Big Cyber Monday Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

MuleSoft-Integration-Architect-I Salesforce Certified MuleSoft Platform Integration Architect (Mule-Arch-202) Questions and Answers

Questions 4

An organization is not meeting its growth and innovation objectives because IT cannot deliver projects last enough to keep up with the pace of change required by the business.

According to MuleSoft’s IT delivery and operating model, which step should the organization lake to solve this problem?

Options:

A.

Modify IT governance and security controls so that line of business developers can have direct access to the organization's systems of record

B.

Switch from a design-first to a code-first approach for IT development

C.

Adopt a new approach that decouples core IT projects from the innovation that happens within each line of business

D.

Hire more |T developers, architects, and project managers to increase IT delivery

Buy Now
Questions 5

An automation engineer needs to write scripts to automate the steps of the API lifecycle, including steps to create, publish, deploy and manage APIs and their implementations in Anypoint Platform.

What Anypoint Platform feature can be used to automate the execution of all these actions in scripts in the easiest way without needing to directly invoke the Anypoint Platform REST APIs?

Options:

A.

Automated Policies in API Manager

B.

Runtime Manager agent

C.

The Mule Maven Plugin

D.

Anypoint CLI

Buy Now
Questions 6

A stock trading company handles millions of trades a day and requires excellent performance and reliability within its stock trading system. The company operates a number of event-driven APIs Implemented as Mule applications that are hosted on various customer-hosted Mule clusters and needs to enable message exchanges between the APIs within their internal network using shared message queues.

What is an effective way to meet the cross-cluster messaging requirements of its event-driven APIs?

Options:

A.

Non-transactional JMS operations with a reliability pattern and manual acknowledgements

B.

Persistent VM queues with automatic acknowledgements

C.

JMS transactions with automatic acknowledgements

D.

extended Architecture (XA) transactions and XA connected components with manual acknowledgements

Buy Now
Questions 7

An Integration Mule application is being designed to synchronize customer data between two systems. One system is an IBM Mainframe and the other system is a Salesforce Marketing Cloud (CRM) instance. Both systems have been deployed in their typical configurations, and are to be invoked using the native protocols provided by Salesforce and IBM.

What interface technologies are the most straightforward and appropriate to use in this Mute application to interact with these systems, assuming that Anypoint Connectors exist that implement these interface technologies?

Options:

A.

IBM: DB access CRM: gRPC

B.

IBM: REST CRM:REST

C.

IBM: Active MQ CRM: REST

D.

IBM: CICS CRM: SOAP

Buy Now
Questions 8

An insurance company is using a CIoudHub runtime plane. As a part of requirement, email alert should

be sent to internal operations team every time of policy applied to an API instance is deleted As an integration architect suggest on how this requirement be met?

Options:

A.

Use audit logs in Anypoint platform to detect a policy deletion and configure the Audit logs alert feature to send an email to the operations team

B.

Use Anypoint monitoring to configure an alert that sends an email to the operations team every time a policy is deleted in API manager

C.

Create a custom connector to be triggered every time of policy is deleted in API manager

D.

Implement a new application that uses the Audit log REST API todetect the policy deletion and send an email to operations team the SMTP connector

Buy Now
Questions 9

An organization has deployed both Mule and non-Mule API implementations to integrate its customer and order management systems. All the APIs are available to REST clients on the public internet.

The organization wants to monitor these APIs by running health checks: for example, to determine if an API can properly accept and process requests. The organization does not have subscriptions to any external monitoring tools and also does not want to extend its IT footprint.

What Anypoint Platform feature provides the most idiomatic (used for its intended purpose) way to monitor the availability of both the Mule and the non-Mule API implementations?

Options:

A.

API Functional Monitoring

B.

Runtime Manager

C.

API Manager

D.

Anypoint Visualizer

Buy Now
Questions 10

As part of a growth strategy, a supplier signs a trading agreement with a large customer. The customer sends purchase orders to the supplier according to the ANSI X12 EDI standard, and the supplier creates the orders in its ERP system using the information in the EDI document.

The agreement also requires that the supplier provide a new RESTful API to process request from the customer for current product inventory level from the supplier’ s ERP system.

Which two fundamental integration use cases does the supplier need to deliver to provide an end-to-end solution for this business scenario? (Choose two.)

Options:

A.

Synchronized data transfer

B.

Sharing data with external partners

C.

User interface integration

D.

Streaming data ingestion

E.

Data mashups

Buy Now
Questions 11

An integration team uses Anypoint Platform and follows MuleSoft's recommended approach to full lifecycle API development.

Which step should the team's API designer take before the API developers implement the AP! Specification?

Options:

A.

Generate test cases using MUnit so the API developers can observe the results of running the API

B.

Use the scaffolding capability of Anypoint Studio to create an API portal based on the API specification

C.

Publish the API specification to Exchange and solicit feedback from the API's consumers

D.

Use API Manager to version the API specification

Buy Now
Questions 12

A leading eCommerce giant will use MuleSoft APIs on Runtime Fabric (RTF) to process customer orders. Some customer-sensitive information, such as credit card information, is required in request payloads or is included in response payloads in some of the APIs. Other API requests and responses are not authorized to access some of this customer-sensitive information but have been implemented to validate and transform based on the structure and format of this customer-sensitive information (such as account IDs, phone numbers, and postal codes).

What approach configures an API gateway to hide sensitive data exchanged between API consumers and API implementations, but can convert tokenized fields back to their original value for other API requests or responses, without having to recode the API implementations?

Later, the project team requires all API specifications to be augmented with an additional non-functional requirement (NFR) to protect the backend services from a high rate of requests, according to defined service-level

agreements (SLAs). The NFR's SLAs are based on a new tiered subscription level "Gold", "Silver", or "Platinum" that must be tied to a new parameter that is being added to the Accounts object in their enterprise data model.

Following MuleSoft's recommended best practices, how should the project team now convey the necessary non-functional requirement to stakeholders?

Options:

A.

Create and deploy API proxies in API Manager for the NFR, change the baseurl in eachAPI specification to the corresponding API proxy implementation endpoint, and publish each modified API specification to Exchange

B.

Update each API specification with comments about the NFR's SLAs and publish each modified API specification to Exchange

C.

Update each API specification with a shared RAML fragment required to implement the NFR and publish the RAML fragment and each modified API specification to Exchange

D.

Create a shared RAML fragment required to implement the NFR, list each API implementation endpoint in the RAML fragment, and publish the RAML fragment to Exchange

Buy Now
Questions 13

A customer wants to use the mapped diagnostic context (MDC) and logging variables to enrich its logging and improve tracking by providing more context in the logs.

The customer also wants to improve the throughput and lower the latency of message processing.

As an Mulesoft integration architect can you advise, what should the customer implement to meet these requirements?

Options:

A.

Use synchronous logging and use pattern layout with [%MDC] in the log4j2.xml configuration file and then configure the logging variables

B.

Useasync logger at the level greater than INFO and use pattern layout with [%MDC] in the log4j2,xml configuration file and then configure the logging variables

C.

Useasync logger at the level equal to DEBUG orTRACEand use patternlayout with [%MDC] in the log4j2.xml configuration file and then configure the logging variables

D.

Use synchronous logging at the INFO DEBUG or Trace level and use pattern layout with [%MDC] in the log4j2.xml configuration file and then configure the logging variables

Buy Now
Questions 14

How are the API implementation , API client, and API consumer combined to invoke and process an API ?

Options:

A.

The API consumer creates an API implementation , which receives API invocations from an API such that they are processed for an API client

B.

The API consumer creates an API client which sends API invocations to an API such that they are processed by an API implementation

C.

An API client creates an API consumer, which receives API invocation from an API such that they are processed for an API implementation

D.

The API client creates an API consumer which sends API invocations to an API such that they are processed by API implementation

Buy Now
Questions 15

Mule applications need to be deployed to CloudHub so they can access on-premises database systems. These systems store sensitive and hence tightly protected data, so are not accessible over the internet.

What network architecture supports this requirement?

Options:

A.

An Anypoint VPC connected to the on-premises network using an IPsec tunnel or AWS DirectConnect, plus matching firewall rules in the VPC and on-premises network

B.

Static IP addresses for the Mule applications deployed to the CloudHub Shared Worker Cloud, plus matching firewall rules and IPwhitelisting in the on-premises network

C.

An Anypoint VPC with one Dedicated Load Balancer fronting each on-premises database system, plus matching IP whitelisting in the load balancer and firewall rules in the VPC and on-premises network

D.

Relocation of the database systems to a DMZ in the on-premises network, with Mule applications deployed to the CloudHub Shared Worker Cloud connecting only to the DMZ

Buy Now
Questions 16

What are two reasons why a typical MuleSoft customer favors a MuleSoft-hosted Anypoint Platform runtime plane over a customer-hosted runtime for its Mule application deployments? (Choose two.)

Options:

A.

Reduced application latency

B.

Increased application isolation

C.

Reduced time-to-market for the first application

D.

Increased application throughput

E.

Reduced IT operations effort

Buy Now
Questions 17

A rale limiting policy has been applied to a soap VI.2 API published in Clondhub. The API implementation catches errors in a global error handler on error propagate in the main flow for HTTP: RETRY_EXHAUSTED with HTTP status set to 429 and any with the HTTP status set to 500.

What is the expected H1TP status when the client exceeds the quota of the API calls?

Options:

A.

HTTP status 429 as defined in the HTTP:RETRY EXHAUSTED error handler in the API B. HTTP status 500 as defined in the ANY error handler in the API since an API:RETRY_EXHAUSTED will be generated

B.

HTTP status 401 unauthorized for policy violation

C.

HTTP status 400 from the rate-limiting policy violation since the call does not reach the back-end

Buy Now
Questions 18

An IT integration tram followed an API-led connectivity approach to implement an order-fulfillment business process. It created an order processing AP that coordinates stateful interactions with a variety of microservices that validate, create, and fulfill new product orders

Which interaction composition pattern did the integration architect who designed this order processing AP| use?

Options:

A.

Orchestration

B.

Streaming

C.

Aggregation

D.

Multicasting

Buy Now
Questions 19

An organization uses Mule runtimes which are managed by Anypoint Platform - Private Cloud Edition. What MuleSoft component is responsible for feeding analytics data to non-MuleSoft analytics platforms?

Options:

A.

Anypoint Exchange

B.

The Mule runtimes

C.

Anypoint API Manager

D.

Anypoint Runtime Manager

Buy Now
Questions 20

Refer to the exhibit.

The HTTP Listener and the Logger are being handled from which thread pools respectively?

Options:

A.

CPU_INTENSIVE and Dedicated Selector pool

B.

UBER and NONBLOCKING

C.

Shared Selector Pool and CPU LITE

D.

BLOCKING _IO and UBER

Buy Now
Questions 21

A payment processing company has implemented a Payment Processing API Mule application to process credit card and debit card transactions, Because the Payment Processing API handles highly sensitive information, the payment processing company requires that data must be encrypted both In-transit and at-rest.

To meet these security requirements, consumers of the Payment Processing API must create request message payloads in a JSON format specified by the API, and the message payload values must be encrypted.

How can the Payment Processing API validate requests received from API consumers?

Options:

A.

A Transport Layer Security (TLS) - Inbound policy can be applied in API Manager to decrypt the message payload and the Mule application implementation can then usethe JSON Validation module to validate the JSON data

B.

The Mule application implementation can use the APIkit module to decrypt and then validate the JSON data

C.

The Mule application implementation can use the Validation module to decrypt and then validate the JSON data

D.

The Mule application implementation can use DataWeave to decrypt the message payload and then use the JSON Scheme Validation module to validate the JSON data

Buy Now
Questions 22

A banking company is developing a new set of APIs for its online business. One of the critical API's is a master lookup API which is a system API. This master lookup API uses persistent object store. This API will be used by all other APIs to provide master lookup data.

MuleSoft-Integration-Architect-I Question 22

Master lookup API is deployed on two cloudhub workers of 0.1 vCore each because there is a lot of master data to be cached. Master lookup data is stored as a key value pair. The cache gets refreshed if they key is not found in the cache.

Doing performance testing it was observed that the Master lookup API has a higher response time due to database queries execution to fetch the master lookup data.

Due to this performance issue, go-live of the online business is on hold which could cause potential financial loss to Bank.

As an integration architect, which of the below option you would suggest to resolve performance issue?

Options:

A.

Implement HTTP caching policy for all GET endpoints for the master lookup API and implement locking to synchronize access to object store

B.

Upgrade vCore size from 0.1 vCore to 0,2 vCore

C.

Implement HTTP caching policy for all GET endpoints for master lookup API

D.

Add an additional Cloudhub worker to provide additional capacity

Buy Now
Questions 23

What condition requires using a CloudHub Dedicated Load Balancer?

Options:

A.

When cross-region load balancing is required between separate deployments of the same Mule application

B.

When custom DNS names are required for API implementations deployed to customer-hosted Mule runtimes

C.

When API invocations across multiple CloudHub workers must be load balanced

D.

When server-side load-balanced TLS mutual authentication is required between API implementations and API clients

Buy Now
Questions 24

An organization designing a hybrid, load balanced, single cluster production environment. Due to performance service level agreement goals, it is looking into running the Mule applications in an active-active multi node cluster configuration.

What should be considered when running its Mule applications in this type of environment?

Options:

A.

All event sources, regardless of time , can be configured as the target source by the primary node in the cluster

B.

An external load balancer is required to distribute incoming requests throughout the cluster nodes

C.

A Mule application deployed to multiple nodes runs in an isolation from the other nodes in the cluster

D.

Although the cluster environment is fully installed configured and running, it will not process any requests until an outage condition is detected by the primary node in the cluster.

Buy Now
Questions 25

An organization's IT team follows an API-led connectivity approach and must use Anypoint Platform to implement a System AP\ that securely accesses customer data. The organization uses Salesforce as the system of record for all customer data, and its most important objective is to reduce the overall development time to release the System API.

The team's integration architect has identified four different approaches to access the customer data from within the implementation of the System API by using different Anypoint Connectors that all meet the technical requirements of the project.

Options:

A.

Use the Anypoint Connector for Database to connect to a MySQL database to access a copy of the customer data

B.

Use the Anypoint Connector for HTTP to connect to the Salesforce APIs to directly access the customer data

C.

Use the Anypoint Connector for Salesforce to connect to the Salesforce APIs to directly access the customer data

D.

Use the Anypoint Connector tor FTP to download a file containing a recent near-real time extract of the customer data

Buy Now
Questions 26

An organization is using Mulesoft cloudhub and develops API's in the latest version. As a part of requirements for one of the API's, third party API needs to be called. The security team has made it clear that calling any external API needs to have include listing

As an integration architect please suggest the best way to accomplish the design plan to support these requirements?

Options:

A.

Implement includelist IP on the cloudhub VPC firewall to allow the traffic

B.

Implement the validation of includelisted IP operation

C.

Implement the Any point filter processor to implement the include list IP

D.

Implement a proxy for the third party API and enforce the IPinclude list policy and call this proxy from the flow of the API

Buy Now
Questions 27

An organization is in the process of building automated deployments using a CI/CD process. As a part of automated deployments, it wants to apply policies to API Instances.

What tool can the organization use to promote and deploy API Manager policies?

Options:

A.

Anypoint CLI

B.

MUnit Maven plugin

C.

Mule Maven plugin

D.

Runtime Manager agent

Buy Now
Questions 28

An organization is designing the following two Mule applications that must share data via a common persistent object store instance:

- Mule application P will be deployed within their on-premises datacenter.

- Mule application C will run on CloudHub in an Anypoint VPC.

The object store implementation used by CloudHub is the Anypoint Object Store v2 (OSv2).

what type of object store(s) should be used, and what design gives both Mule applications access to the same object store instance?

Options:

A.

Application P uses the Object Store connector to access a persistent object store Application C accesses this persistent object store via the Object Store REST API through an IPsec tunnel

B.

Application C and P both use the Object Store connector to access the Anypoint Object Store v2

C.

Application C uses the Object Store connector to access a persistent object Application P accesses the persistent object store via the Object Store REST API

D.

Application C and P both use the Object Store connector to access a persistent object store

Buy Now
Questions 29

A gaming company has implemented an API as a Mule application and deployed the API implementation to a CloudHub 2.0 private space. The API implementation must connect to a mainframe application running in the customer’s on-premises corporate data center and also to a Kafka cluster running in an Amazon AWS VPC.

What is the most efficient way to enable the API to securely connect from its private space to the mainframe application and Kafka cluster?

Options:

A.

In Runtime Manager, set up VPC peering between the CloudHub 2.0 private network and the on-premises data center.In the AWS account, set up VPC peering between the AWS VPC and the CloudHub 2.0 private network. B)In the AWS account, attach the CloudHub 2.0 private space to an AWS transit gateway that routes from the CloudHub 2.0 private space to the on-premises data center. InRuntime Manager, configure an Anypoint VPN to route from the CloudH

B.

Option A

C.

Option B

D.

Option C

E.

Option D

Buy Now
Questions 30

What is an example of data confidentiality?

Options:

A.

Signing a file digitally and sending it using a file transfer mechanism

B.

Encrypting a file containing personally identifiable information (PV)

C.

Providing a server's private key to a client for secure decryption of data during a two-way SSL handshake

D.

De-masking a person's Social Security number while inserting it into a database

Buy Now
Questions 31

A company is building an application network and has deployed four Mule APIs: one experience API, one process API, and two system APIs. The logs from all the APIs are aggregated in an external log aggregation tool. The company wants to trace messages that are exchanged between multiple API implementations. What is the most idiomatic (based on its intended use) identifier that should be used to implement Mule event tracing across the multiple API implementations?

Options:

A.

Mule event ID

B.

Mule correlation ID

C.

Client's IP address

D.

DataWeave UUID

Buy Now
Questions 32

What operation can be performed through a JMX agent enabled in a Mule application?

Options:

A.

View object store entries

B.

Replay an unsuccessful message

C.

Set a particular tog4J2 log level to TRACE

D.

Deploy a Mule application

Buy Now
Questions 33

A leading bank implementing new mule API.

The purpose of API to fetch the customer account balances from the backend application and display them on the online platform the online banking platform. The online banking platform will send an array of accounts to Mule API get the account balances.

As a part of the processing the Mule API needs to insert the data into the database for auditing purposes and this process should not have any performance related implications on the account balance retrieval flow

How should this requirement be implemented to achieve better throughput?

Options:

A.

Implement the Async scope fetch the data from the backend application and to insert records in the Audit database

B.

Implement a for each scope to fetch the data from the back-end application and to insert records into the Audit database

C.

Implement a try-catch scope to fetch the data from the back-end application and use the Async scope to insert records into the Audit database

D.

Implement parallel for each scope to fetch the data from the backend application and use Async scope to insert the records into the Audit database

Buy Now
Questions 34

An external REST client periodically sends an array of records in a single POST request to a Mule application API endpoint.

The Mule application must validate each record of the request against a JSON schema before sending it to a downstream system in the same order that it was received in the array

Record processing will take place inside a router or scope that calls a child flow. The child flow has its own error handling defined. Any validation or communication failures should not prevent further processing of the remaining records.

To best address these requirements what is the most idiomatic(used for it intended purpose) router or scope to used in the parent flow, and what type of error handler should be used in the child flow?

Options:

A.

First Successful router in the parent flowOn Error Continue error handler in the child flow

B.

For Each scope in the parent flowOn Error Continue error handler in the child flow

C.

Parallel For Each scope in the parent flowOn Error Propagate error handler in the child flow

D.

Until Successful router in the parent flowOn Error Propagate error handler in the child flow

Buy Now
Questions 35

An integration Mute application consumes and processes a list of rows from a CSV file. Each row must be read from the CSV file, validated, and the row data sent to a JMS queue, in the exact order as in the CSV file.

If any processing step for a row falls, then a log entry must be written for that row, but processing of other rows must not be affected.

What combination of Mute components is most idiomatic (used according to their intended purpose) when Implementing the above requirements?

Options:

A.

Scatter-Gather component On Error Continue scope

B.

VM connector first Successful scope On Error Propagate scope

C.

For Each scope On Error Continue scope

D.

Async scope On Error Propagate scope

Buy Now
Questions 36

The company's FTPS server login username and password

Options:

A.

TLS context trust store containing a public certificate for the company. The company's PGP public key that was used to sign the files

B.

The partner's PGP public key used by the company to login to the FTPS server. A TLS context key store containing the private key for the companyThe partner's PGP private key that was used to sign the files

C.

The company's FTPS server login username and password. A TLS context trust store containing a public certificate for ftps.partner.comThe partner's PGP public key that was used to sign the files

D.

The partner's PGP public key used by the company to login to the FTPS server. A TLS context key store containing the private key for ftps.partner.comThe company's PGP private key that was used to sign the files

Buy Now
Questions 37

An organization is choosing between API-led connectivity and other integration approaches.

According to MuleSoft, which business benefits is associated with an API-led connectivity approach using Anypoint Platform?

Options:

A.

improved security through adoption of monolithic architectures

B.

Increased developer productivity through sell-service of API assets

C.

Greater project predictability through tight coupling of systems

D.

Higher outcome repeatability through centralized development

Buy Now
Questions 38

As an enterprise architect, what are the two reasons for which you would use a canonical data model in the new integration project using Mulesoft Anypoint platform ( choose two answers )

Options:

A.

To have consistent data structure aligned in processes

B.

To isolate areas within a bounded context

C.

To incorporate industry standard data formats

D.

There are multiple canonical definitions of each data type

E.

Because the model isolates the back and systems and support mule applications from change

Buy Now
Questions 39

A manufacturing company plans to deploy Mule applications to its own

Azure Kubernetes service infrastructure.The organization wants to make

the Mule applications more available and robust by deploying each Mule

application to an isolated Mule runtime in a Docker container while

managing all the Mule applications from the MuleSoft-hosted control plane.

What choice of runtime plane meets these organizational requirements?

Options:

A.

CloudHub 2.0

B.

Customer-hosted self-provisioned runtime plane

C.

Anypoint Service Mesh

D.

Anypoint Runtime Fabric

Buy Now
Questions 40

A Mule application is running on a customer-hosted Mule runtime in an organization's network. The Mule application acts as a producer of asynchronous Mule events. Each Mule event must be broadcast to all interested external consumers outside the Mule application. The Mule events should be published in a way that is guaranteed in normal situations and also minimizes duplicate delivery in less frequent failure scenarios.

The organizational firewall is configured to only allow outbound traffic on ports 80 and 443. Some external event consumers are within the organizational network, while others are located outside the firewall.

What Anypoint Platform service is most idiomatic (used for its intended purpose) for publishing these Mule events to all external consumers while addressing the desired reliability goals?

Options:

A.

CloudHub VM queues

B.

Anypoint MQ

C.

Anypoint Exchange

D.

CloudHub Shared Load Balancer

Buy Now
Questions 41

An ABC Farms project team is planning to build a new API that is required to work with data from different domains across the organization.

The organization has a policy that all project teams should leverage existing investments by reusing existing APIs and related resources and documentation that other project teams have already developed and deployed.

To support reuse, where on Anypoint Platform should the project team go to discover and read existing APIs, discover related resources and documentation, and interact with mocked versions of those APIs?

Options:

A.

Design Center

B.

API Manager

C.

Runtime Manager

D.

Anypoint Exchange

Buy Now
Questions 42

A company wants its users to log in to Anypoint Platform using the company's own internal user credentials. To achieve this, the company needs to integrate an external identity provider (IdP) with the company's Anypoint Platform master organization, but SAML 2.0 CANNOT be used. Besides SAML 2.0, what single-sign-on standard can the company use to integrate the IdP with their Anypoint Platform master organization?

Options:

A.

SAML 1.0

B.

OAuth 2.0

C.

Basic Authentication

D.

OpenID Connect

Buy Now
Questions 43

A company is implementing a new Mule application that supports a set of critical functions driven by a rest API enabled, claims payment rules engine hosted on oracle ERP. As designed the mule application requires many data transformation operations as it performs its batch processing logic.

The company wants to leverage and reuse as many of its existing java-based capabilities (classes, objects, data model etc.) as possible

What approach should be considered when implementing required data mappings and transformations between Mule application and Oracle ERP in the new Mule application?

Options:

A.

Create a new metadata RAML classes in Mule from the appropriate Java objects and then perform transformations via Dataweave

B.

From the mule application, transform via theXSLT model

C.

Transform by calling any suitable Java class from Dataweave

D.

Invoke any of the appropriate Java methods directly, create metadata RAML classes and then perform required transformations via Dataweave

Buy Now
Questions 44

A trading company handles millions of requests a day. Due to nature of its business, it requires excellent

performance and reliability within its application.

For this purpose, company uses a number of event-based API's hosted on various mule clusters that communicate across a shared message queue sitting within its network.

Which method should be used to meet the company's requirement for its system?

Options:

A.

XA transactions and XA connected components

B.

JMS transactions

C.

JMS manual acknowledgements with a reliability pattern

D.

VM queues with reliability pattern

Buy Now
Questions 45

A key Cl/CD capability of any enterprise solution is a testing framework to write and run repeatable tests.

Which component of Anypoint Platform provides the te6t automation capabilities for customers to use in their pipelines?

Options:

A.

Anypoint CLl

B.

Mule Maven Plugin

C.

Exchange Mocking Service

D.

MUnit

Buy Now
Questions 46

A manufacturing company is planning to deploy Mule applications to its own Azure Kubernetes Service infrastructure.

The organization wants to make the Mule applications more available and robust by deploying each Mule application to an isolated Mule runtime in a Docker container while managing all the Mule applications from the MuleSoft-hosted control plane.

What is the most idiomatic (used for its intended purpose) choice of runtime plane to meet these organizational requirements?

Options:

A.

Anypoint Platform Private Cloud Edition

B.

Anypoint Runtime Fabric

C.

CloudHub

D.

Anypoint Service Mesh

Buy Now
Questions 47

Customer has deployed mule applications to different customer hosted mule run times. Mule applications are managed from Anypoint platform.

What needs to be configured to monitor these Mule applications from Anypoint monitoring and what sends monitoring data to Anypoint monitoring?

Options:

A.

Enable monitoring of individual applications from runtime manager application settingsRuntime manager agent sends monitoring data from the mule applications to Anypoint monitoring

B.

Install runtime manager agent on each mule runtimeRuntime manager agent since monitoring data from the mule applications to Anypoint monitoring

C.

Anypoint monitoring agent on each mule runtimeAnypoint monitoring agent sends monitoring data from the mule applications to Anypoint monitoring

D.

By default, Anypoint monitoring agent will be installed on each Mule run timeAnypoint Monitoring agent automatically sends monitoring data from the Mule applications to Anypoint monitoring

Buy Now
Questions 48

What requirement prevents using Anypoint MQ as the messaging broker for a Mule application?

Options:

A.

When the payload sent through the message broker must use XML format

B.

When the payload sent through the message broker must be encrypted

C.

When the messaging broker must support point-to-point messaging

D.

When the messaging broker must be deployed on-premises

Buy Now
Questions 49

An organization is evaluating using the CloudHub shared Load Balancer (SLB) vs creating a CloudHub dedicated load balancer (DLB). They are evaluating how this choice affects the various types of certificates used by CloudHub deployed Mule applications, including MuleSoft-provided, customer-provided, or Mule application-provided certificates. What type of restrictions exist on the types of certificates for the service that can be exposed by the CloudHub Shared Load Balancer (SLB) to external web clients over the public internet?

Options:

A.

Underlying Mule applications need to implement own certificates

B.

Only MuleSoft provided certificates can be used for server side certificate

C.

Only self signed certificates can be used

D.

All certificates which can be used in shared load balancer need to get approved by raising support ticket

Buy Now
Questions 50

Refer to the exhibit.

What is the type data format shown in the exhibit?

Options:

A.

JSON

B.

XML

C.

YAML

D.

CSV

Buy Now
Questions 51

Which Exchange asset type represents configuration modules that extend the functionality of an API and enforce capabilities such as security?

Options:

A.

Rulesets

B.

Policies

C.

RESTAPIs

D.

Connectors

Buy Now
Questions 52

Which Anypoint Platform component helps integration developers discovers and share reusable APIs, connectors, and templates?

Options:

A.

Anypoint Exchange

B.

API Manager

C.

Anypoint Studio

D.

Design Center

Buy Now
Questions 53

Refer to the exhibit.

A Mule application is deployed to a multi-node Mule runtime cluster. The Mule application uses the competing consumer pattern among its cluster replicas to receive JMS messages from a JMS queue. To process each received JMS message, the following steps are performed in a flow:

Step l: The JMS Correlation ID header is read from the received JMS message.

Step 2: The Mule application invokes an idempotent SOAP webservice over HTTPS, passing the JMS Correlation ID as one parameter in the SOAP request.

Step 3: The response from the SOAP webservice also returns the same JMS Correlation ID.

Step 4: The JMS Correlation ID received from the SOAP webservice is validated to be identical to the JMS Correlation ID received in Step 1.

Step 5: The Mule application creates a response JMS message, setting the JMS Correlation ID message header to the validated JMS Correlation ID and publishes that message to a response JMS queue.

Where should the Mule application store the JMS Correlation ID values received in Step 1 and Step 3 so that the validation in Step 4 can be performed, while also making the overall Mule application highly available, fault-tolerant, performant, and maintainable?

Options:

A.

Both Correlation ID values should be stored in a persistent object store

B.

Both Correlation ID values should be stored In a non-persistent object store

C.

The Correlation ID value in Step 1 should be stored in a persistent object storeThe Correlation ID value in step 3 should be stored as a Mule event variable/attribute

D.

Both Correlation ID values should be stored as Mule event variable/attribute

Buy Now
Questions 54

Refer to the exhibit.

An organization is designing a Mule application to receive data from one external business partner. The two companies currently have no shared IT infrastructure and do not want to establish one. Instead, all communication should be over the public internet (with no VPN).

What Anypoint Connector can be used in the organization's Mule application to securely receive data from this external business partner?

Options:

A.

File connector

B.

VM connector

C.

SFTP connector

D.

Object Store connector

Buy Now
Questions 55

An organization has an HTTPS-enabled Mule application named Orders API that receives requests from another Mule application named Process Orders.

The communication between these two Mule applications must be secured by TLS mutual authentication (two-way TLS).

At a minimum, what must be stored in each truststore and keystore of these two Mule applications to properly support two-way TLS between the two Mule applications while properly protecting each Mule application's keys?

Options:

A.

Orders API truststore: The Orders API public keyProcess Orders keystore: The Process Orders private key and public key

B.

Orders API truststore: The Orders API private key and public keyProcess Orders keystore: The Process Orders private key public key

C.

Orders API truststore: The Process Orders public keyOrders API keystore: The Orders API private key and public keyProcess Orders truststore: The Orders API public keyProcess Orders keystore: The Process Orders private key and public key

D.

Orders API truststore: The Process Orders public keyOrders API keystore: The Orders API private keyProcess Orders truststore: The Orders API public keyProcess Orders keystore: The Process Orders private key

Buy Now
Questions 56

Mule application is deployed to Customer Hosted Runtime. Asynchronous logging was implemented to improved throughput of the system. But it was observed over the period of time that few of the important exception log messages which were used to rollback transactions are not working as expected causing huge loss to the Organization. Organization wants to avoid these losses. Application also has constraints due to which they cant compromise on throughput much. What is the possible option in this case?

Options:

A.

Logging needs to be changed from asynchronous to synchronous

B.

External log appender needs to be used in this case

C.

Persistent memory storage should be used in such scenarios

D.

Mixed configuration of asynchronous or synchronous loggers should be used to log exceptions via synchronous way

Buy Now
Questions 57

An organization uses a set of customer-hosted Mule runtimes that are managed using the Mulesoft-hosted control plane. What is a condition that can be alerted on from Anypoint Runtime Manager without any custom components or custom coding?

Options:

A.

When a Mule runtime on a given customer-hosted server is experiencing high memory consumption during certain periods

B.

When an SSL certificate used by one of the deployed Mule applications is about to expire

C.

When the Mute runtime license installed on a Mule runtime is about to expire

D.

When a Mule runtime's customer-hosted server is about to run out of disk space

Buy Now
Questions 58

Refer to the exhibit.

A Mule application is being designed to expose a SOAP web service to its clients.

What language is typically used inside the web service's interface definition to define the data structures that the web service Is expected to exchange with its clients?

MuleSoft-Integration-Architect-I Question 58

Options:

A.

WSDL

B.

XSD

C.

JSON Schema

D.

RAMI

Buy Now
Questions 59

According to MuleSoft, which system integration term describes the method, format, and protocol used for communication between two system?

Options:

A.

Component

B.

interaction

C.

Message

D.

Interface

Buy Now
Questions 60

An organization is designing multiple new applications to run on CloudHub in a single Anypoint VPC and that must share data using a common persistent Anypoint object store V2 (OSv2).

Which design gives these mule applications access to the same object store instance?

Options:

A.

AVM connector configured to directly access the persistence queue of the persistent object store

B.

An Anypoint MQ connector configured to directly access the persistent object store

C.

Object store V2 can be shared across cloudhub applications with the configured osv2 connector

D.

The object store V2 rest API configured to access the persistent object store

Buy Now
Questions 61

An application load balancer routes requests to a RESTful web API secured by Anypoint Flex Gateway.

Which protocol is involved in the communication between the load balancer and the Gateway?

Options:

A.

SFTP

B.

HTTPS

C.

LDAP

D.

SMTP

Buy Now
Questions 62

An organization plans to extend its Mule APIs to the EU (Frankfurt) region.

Currently, all Mule applications are deployed to CloudHub 1.0 in the default North American region, from the North America control plane, following this naming convention: {API-name}—{environment} (for example, Orderssapi—dev, Orders-sapi-—qa, Orders-sapi-—prod, etc.).

There is no network restriction to block communications between APIs.

What strategy should be implemented in order to deploy the same Mule APIs to the CloudHub 1.0 EU region from the North America control plane,

as well as to minimize latency between APIs and target users and systems in Europe?

Options:

A.

In Runtime Manager, for each Mule application deployment, set the Region property to EU (Frankfurt) and reuse the same Mule application mame as in the North Americanregion.Communicate the new urls {API-name}—{environment}.de-ci.cloudhub.io to the consuming API clients In Europe.

B.

In API Manager, set the Region property to EU (Frankfurt) to create an API proxy named {API-name}—proxy—{environment} for each Mule application.Communicate the new url {API-name}—proxy—{environment}.de-c1.cloudhub.io to the consuming API clients In Europe.

C.

In Runtime Manager, for each Mule application deployment, leave the Region propertyblank (default) and change the Mule application name to {API-name}—{environment).de-cl.Communicate the new urls {API-name}—{environment}.de-ci1.cloudhub.io to theconsuming API clients in Europe.

D.

In API Manager, leave the Region property blank (default) to deploy an API proxy named {API-name}~proxy~- (environment}.de-cl for each Mule application.Communicate the new url {API-name}—proxy—{environment}.de-cl.cloudhub.io to the consuming API clients in Europe.

Buy Now
Questions 63

A new upstream API Is being designed to offer an SLA of 500 ms median and 800 ms maximum (99th percentile) response time. The corresponding API implementation needs to sequentially invoke 3 downstream APIs of very similar complexity. The first of these downstream APIs offers the following SLA for its response time: median: 100 ms, 80th percentile: 500 ms, 95th percentile: 1000 ms. If possible, how can a timeout be set in the upstream API for the invocation of the first downstream API to meet the new upstream API's desired SLA?

Options:

A.

Set a timeout of 100 ms; that leaves 400 ms for the other two downstream APIs to complete

B.

Do not set a timeout; the Invocation of this API Is mandatory and so we must wait until it responds

C.

Set a timeout of 50 ms; this times out more invocations of that API but gives additional room for retries

D.

No timeout is possible to meet the upstream API's desired SLA; a different SLA must be negotiated with the first downstream API or invoke an alternative API

Buy Now
Questions 64

A retailer is designing a data exchange interface to be used by its suppliers. The interface must support secure communication over the public internet. The interface must also work with a wide variety of programming languages and IT systems used by suppliers.

What are suitable interface technologies for this data exchange that are secure, cross-platform, and internet friendly, assuming that Anypoint Connectors exist for these interface technologies?

Options:

A.

EDJFACT XML over SFTP JSON/REST over HTTPS

B.

SOAP over HTTPS HOP over TLS gRPC over HTTPS

C.

XML over ActiveMQ XML over SFTP XML/REST over HTTPS

D.

CSV over FTP YAML over TLS JSON over HTTPS

Buy Now
Questions 65

An auto mobile company want to share inventory updates with dealers Dl and D2 asynchronously and concurrently via queues Q1 and Q2. Dealer Dl must consume the message from the queue Q1 and dealer D2 to must consume a message from the queue Q2.

Dealer D1 has implemented a retry mechanism to reprocess the transaction in case of any errors while processing the inventers updates. Dealer D2 has not implemented any retry mechanism.

How should the dealers acknowledge the message to avoid message loss and minimize impact on the current implementation?

Options:

A.

Dealer D1 must use auto acknowledgement and dealer D2 can use manual acknowledgement and acknowledge the message after successful processing

B.

Dealer D1 can use auto acknowledgement and dealer D2 can use IMMEDIATE acknowledgement and acknowledge the message of successful processing

C.

Dealer D1 and dealer D2 must use AUTO acknowledgement and acknowledge the message after successful processing

D.

Dealer D1 can use AUTO acknowledgement and dealer D2 must use manual acknowledgement and acknowledge the message after successful processing

Buy Now
Questions 66

A company is planning to migrate its deployment environment from on-premises cluster to a Runtime Fabric (RTF) cluster. It also has a requirement to enable Mule applications deployed to a Mule runtime instance to store and share data across application replicas and restarts.

How can these requirements be met?

Options:

A.

Anypoint object store V2 to share data between replicas in the RTF cluster

B.

Install the object store pod on one of the cluster nodes

C.

Configure Persistence Gateway in any of the servers using Mule Object Store

D.

Configure Persistent Gateway at the RTF

Buy Now
Questions 67

Refer to the exhibit.

Anypoint Platform supports role-based access control (RBAC) to features of the platform. An organization has configured an external Identity Provider for identity management with Anypoint Platform.

What aspects of RBAC must ALWAYS be controlled from the Anypoint Platform control plane and CANNOT be controlled via the external Identity Provider?

Options:

A.

Controlling the business group within Anypoint Platform to which the user belongs

B.

Assigning Anypoint Platform permissions to a role

C.

Assigning Anypoint Platform role(s) to a user

D.

Removing a user's access to Anypoint Platform when they no longer work for the organization

Buy Now
Questions 68

An organization heeds to procure an enterprise software system to increase cross-selling opportunities and better rack prospect data.

Which category of enterprise software has these core capabilities, when used for its typical and intended purpose?

Options:

A.

Supply Chain Management (SCM)

B.

IT Service Management (ITSM)

C.

Business-to-Business (A2B)

D.

Customer Relationship Management (CRM)

Buy Now
Questions 69

A Mule application is deployed to a cluster of two(2) cusomter-hosted Mule runtimes. Currently the node name Alice is the primary node and node named bob is the secondary node. The mule application has a flow that polls a directory on a file system for new files.

The primary node Alice fails for an hour and then restarted.

After the Alice node completely restarts, from what node are the files polled, and what node is now the primary node for the cluster?

Options:

A.

Files are polled from Alice nodeAlice is now the primary node

B.

Files are polled form Bob nodeAlice is now the primary node

C.

Files are polled from Alice nodeBob is the now the primary node

D.

Files are polled form Bob nodeBob is now the primary node

Buy Now
Questions 70

Refer to the exhibit.

MuleSoft-Integration-Architect-I Question 70

An organization uses a 2-node Mute runtime cluster to host one stateless API implementation. The API is accessed over HTTPS through a load balancer that uses round-robin for load distribution.

Two additional nodes have been added to the cluster and the load balancer has been configured to recognize the new nodes with no other change to the load balancer.

What average performance change is guaranteed to happen, assuming all cluster nodes are fully operational?

Options:

A.

50% reduction in the response time of the API

B.

100% increase in the throughput of the API

C.

50% reduction In the JVM heap memory consumed by each node

D.

50% reduction In the number of requests being received by each node

Buy Now
Questions 71

According to the Internet Engineering Task Force (IETF), which supporting protocol does File Transfer Protocol (FTP) use for reliable communication?

Options:

A.

A Secure Sockets Layer (SSL)

B.

B Transmission Control Protocol (TCP)

C.

Lightweight Directory Access Protocol (LDAP)

D.

Hypertext Transfer Protocol (HTTP)

Buy Now
Questions 72

What is not true about Mule Domain Project?

Options:

A.

This allows Mule applications to share resources

B.

Expose multiple services within the Mule domain on the same port

C.

Only available Anypoint Runtime Fabric

D.

Send events (messages) to other Mule applications using VM queues

Buy Now
Questions 73

A project team is working on an API implementation using the RAML definition as a starting point. The team has updated the definition to include new operations and has published a new version to exchange. Meanwhile another team is working on a mule application consuming the same API implementation.

During the development what has to be performed by the mule application team to take advantage of the newly added operations?

Options:

A.

Scaffold the client application with the new definition

B.

Scaffold API implementation application with the new definition

C.

Update the REST connector from exchange in the client application

D.

Update the API connector in the API implementation and publish to exchange

Buy Now
Questions 74

A team has completed the build and test activities for a Mule application that implements a System API for its application network.

Which Anypoint Platform component should the team now use to both deploy and monitor the System AP\ implementation?

Options:

A.

API Manager

B.

Design Center

C.

Anypoint Exchange

D.

Runtime Manager

Buy Now
Questions 75

An organization is building out a test suite for their application using MUnit.

The Integration Architect has recommended using Test Recorder in Anypoint Studio to record the processing flows and then configure unit tests based on the captured events.

What Is a core consideration that must be kept In mind while using Test Recorder?

Options:

A.

The Recorder supports loops where the structure of the data being tested changes inside the Iteration

B.

Mocking values resulting from parallel processes are possible and will not affect theexecution of the processors that follow in the test

C.

The Recorder supports mocking a message before or inside a Foreach processor

D.

Tests for flows cannot be created if Mule errors are raised Inside the flows, even if the errors are handled by On-Error Continue error handlers

Buy Now
Questions 76

An API has been unit tested and is ready for integration testing. The API is governed by a Client ID Enforcement policy in all environments.

What must the testing team do before they can start integration testing the API in the Staging environment?

Options:

A.

They must access the API portal and create an API notebook using the Client ID and Client Secret supplied by the API portal in the Staging environment

B.

They must request access to the API instance in the Staging environment and obtain a Client ID and Client Secret to be used for testing the API

C.

They must be assigned as an API version owner of the API in the Staging environment

D.

They must request access to the Staging environment and obtain the Client ID and Client Secret for that environment to be used for testing the API

Buy Now
Questions 77

Following MuleSoft best practices, what MuleSoft runtime deployment option best meets the company's goals to begin its digital transformation journey?

Options:

A.

Runtime Fabric on VMs/bare metal

B.

CloudHub runtimes

C.

Customer-hosted runtimes provisioned by a MuleSoft services partner

D.

Customer-hosted self-provisioned runtimes

Buy Now
Questions 78

Which productivity advantage does Anypoint Platform have to both implement and manage an AP?

Options:

A.

Automatic API proxy generation

B.

Automatic API specification generation

C.

Automatic API semantic versioning

D.

Automatic API governance

Buy Now
Questions 79

Refer to the exhibit.

An organization is sizing an Anypoint VPC for the non-production deployments of those Mule applications that connect to the organization's on-premises systems. This applies to approx. 60 Mule applications. Each application is deployed to two CloudHub i workers. The organization currently has three non-production environments (DEV, SIT and UAT) that share this VPC. The AWS region of the VPC has two AZs.

The organization has a very mature DevOps approach which automatically progresses each application through all non-production environments before automatically deploying to production. This process results in several Mule application deployments per hour, using CloudHub's normal zero-downtime deployment feature.

What is a CIDR block for this VPC that results in the smallest usable private IP address range?

Options:

A.

10.0.0.0/26 (64 IPS)

B.

10.0.0.0/25 (128 IPs)

C.

10.0.0.0/24 (256 IPs)

D.

10.0.0.0/22 (1024 IPs)

Buy Now
Questions 80

A Mule application is synchronizing customer data between two different database systems.

What is the main benefit of using XA transaction over local transactions to synchronize these two database system?

Options:

A.

Reduce latency

B.

Increase throughput

C.

Simplifies communincation

D.

Ensure consistency

Buy Now
Questions 81

A system API EmployeeSAPI is used to fetch employee's data from an underlying SQL database.

The architect must design a caching strategy to query the database only when there is an update to the employees stable or else return a cached response in order to minimize the number of redundant transactions being handled by the database.

What must the architect do to achieve the caching objective?

Options:

A.

Use an On Table Row on employees table and call invalidate cacheUse an object store caching strategy and expiration interval to empty

B.

Use a Scheduler with a fixed frequency every hour triggering an invalidate cache flowUse an object store caching strategy and expiration interval to empty

C.

Use a Scheduler with a fixed frequency every hour triggering an invalidate cache flowUse an object store caching strategy and set expiration interval to 1-hour

D.

Use an on table rule on employees table call invalidate cache and said new employees data to cacheUse an object store caching strategy and set expiration interval to 1-hour

Buy Now
Exam Name: Salesforce Certified MuleSoft Platform Integration Architect (Mule-Arch-202)
Last Update: Dec 5, 2025
Questions: 273

PDF + Testing Engine

$140

Testing Engine

$105

PDF (Q&A)

$90