are an API implementation, API client, and API consumer combined to invoke and process an API?

Options:

A.

The API consumer creates an API implementation, which receives API invocations from an API such that they are processed for an API client

B.

The API client creates an API consumer, which receives API invocations from an API such that they are processed for an API implementation

C.

The ApI consumer creates an API client, which sends API invocations to an API such that they are processed by an API implementation

D.

The ApI client creates an API consumer, which sends API invocations to an API such that they are processed by an API implementation

Buy Now
Questions 39

What is a best practice when building System APIs?

Options:

A.

Document the API using an easily consumable asset like a RAML definition

B.

Model all API resources and methods to closely mimic the operations of the backend system

C.

Build an Enterprise Data Model (Canonical Data Model) for each backend system and apply it to System APIs

D.

Expose to API clients all technical details of the API implementation's interaction wifch the backend system

Buy Now
Questions 40

What API policy would LEAST likely be applied to a Process API?

Options:

A.

Custom circuit breaker

B.

Client ID enforcement

C.

Rate limiting

D.

JSON threat protection

Buy Now
Questions 41

An auto manufacturer has a mature CI/CD practice and wants to automate packaging and deployment of any Mule applications to various deployment targets, including CloudHub workers/replicas, customer-hosted Mule runtimes, and Anypoint Runtime Fabric.

Which MuleSoft-provided tool or component facilitates automating the packaging and deployment of Mule applications to various deployment targets as part of the company's

CI/CD practice?

Options:

A.

Anypoint Runtime Manager

B.

Mule Maven plugin

C.

Anypoint Platform CLI

D.

Anypoint Platform REST APIs

Buy Now
Questions 42

A developer from the Central IT team has created an initial version of the RAML definition in Design Center for an OAuth 2.0-protected System API and published it

to Exchange. Another developer from LoB IT discovered the System API in Exchange and would like to leverage it in the Process API.

What is the MuleSoft-recommended approach for Process API to invoke the System API?

Options:

A.

The Process API needs to import an CAuth 2.0 module from Exchange first and update it with OAuth 2.0 credentials before the System API can be invoked

B.

The Process API uses property YAML files to store the System API URLs and uses the HTTP Request Connector to invoke the Systerm API

C.

The Process APL uses the REST Connect Connector autogenerated in Exchange for the System API

D.

The Process API manually updates the Process API POM file to include the System API as a dependency

Buy Now
Questions 43

An API with multiple API implementations (Mule applications) is deployed to both CloudHub and customer-hosted Mule runtimes. All the deployments are managed by

the MuleSoft-hosted control plane. An alert needs to be triggered whenever an API implementation stops responding to API requests, even if no API clients have called the API implementation for some time.

What is the most effective out-of-the-box solution to create these alerts to monitor the API implementations?

Options:

A.

Create monitors in Anypoint Functional Monitoring for the API implementations, where each monitor repeatedly invokes an API implementation endpoint

B.

Add code to each API client to send an Anypoint Platform REST API request to generate a custom alert in Anypoint Platform when an API invocation times out

C.

Handle API invocation exceptions within the calling API client and raise an alert from that API client when such an exception is thrown

D.

Configure one Worker Not Responding alert.in Anypoint Runtime Manager for all API implementations that will then monitor every API implementation

Buy Now
Questions 44

Which APIs can be used with DataGraph to create a unified schema?

Options:

A.

APIs 1, 3, 5

B.

APIs 2, 4 ,6

C.

APIs 1, 2, s5, 6

D.

APIs 1, 2, 3, 4

Buy Now
Questions 45

What are 4 important Platform Capabilities offered by Anypoint Platform?

Options:

A.

API Versioning, API Runtime Execution and Hosting, API Invocation, API Consumer Engagement

B.

API Design and Development, API Runtime Execution and Hosting, API Versioning, API Deprecation

C.

API Design and Development, API Runtime Execution and Hosting, API Operations and Management, API Consumer Engagement

D.

API Design and Development, API Deprecation, API Versioning, API Consumer Engagement

Buy Now
Exam Code: MuleSoft-Platform-Architect-I
Exam Name: Salesforce Certified MuleSoft Platform Architect 1 Exam (WI25)
Last Update: Jan 10, 2025
Questions: 152
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now MuleSoft-Platform-Architect-I