Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

An architect is designing a Mule application to meet the following two requirements:

1. The application must process files asynchronously and reliably from an FTPS server to a back-end database using VM intermediary queues for

load-balancing Mule events.

2. The application must process a medium rate of records from a source to a target system using a Batch Job scope.

To make the Mule application more reliable, the Mule application will be deployed to two CloudHub 1.0 workers.

Following MuleSoft-recommended best practices, how should the Mule application deployment typically be configured in Runtime Manger to best

support the performance and reliability goals of both the Batch Job scope and the file processing VM queues?

A.

Check the Persistent VM queues checkbox in the application deployment configuration

B.

Check the Non-persistent VM queues checkbox in the application deployment configuration

C.

In the Runtime Manager Properties tab, disable persistent VM queues for Batch Job scopes

D.

In the Runtime Manager Properties tab, enable persistent VM queues for the FTPS connector

Full Access
Question # 5

An organization designing a hybrid, load balanced, single cluster production environment. Due to performance service level agreement goals, it is looking into running the Mule applications in an active-active multi node cluster configuration.

What should be considered when running its Mule applications in this type of environment?

A.

All event sources, regardless of time , can be configured as the target source by the primary node in the cluster

B.

An external load balancer is required to distribute incoming requests throughout the cluster nodes

C.

A Mule application deployed to multiple nodes runs in an isolation from the other nodes in the cluster

D.

Although the cluster environment is fully installed configured and running, it will not process any requests until an outage condition is detected by the primary node in the cluster.

Full Access
Question # 6

An application load balancer routes requests to a RESTful web API secured by Anypoint Flex Gateway.

Which protocol is involved in the communication between the load balancer and the Gateway?

A.

SFTP

B.

HTTPS

C.

LDAP

D.

SMTP

Full Access
Question # 7

A set of integration Mule applications, some of which expose APIs, are being created to enable a new business process. Various stakeholders may be impacted by this. These stakeholders are a combination of semi-technical users (who understand basic integration terminology and concepts such as JSON and XML) and technically skilled potential consumers of the Mule applications and APIs.

What Is an effective way for the project team responsible for the Mule applications and APIs being built to communicate with these stakeholders using Anypoint Platform and its supplied toolset?

A.

Use Anypoint Design Center to implement the Mule applications and APIs and give the various stakeholders access to these Design Center projects, so they can collaborate and provide feedback

B.

Create Anypoint Exchange entries with pages elaborating the integration design, including API notebooks (where applicable) to help the stakeholders understand and interact with the Mule applications and APIs at various levels of technical depth

C.

Use Anypoint Exchange to register the various Mule applications and APIs and share the RAML definitions with the stakeholders, so they can be discovered

D.

Capture documentation about the Mule applications and APIs inline within the Mule integration flows and use Anypoint Studio's Export Documentation feature to provide an HTML version of this documentation to the stakeholders

Full Access
Question # 8

According to MuleSoft, which major benefit does a Center for Enablement (C4E) provide for an enterprise and its lines of business?

A.

Enabling Edge security between the lines of business and public devices

B.

Centralizing project management across the lines of business

C.

Centrally managing return on investment (ROI) reporting from lines of business to leadership

D.

Accelerating self-service by the lines of business

Full Access
Question # 9

A banking company is developing a new set of APIs for its online business. One of the critical API's is a master lookup API which is a system API. This master lookup API uses persistent object store. This API will be used by all other APIs to provide master lookup data.

Master lookup API is deployed on two cloudhub workers of 0.1 vCore each because there is a lot of master data to be cached. Master lookup data is stored as a key value pair. The cache gets refreshed if they key is not found in the cache.

Doing performance testing it was observed that the Master lookup API has a higher response time due to database queries execution to fetch the master lookup data.

Due to this performance issue, go-live of the online business is on hold which could cause potential financial loss to Bank.

As an integration architect, which of the below option you would suggest to resolve performance issue?

A.

Implement HTTP caching policy for all GET endpoints for the master lookup API and implement locking to synchronize access to object store

B.

Upgrade vCore size from 0.1 vCore to 0,2 vCore

C.

Implement HTTP caching policy for all GET endpoints for master lookup API

D.

Add an additional Cloudhub worker to provide additional capacity

Full Access
Question # 10

An insurance provider is implementing Anypoint platform to manage its application infrastructure and is using the customer hosted runtime for its business due to certain financial requirements it must meet. It has built a number of synchronous API's and is currently hosting these on a mule runtime on one server

These applications make use of a number of components including heavy use of object stores and VM queues.

Business has grown rapidly in the last year and the insurance provider is starting to receive reports of reliability issues from its applications.

The DevOps team indicates that the API's are currently handling too many requests and this is over loading the server. The team has also mentioned that there is a significant downtime when the server is down for maintenance.

As an integration architect, which option would you suggest to mitigate these issues?

A.

Add a load balancer and add additional servers in a server group configuration

B.

Add a load balancer and add additional servers in a cluster configuration

C.

Increase physical specifications of server CPU memory and network

D.

Change applications by use an event-driven model

Full Access
Question # 11

A project team is working on an API implementation using the RAML definition as a starting point. The team has updated the definition to include new operations and has published a new version to exchange. Meanwhile another team is working on a mule application consuming the same API implementation.

During the development what has to be performed by the mule application team to take advantage of the newly added operations?

A.

Scaffold the client application with the new definition

B.

Scaffold API implementation application with the new definition

C.

Update the REST connector from exchange in the client application

D.

Update the API connector in the API implementation and publish to exchange

Full Access
Question # 12

An automation engineer needs to write scripts to automate the steps of the API lifecycle, including steps to create, publish, deploy and manage APIs and their implementations in Anypoint Platform.

What Anypoint Platform feature can be used to automate the execution of all these actions in scripts in the easiest way without needing to directly invoke the Anypoint Platform REST APIs?

A.

Automated Policies in API Manager

B.

Runtime Manager agent

C.

The Mule Maven Plugin

D.

Anypoint CLI

Full Access
Question # 13

According to MuleSoft’s recommended REST conventions, which HTTP method should an API use to specify how AP\ clients can request data from a specified resource?

A.

POST

B.

PUT

C.

PATCH

D.

GET

Full Access
Question # 14

Cloud Hub is an example of which cloud computing service model?

A.

Platform as a Service (PaaS)

B.

Software as a Service (SaaS)

C.

Monitoring as a Service (MaaS)

D.

Infrastructure as a Service (laaS)

Full Access
Question # 15

What API policy would LEAST likely be applied to a Process API?

A.

Custom circuit breaker

B.

Client ID enforcement

C.

Rate limiting

D.

JSON threat protection

Full Access
Question # 16

What aspect of logging is only possible for Mule applications deployed to customer-hosted Mule runtimes, but NOT for Mule applications deployed to CloudHub?

A.

To send Mule application log entries to Splunk

B.

To change tog4j2 tog levels in Anypoint Runtime Manager without having to restart the Mule application

C.

To log certain messages to a custom log category

D.

To directly reference one shared and customized log4j2.xml file from multiple Mule applications

Full Access
Question # 17

A global organization operates datacenters in many countries. There are private network links between these datacenters because all business data (but NOT metadata) must be exchanged over these private network connections.

The organization does not currently use AWS in any way.

The strategic decision has Just been made to rigorously minimize IT operations effort and investment going forward.

What combination of deployment options of the Anypoint Platform control plane and runtime plane(s) best serves this organization at the start of this strategic journey?

A.

MuleSoft-hosted Anypoint Platform control plane CloudHub Shared Worker Cloud in multiple AWS regions

B.

Anypoint Platform - Private Cloud Edition Customer-hosted runtime plane in each datacenter

C.

MuleSoft-hosted Anypoint Platform control plane Customer-hosted runtime plane in multiple AWS regions

D.

MuleSoft-hosted Anypoint Platform control plane Customer-hosted runtime plane in each datacenter

Full Access
Question # 18

A retail company is implementing a MuleSoft API to get inventory details from two vendors by Invoking each vendor's online applications. Due to network issues, the invocations to the vendor applications are timing out intermittently, but the requests are successful after re-invoking each

vendor application.

What is the most performant way of implementing the API to invoke each vendor application and to retry invocations that generate timeout errors?

A.

Use a For-Each scope to invoke the two vendor applications in series, one after the other.

Place the For-Each scope inside an Until-Successful scope to retry requests that raise timeout errors.

B.

Use a Choice scope to Invoke each vendor application on a separate route.

Place the Choice scope inside an Until-Successful scope to retry requests that raise

timeout errors.

C.

Use a Scatter-Gather scope to invoke each vendor application on a separate route.

Use an Until-Successful scope in each route to retry requests that raise timeout errors.

D.

Use a Round-Robin scope to invoke each vendor application on a separate route.

Use a Try-Catch scope in each route to retry requests that raise timeout errors.

Full Access
Question # 19

What comparison is true about a CloudHub Dedicated Load Balancer (DLB) vs. the CloudHub Shared Load Balancer (SLB)?

A.

Only a DLB allows the configuration of a custom TLS server certificate

B.

Only the SLB can forward HTTP traffic to the VPC-internal ports of the CloudHub workers

C.

Both a DLB and the SLB allow the configuration of access control via IP whitelists

D.

Both a DLB and the SLB implement load balancing by sending HTTP requests to workers with the lowest workloads

Full Access
Question # 20

In which order are the API Client, API Implementation, and API interface components called in a typical REST request?

A.

API Client > API implementation > API Interface

B.

API interface > API Client > API Implementation

C.

API Client > API Interface > API implementation

D.

API Implementation > API Interface > API Client

Full Access
Question # 21

An API client is implemented as a Mule application that includes an HTTP Request operation using a default configuration. The HTTP Request operation invokes an external API that follows standard HTTP status code conventions, which causes the HTTP Request operation to return a 4xx status code.

What is a possible cause of this status code response?

A.

An error occurred inside the external API implementation when processing the HTTP request that was received from the outbound HTTP Request operation of the Mule application

B.

The external API reported that the API implementation has moved to a different external endpoint

C.

The HTTP response cannot be interpreted by the HTTP Request operation of the Mule application after it was received from the external API

D.

The external API reported an error with the HTTP request that was received from the outbound HTTP Request operation of the Mule application

Full Access
Question # 22

Mule application A receives a request Anypoint MQ message REQU with a payload containing a variable-length list of request objects. Application A uses the For Each scope to split the list into individual objects and sends each object as a message to an Anypoint MQ queue.

Service S listens on that queue, processes each message independently of all other messages, and sends a response message to a response queue.

Application A listens on that response queue and must in turn create and publish a response Anypoint MQ message RESP with a payload containing the list of responses sent by service S in the same order as the request objects originally sent in REQU.

Assume successful response messages are returned by service S for all request messages.

What is required so that application A can ensure that the length and order of the list of objects in RESP and REQU match, while at the same time maximizing message throughput?

A.

Use a Scatter-Gather within the For Each scope to ensure response message order Configure the Scatter-Gather with a persistent object store

B.

Perform all communication involving service S synchronously from within the For Each scope, so objects in RESP are in the exact same order as request objects in REQU

C.

Use an Async scope within the For Each scope and collect response messages in a second For Each scope in the order In which they arrive, then send RESP using this list of responses

D.

Keep track of the list length and all object indices in REQU, both in the For Each scope and in all communication involving service Use persistent storage when creating RESP

Full Access
Question # 23

Which Exchange asset type represents a complete API specification in RAML or OAS format?

A.

Connectors

B.

REST APIs

C.

API Spec Fragments

D.

SOAP APIs

Full Access
Question # 24

An organization has just developed a Mule application that implements a REST API. The mule application will be deployed to a cluster of customer hosted Mule runtimes.

What additional infrastructure component must the customer provide in order to distribute inbound API requests across the Mule runtimes of the cluster?

A.

A message broker

B.

An HTTP Load Balancer

C.

A database

D.

An Object Store

Full Access
Question # 25

According to MuteSoft, which principle is common to both Service Oriented Architecture (SOA) and API-led connectivity approaches?

A.

Service centralization

B.

Service statefulness

C.

Service reusability

D.

Service interdependence

Full Access
Question # 26

An API client makes an HTTP request to an API gateway with an Accept header containing the value’’ application’’.

What is a valid HTTP response payload for this request in the client requested data format?

A.

healthy

B.

{"status" "healthy"}

C.

status(‘healthy")

D.

status: healthy

Full Access
Question # 27

An organization is designing Mule application which connects to a legacy backend. It has been reported that backend services are not highly available and experience downtime quite often. As an integration architect which of the below approach you would propose to achieve high reliability goals?

A.

Alerts can be configured in Mule runtime so that backend team can be communicated when services are down

B.

Until Successful scope can be implemented while calling backend API's

C.

On Error Continue scope to be used to call in case of error again

D.

Create a batch job with all requests being sent to backend using that job as per the availability of backend API's

Full Access
Question # 28

What Mule application can have API policies applied by Anypoint Platform to the endpoint exposed by that Mule application?

A.

A Mule application that accepts requests over HTTP/1x

B.

A Mule application that accepts JSON requests over TCP but is NOT required to provide a response.

C.

A Mule application that accepts JSON requests over WebSocket

D.

A Mule application that accepts gRPC requests over HTTP/2

Full Access
Question # 29

A developer is examining the responses from a RESTful web service that is compliant with the Mypertext Transfer Protocol (HTTP/1.1) a8 defined by the Internet Engineering Task Force (IETF).

In this HTTP/1.1-compliant web service, which class of HTTP response status codes should be specified to indicate when client requests are successfully received, understood, and accepted by the web service?

A.

3xx

B.

2xx

C.

4xx

D.

5xx

Full Access
Question # 30

Refer to the exhibit.

A Mule application has an HTTP Listener that accepts HTTP DELETE requests. This Mule application Is deployed to three CloudHub workers under the control of the CloudHub Shared Load Balancer.

A web client makes a sequence of requests to the Mule application's public URL.

How is this sequence of web client requests distributed among the HTTP Listeners running in the three CloudHub workers?

A.

Each request is routed to the PRIMARY CloudHub worker in the PRIMARY Availability Zone (AZ)

B.

Each request is routed to ONE ARBiTRARY CloudHub worker in the PRIMARY Availability Zone (AZ)

C.

Each request Is routed to ONE ARBiTRARY CloudHub worker out of ALL three CloudHub workers

D.

Each request is routed (scattered) to ALL three CloudHub workers at the same time

Full Access
Question # 31

A Mule application uses APIkit for SOAP to implement a SOAP web service. The Mule application has been deployed to a CloudHub worker in a testing environment.

The integration testing team wants to use a SOAP client to perform Integration testing. To carry out the integration tests, the integration team must obtain the interface definition for the SOAP web service.

What is the most idiomatic (used for its intended purpose) way for the integration testing team to obtain the interface definition for the deployed SOAP web service in order to perform integration testing with the SOAP client?

A.

Retrieve the OpenAPI Specification file(s) from API Manager

B.

Retrieve the WSDL file(s) from the deployed Mule application

C.

Retrieve the RAML file(s) from the deployed Mule application

D.

Retrieve the XML file(s) from Runtime Manager

Full Access
Question # 32

Refer to the exhibit.

What is the type data format shown in the exhibit?

A.

JSON

B.

XML

C.

YAML

D.

CSV

Full Access
Question # 33

An organization plans to extend its Mule APIs to the EU (Frankfurt) region.

Currently, all Mule applications are deployed to CloudHub 1.0 in the default North American region, from the North America control plane, following this naming convention: {API-name}—{environment} (for example, Orderssapi—dev, Orders-sapi-—qa, Orders-sapi-—prod, etc.).

There is no network restriction to block communications between APIs.

What strategy should be implemented in order to deploy the same Mule APIs to the CloudHub 1.0 EU region from the North America control plane,

as well as to minimize latency between APIs and target users and systems in Europe?

A.

In Runtime Manager, for each Mule application deployment, set the Region property to EU (Frankfurt) and reuse the same Mule application mame as in the North American

region.

Communicate the new urls {API-name}—{environment}.de-ci.cloudhub.io to the consuming API clients In Europe.

B.

In API Manager, set the Region property to EU (Frankfurt) to create an API proxy named {API-name}—proxy—{environment} for each Mule application.

Communicate the new url {API-name}—proxy—{environment}.de-c1.cloudhub.io to the consuming API clients In Europe.

C.

In Runtime Manager, for each Mule application deployment, leave the Region property

blank (default) and change the Mule application name to {API-name}—

{environment).de-cl.

Communicate the new urls {API-name}—{environment}.de-ci1.cloudhub.io to the

consuming API clients in Europe.

D.

In API Manager, leave the Region property blank (default) to deploy an API proxy named {API-name}~proxy~- (environment}.de-cl for each Mule application.

Communicate the new url {API-name}—proxy—{environment}.de-cl.cloudhub.io to the consuming API clients in Europe.

Full Access
Question # 34

How should the developer update the logging configuration in order to enable this package specific debugging?

A.

In Anypoint Monitoring, define a logging search query with class property set to org.apache.cxf and level set to DEBUG

B.

In the Mule application's log4j2.xml file, add an AsyncLogger element with name property set to org.apache.cxf and level set to DEBUG, then redeploy the Mule application in the CloudHub production environment

C.

In the Mule application's log4j2.xmI file, change the root logger's level property to DEBUG, then redeploy the Mule application to the CloudHub production environment

D.

In Anypoint Runtime Manager, in the Deployed Application Properties tab for the Mule application, add a line item with DEBUG level for package org.apache.cxf and apply the changes

Full Access
Question # 35

A developer needs to discover which API specifications have been created within the organization before starting a new project.

Which Anypoint Platform component can the developer use to find and try out the currently released API specifications?

A.

Anypoint Exchange

B.

Runtime Manager

C.

API Manager

D.

Object Store

Full Access
Question # 36

An organization has various integrations implemented as Mule applications. Some of these Mule applications are deployed to custom hosted Mule runtimes (on-premises) while others execute in the MuleSoft-hosted runtime plane (CloudHub). To perform the Integra functionality, these Mule applications connect to various backend systems, with multiple applications typically needing to access the backend systems.

How can the organization most effectively avoid creating duplicates in each Mule application of the credentials required to access the backend systems?

A.

Create a Mule domain project that maintains the credentials as Mule domain-shared resources Deploy the Mule applications to the Mule domain, so the credentials are available to the Mule applications

B.

Store the credentials in properties files in a shared folder within the organization's data center Have the Mule applications load properties files from this shared location at startup

C.

Segregate the credentials for each backend system into environment-specific properties files Package these properties files in each Mule application, from where they are loaded at startup

D.

Configure or create a credentials service that returns the credentials for each backend system, and that is accessible from customer-hosted and MuleSoft-hosted Mule runtimes Have the Mule applications toad the properties at startup by invoking that credentials service

Full Access
Question # 37

What is an advantage of using OAuth 2.0 client credentials and access tokens over only API keys for API authentication?

A.

If the access token is compromised, the client credentials do not to be reissued.

B.

If the access token is compromised, I can be exchanged for an API key.

C.

If the client ID is compromised, it can be exchanged for an API key

D.

If the client secret is compromised, the client credentials do not have to be reissued.

Full Access
Question # 38

An API implementation is being developed to expose data from a production database via HTTP requests. The API implementation executes a database SELECT statement that is dynamically created based upon data received from each incoming HTTP request. The developers are planning to use various types of testing to make sure the Mule application works as expected, can handle specific workloads, and behaves correctly from an API consumer perspective. What type of testing would typically mock the results from each SELECT statement rather than actually execute it in the production database?

A.

Unit testing (white box)

B.

Integration testing

C.

Functional testing (black box)

D.

Performance testing

Full Access
Question # 39

An IT integration delivery team begins a project by gathering all of the requirements, and proceeds to execute the remaining project activities as sequential, non-repeating phases.

Which IT project delivery methodology is this team following?

A.

Kanban

B.

Scrum

C.

Waterfall

D.

Agile

Full Access
Question # 40

A company is modernizing its legal systems lo accelerate access lo applications and data while supporting the adoption of new technologies. The key to achieving this business goal is unlocking the companies' key systems and dala including microservices miming under Docker and kubernetes containers using apis.

Considering the current aggressive backlog and project delivery requirements the company wants to take a strategic approach in the first phase of its transformation projects by quickly deploying API's in mule runtime that are able lo scale, connect to on premises systems and migrate as needed.

Which runtime deployment option supports company's goals?

A.

Customer hosted self provisioned runtimes

B.

Cloudhub runtimes

C.

Runtime fabric on self managed Kubernetes

D.

Runtime fabric on Vmware metal

Full Access
Question # 41

To implement predictive maintenance on its machinery equipment, ACME Tractors has installed thousands of IoT sensors that will send data for each machinery asset as sequences of JMS messages, in near real-time, to a JMS queue named SENSOR_DATA on a JMS server. The Mule application contains a JMS Listener operation configured to receive incoming messages from the JMS servers SENSOR_DATA JMS queue. The Mule application persists each received JMS message, then sends a transformed version of the corresponding Mule event to the machinery equipment back-end systems.

The Mule application will be deployed to a multi-node, customer-hosted Mule runtime cluster. Under normal conditions, each JMS message should be processed exactly once.

How should the JMS Listener be configured to maximize performance and concurrent message processing of the JMS queue?

A.

Set numberOfConsumers = 1

Set primaryNodeOnly = false

B.

Set numberOfConsumers = 1

Set primaryNodeOnly = true

C.

Set numberOfConsumers to a value greater than one

Set primaryNodeOnly = true

D.

Set numberOfConsumers to a value greater than one

Set primaryNodeOnly = false

Full Access
Question # 42

What condition requires using a CloudHub Dedicated Load Balancer?

A.

When cross-region load balancing is required between separate deployments of the same Mule application

B.

When custom DNS names are required for API implementations deployed to customer-hosted Mule runtimes

C.

When API invocations across multiple CloudHub workers must be load balanced

D.

When server-side load-balanced TLS mutual authentication is required between API implementations and API clients

Full Access
Question # 43

A company wants its users to log in to Anypoint Platform using the company's own internal user credentials. To achieve this, the company needs to integrate an external identity provider (IdP) with the company's Anypoint Platform master organization, but SAML 2.0 CANNOT be used. Besides SAML 2.0, what single-sign-on standard can the company use to integrate the IdP with their Anypoint Platform master organization?

A.

SAML 1.0

B.

OAuth 2.0

C.

Basic Authentication

D.

OpenID Connect

Full Access
Question # 44

An organization has implemented the cluster with two customer hosted Mule runtimes is hosting an application.

This application has a flow with a JMS listener configured to consume messages from a queue destination. As an integration architect can you advise which JMS listener configuration must be used to receive messages in all the nodes of the cluster?

A.

Use the parameter primaryNodeOnly= "false" on the JMS listener

B.

Use the parameter primaryNodeOnly= "false" on the JMS listener with a shared subscription

C.

Use the parameter primaryNodeOnly= "true" on the JMS listener with a non­shared subscription

D.

Use the parameter primaryNodeOnly= "true" on the JMS listener

Full Access
Question # 45

An organization is successfully using API led connectivity, however, as the application network grows, all the manually performed tasks to publish share and discover, register, apply policies to, and deploy an API are becoming repetitive pictures driving the organization to automate this process using efficient CI/'CD pipeline. Considering Anypoint platforms capabilities how should the organization approach automating is API lifecycle?

A.

Use runtime manager rest apis for API management and mavenforAPI deployment

B.

Use Maven with a custom configuration required for the API lifecycle

C.

Use Anypoint CLI or Anypoint Platform REST apis with scripting language such as groovy

D.

Use Exchange rest api's for API management and MavenforAPI deployment

Full Access
Question # 46

A Mule application is synchronizing customer data between two different database systems.

What is the main benefit of using XA transaction over local transactions to synchronize these two database system?

A.

Reduce latency

B.

Increase throughput

C.

Simplifies communincation

D.

Ensure consistency

Full Access
Question # 47

A mule application designed to fulfil two requirements

a) Processing files are synchronously from an FTPS server to a back-end database using VM intermediary queues for load balancing VM events

b) Processing a medium rate of records from a source to a target system using batch job scope

Considering the processing reliability requirements for FTPS files, how should VM queues be configured for processing files as well as for the batch job scope if the application is deployed to Cloudhub workers?

A.

Use Cloud hub persistent queues for FTPS files processing

There is no need to configure VM queues for the batch jobs scope as it uses by default the worker's disc for VM queueing

B.

Use Cloud hub persistent VM queue for FTPS file processing

There is no need to configure VM queues for the batch jobs scope as it uses by default the worker's JVM memory for VM queueing

C.

Use Cloud hub persistent VM queues for FTPS file processing

Disable VM queue for the batch job scope

D.

Use VM connector persistent queues for FTPS file processing Disable VM queue for the batch job scope

Full Access
Question # 48

A DevOps team has adequate observability of individual system behavior and performance, but it struggles to track the entire lifecycle of each request across different microservices.

Which additional observability approach should this team consider adopting?

A.

Analytics

B.

Metrics

C.

Tracing

D.

Data mining

Full Access
Question # 49

A payment processing company has implemented a Payment Processing API Mule application to process credit card and debit card transactions, Because the Payment Processing API handles highly sensitive information, the payment processing company requires that data must be encrypted both In-transit and at-rest.

To meet these security requirements, consumers of the Payment Processing API must create request message payloads in a JSON format specified by the API, and the message payload values must be encrypted.

How can the Payment Processing API validate requests received from API consumers?

A.

A Transport Layer Security (TLS) - Inbound policy can be applied in API Manager to decrypt the message payload and the Mule application implementation can then use

the JSON Validation module to validate the JSON data

B.

The Mule application implementation can use the APIkit module to decrypt and then validate the JSON data

C.

The Mule application implementation can use the Validation module to decrypt and then validate the JSON data

D.

The Mule application implementation can use DataWeave to decrypt the message payload and then use the JSON Scheme Validation module to validate the JSON data

Full Access
Question # 50

When a Mule application using VM queues is deployed to a customer-hosted cluster or multiple CloudHub v1.0 workers/replicas, how are messages consumed across the nodes?

A.

Sequentially, from a dedicated Anypoint MQ queue

B.

Sequentially, only from the primary node

C.

In a non-deterministic way

D.

Round-robin, within an XA transaction

Full Access
Question # 51

An API implementation is being designed that must invoke an Order API which is known to repeatedly experience downtime. For this reason a fallback API is to be called when the Order API is unavailable. What approach to designing invocation of the fallback API provides the best resilience?

A.

Redirect client requests through an HTTP 303 temporary redirect status code to the fallback API whenever the Order API is unavailable

B.

Set an option in the HTTP Requester component that invokes the order API to instead invoke a fallback API whenever an HTTP 4XX or 5XX response status code is received from Order API

C.

Create a separate entry for the order API in API manager and then invoke this API as a fallback API if the primary Order API is unavailable

D.

Search Anypoint Exchange for a suitable existing fallback API and them implement invocations to their fallback API in addition to the Order API

Full Access
Question # 52

What Is a recommended practice when designing an integration Mule 4 application that reads a large XML payload as a stream?

A.

The payload should be dealt with as a repeatable XML stream, which must only be traversed (iterated-over) once and CANNOT be accessed randomly from DataWeave expressions and scripts

B.

The payload should be dealt with as an XML stream, without converting it to a single Java object (POJO)

C.

The payload size should NOT exceed the maximum available heap memory of the Mute runtime on which the Mule application executes

D.

The payload must be cached using a Cache scope If It Is to be sent to multiple backend systems

Full Access
Question # 53

In preparation for a digital transformation initiative, an organization is reviewing related IT integration projects that failed for various for reason.

According to MuleSoft’s surveys of global IT leaders, what is a common cause of IT project failure that this organization may likely discover in its assessment?

A.

Following an Agile delivery methodology

B.

Reliance on an Integration-Platform-as-a-Service (iPaaS)

C.

Spending too much time on enablement

D.

Lack of alignment around business outcomes

Full Access
Question # 54

A Mule application is deployed to a cluster of two(2) cusomter-hosted Mule runtimes. Currently the node name Alice is the primary node and node named bob is the secondary node. The mule application has a flow that polls a directory on a file system for new files.

The primary node Alice fails for an hour and then restarted.

After the Alice node completely restarts, from what node are the files polled, and what node is now the primary node for the cluster?

A.

Files are polled from Alice node

Alice is now the primary node

B.

Files are polled form Bob node

Alice is now the primary node

C.

Files are polled from Alice node

Bob is the now the primary node

D.

Files are polled form Bob node

Bob is now the primary node

Full Access
Question # 55

Refer to the exhibit.

A Mule application is being designed to be deployed to several CIoudHub workers. The Mule application's integration logic is to replicate changed Accounts from Satesforce to a backend system every 5 minutes.

A watermark will be used to only retrieve those Satesforce Accounts that have been modified since the last time the integration logic ran.

What is the most appropriate way to implement persistence for the watermark in order to support the required data replication integration logic?

A.

Persistent Anypoint MQ Queue

B.

Persistent Object Store

C.

Persistent Cache Scope

D.

Persistent VM Queue

Full Access
Question # 56

A REST API is being designed to implement a Mule application.

What standard interface definition language can be used to define REST APIs?

A.

Web Service Definition Language(WSDL)

B.

OpenAPI Specification (OAS)

C.

YAML

D.

AsyncAPI Specification

Full Access
Question # 57

A manufacturing company is planning to deploy Mule applications to its own Azure Kubernetes Service infrastructure.

The organization wants to make the Mule applications more available and robust by deploying each Mule application to an isolated Mule runtime in a Docker container while managing all the Mule applications from the MuleSoft-hosted control plane.

What is the most idiomatic (used for its intended purpose) choice of runtime plane to meet these organizational requirements?

A.

Anypoint Platform Private Cloud Edition

B.

Anypoint Runtime Fabric

C.

CloudHub

D.

Anypoint Service Mesh

Full Access
Question # 58

What is the MuleSoft-recommended best practice to share the connector and configuration information among the APIs?

A.

Build a Mule domain project, add the Database connector and configuration to it, and reference this one domain project from each System API

B.

Build a separate Mule domain project for each API, and configure each of them to use a file on a shared file store to load the configuration information dynamically

C.

Build another System API that connects to the database, and refactor all the other APIs to make requests through the new System API to access the database

D.

Create an API proxy for each System API and share the Database connector configuration with all the API proxies via an automated policy

Full Access
Question # 59

A Mule application is being designed for deployment to a single CloudHub worker. The Mule application will have a flow that connects to a SaaS system to perform some operations each time the flow is invoked.

The SaaS system connector has operations that can be configured to request a short-lived token (fifteen minutes) that can be reused for subsequent connections within the fifteen minute time window. After the token expires, a new token must be requested and stored.

What is the most performant and idiomatic (used for its intended purpose) Anypoint Platform component or service to use to support persisting and reusing tokens in the Mule application to help speed up reconnecting the Mule application to the SaaS application?

A.

Nonpersistent object store

B.

Persistent object store

C.

Variable

D.

Database

Full Access
Question # 60

A large life sciences customer plans to use the Mule Tracing module with the Mapped Diagnostic Context (MDC) logging operations to enrich logging in its Mule application and to improve tracking by providing more context in the Mule application logs. The customer also wants to improve throughput and lower the message processing latency in its Mule application flows.

After installing the Mule Tracing module in the Mule application, how should logging be performed in flows in Mule applications, and what should be changed In the log4j2.xml files?

A.

In the flows, add Mule Tracing module Set logging variable operations before any Core Logger components.

In log4j2.xml files, change the appender's pattern layout to use %MDC and then assign the appender to a Logger or Root element.

B.

In the flows, add Mule Tracing module Set logging variable operations before any Core

Logger components.

In log4j2.xmI files, change the appender’s pattern layout to use the %MDC placeholder and then assign the appender to an AsyncLogger element.

C.

In the flows, add Mule Tracing module Set logging variable operations before any Core

Logger components.

In log4j2.xmI files, change the appender’'s pattern layout to use %asyncLogger placeholder and then assign the appender to an AsyncLogger element.

D.

In the flows, wrap Logger components in Async scopes. In log4j2.xmI files, change the appender's pattern layout to use the %asyncLogger

placeholder and then assign the appender to a Logger or Root element.

Full Access
Question # 61

A leading eCommerce giant will use MuleSoft APIs on Runtime Fabric (RTF) to process customer orders. Some customer-sensitive information, such as credit card information, is required in request payloads or is included in response payloads in some of the APIs. Other API requests and responses are not authorized to access some of this customer-sensitive information but have been implemented to validate and transform based on the structure and format of this customer-sensitive information (such as account IDs, phone numbers, and postal codes).

What approach configures an API gateway to hide sensitive data exchanged between API consumers and API implementations, but can convert tokenized fields back to their original value for other API requests or responses, without having to recode the API implementations?

Later, the project team requires all API specifications to be augmented with an additional non-functional requirement (NFR) to protect the backend services from a high rate of requests, according to defined service-level

agreements (SLAs). The NFR's SLAs are based on a new tiered subscription level "Gold", "Silver", or "Platinum" that must be tied to a new parameter that is being added to the Accounts object in their enterprise data model.

Following MuleSoft's recommended best practices, how should the project team now convey the necessary non-functional requirement to stakeholders?

A.

Create and deploy API proxies in API Manager for the NFR, change the baseurl in each

API specification to the corresponding API proxy implementation endpoint, and publish each modified API specification to Exchange

B.

Update each API specification with comments about the NFR's SLAs and publish each modified API specification to Exchange

C.

Update each API specification with a shared RAML fragment required to implement the NFR and publish the RAML fragment and each modified API specification to Exchange

D.

Create a shared RAML fragment required to implement the NFR, list each API implementation endpoint in the RAML fragment, and publish the RAML fragment to Exchange

Full Access
Question # 62

An organization is evaluating using the CloudHub shared Load Balancer (SLB) vs creating a CloudHub dedicated load balancer (DLB). They are evaluating how this choice affects the various types of certificates used by CloudHub deplpoyed Mule applications, including MuleSoft-provided, customer-provided, or Mule application-provided certificates.

What type of restrictions exist on the types of certificates that can be exposed by the CloudHub Shared Load Balancer (SLB) to external web clients over the public internet?

A.

Only MuleSoft-provided certificates are exposed.

B.

Only customer-provided wildcard certificates are exposed.

C.

Only customer-provided self-signed certificates are exposed.

D.

Only underlying Mule application certificates are exposed (pass-through)

Full Access
Question # 63

An organization has deployed both Mule and non-Mule API implementations to integrate its customer and order management systems. All the APIs are available to REST clients on the public internet.

The organization wants to monitor these APIs by running health checks: for example, to determine if an API can properly accept and process requests. The organization does not have subscriptions to any external monitoring tools and also does not want to extend its IT footprint.

What Anypoint Platform feature provides the most idiomatic (used for its intended purpose) way to monitor the availability of both the Mule and the non-Mule API implementations?

A.

API Functional Monitoring

B.

Runtime Manager

C.

API Manager

D.

Anypoint Visualizer

Full Access
Question # 64

What approach configures an API gateway to hide sensitive data exchanged between API consumers and API implementations, but can convert tokenized fields back to their original value for other API requests or responses, without having to recode the API implementations?

A.

Create both masking and tokenization formats and use both to apply a tokenization policy in an API gateway to mask sensitive values in message payloads withcharacters, and apply a corresponding detokenization policy to return the original

values to other APIs

B.

Create a masking format and use it to apply a tokenization policy in an API gateway to mask sensitive values in message payloads with characters, and apply a corresponding detokenization policy to return the original values to other APIs

C.

Use a field-level encryption policy in an API gateway to replace sensitive fields in message payload with encrypted values, and apply a corresponding field-level

decryption policy to return the original values to other APIs

D.

Create a tokenization format and use it to apply a tokenization policy in an API gateway to replace sensitive fields in message payload with similarly formatted

tokenized values, and apply a corresponding detokenization policy to return the original values to other APIs

Full Access
Question # 65

An Order microservice and a Fulfillment microservice are being designed to communicate with their dients through message-based integration (and NOT through API invocations).

The Order microservice publishes an Order message (a kind of command message) containing the details of an order to be fulfilled. The intention is that Order messages are only consumed by one Mute application, the Fulfillment microservice.

The Fulfilment microservice consumes Order messages, fulfills the order described therein, and then publishes an OrderFulfilted message (a kind of event message). Each OrderFulfilted message can be consumed by any interested Mule application, and the Order microservice is one such Mute application.

What is the most appropriate choice of message broker(s) and message destination(s) in this scenario?

A.

Order messages are sent to an Anypoint MQ exchange OrderFulfilled messages are sent to an Anypoint MQ queue Both microservices interact with Anypoint MQ as the message broker, which must therefore scale to support the load of both microservices

B.

Order messages are sent to a JMS queue. OrderFulfilled messages are sent to a JMS topic Both microservices interact with the same JMS provider (message broker) instance, which must therefore scale to support the load of both microservices

C.

Order messages are sent directly to the Fulfillment microservices. OrderFulfilled messages are sent directly to the Order microservice The Order microservice interacts with one AMQP-compatible message broker and the Fulfillment microservice interacts with a different AMQP-compatible message broker, so that both message brokers can be chosen and scaled to best support the load of each microservice

D.

Order messages are sent to a JMS queue. OrderFulfilled messages are sent to a JMS topic The Order microservice interacts with one JMS provider (message broker) and the Fulfillment microservice interacts with a different JMS provider, so that both message brokers can be chosen and scaled to best support the load of each microservice

Full Access
Question # 66

According to MuleSoft, a synchronous invocation of a RESTful API using HTTP to get an individual customer record from a single system is an example of which system integration interaction pattern?

A.

Request-Reply

B.

Multicast

C.

Batch

D.

One-way

Full Access
Question # 67

An organization is creating a set of new services that are critical for their business. The project team prefers using REST for all services but is willing to use SOAP with common WS-" standards if a particular service requires it.

What requirement would drive the team to use SOAP/WS-* for a particular service?

A.

Must use XML payloads for the service and ensure that it adheres to a specific schema

B.

Must publish and share the service specification (including data formats) with the consumers of the service

C.

Must support message acknowledgement and retry as part of the protocol

D.

Must secure the service, requiring all consumers to submit a valid SAML token

Full Access
Question # 68

A Mule application is being designed to do the following:

Step 1: Read a SalesOrder message from a JMS queue, where each SalesOrder consists of a header and a list of SalesOrderLineltems.

Step 2: Insert the SalesOrder header and each SalesOrderLineltem into different tables in an RDBMS.

Step 3: Insert the SalesOrder header and the sum of the prices of all its SalesOrderLineltems into a table In a different RDBMS.

No SalesOrder message can be lost and the consistency of all SalesOrder-related information in both RDBMSs must be ensured at all times.

What design choice (including choice of transactions) and order of steps addresses these requirements?

A.

1) Read the JMS message (NOT in an XA transaction)

2) Perform BOTH DB inserts in ONE DB transaction

3) Acknowledge the JMS message

B.

1) Read the JMS message (NOT in an XA transaction)

2) Perform EACH DB insert in a SEPARATE DB transaction

3) Acknowledge the JMS message

C.

1) Read the JMS message in an XA transaction

2) In the SAME XA transaction, perform BOTH DB inserts but do NOT acknowledge the JMS message

D.

1) Read and acknowledge the JMS message (NOT in an XA transaction)

2) In a NEW XA transaction, perform BOTH DB inserts

Full Access
Question # 69

An organization heeds to procure an enterprise software system to increase cross-selling opportunities and better rack prospect data.

Which category of enterprise software has these core capabilities, when used for its typical and intended purpose?

A.

Supply Chain Management (SCM)

B.

IT Service Management (ITSM)

C.

Business-to-Business (A2B)

D.

Customer Relationship Management (CRM)

Full Access
Question # 70

The retrieveBalances flow in the Mule application is designed to use an operation in a connector to the Finance system (the Finance operation) that

can only look up one account record at a time, and a operation from a different connector to the Audit system (the Audit operation) that can only

insert one account record at a time.

To best meet the performance-related requirements, what scope or scopes should be used and how should they be used to incorporate the Finance

operation and Audit operation into the retrieveBalances flow?

A.

Wrap the Finance operation in a Parallel For-Each scope. Wrap the Audit operation in a Async scope.

B.

Wrap the Finance operation in a Until-Successful scope. Wrap the Audit operation in a Try-Catch scope.

C.

Wrap both connector operations in a Async scope.

D.

Wrap both connector operations in a For-Each scope.

Full Access
Question # 71

Refer to the exhibit.

An organization uses a 2-node Mute runtime cluster to host one stateless API implementation. The API is accessed over HTTPS through a load balancer that uses round-robin for load distribution.

Two additional nodes have been added to the cluster and the load balancer has been configured to recognize the new nodes with no other change to the load balancer.

What average performance change is guaranteed to happen, assuming all cluster nodes are fully operational?

A.

50% reduction in the response time of the API

B.

100% increase in the throughput of the API

C.

50% reduction In the JVM heap memory consumed by each node

D.

50% reduction In the number of requests being received by each node

Full Access
Question # 72

An organization’s IT team must secure all of the internal APIs within an integration solution by using an API proxy to apply required authentication and authorization policies.

Which integration technology, when used for its intended purpose, should the team choose to meet these requirements if all other relevant factors are equal?

A.

API Management (APIM)

B.

Robotic Process Automation (RPA)

C.

Electronic Data Interchange (EDI)

D.

Integration Platform-as-a-service (PaaS)

Full Access
Question # 73

What is maximum vCores can be allocated to application deployed to CloudHub?

A.

1 vCores

B.

2 vCores

C.

4 vCores

D.

16 vCores

Full Access
Question # 74

How are the API implementation , API client, and API consumer combined to invoke and process an API ?

A.

The API consumer creates an API implementation , which receives API invocations from an API such that they are processed for an API client

B.

The API consumer creates an API client which sends API invocations to an API such that they are processed by an API implementation

C.

An API client creates an API consumer, which receives API invocation from an API such that they are processed for an API implementation

D.

The API client creates an API consumer which sends API invocations to an API such that they are processed by API implementation

Full Access
Question # 75

An insurance company is implementing a MuleSoft API to get inventory details from the two vendors. Due to network issues, the invocations to vendor applications are getting timed-out intermittently. But the transactions are successful upon reprocessing

What is the most performant way of implementing this requirement?

A.

Implement a scatter-gather scope to invoke the two vendor

applications on two different route

Use the Until-Successful scope to implement the retry mechanism

for timeout errors on each route

B.

Implement a Choice scope to invoke the two vendor applications on two different route

Use the try-catch scope to implement the retry mechanism for timeout errors on each route

C.

Implement a For-Each scope to invoke the two vendor applications

Use until successful scope to implement the retry mechanism for the timeout errors

D.

Implement Round-Robin scope to invoke the two vendor applications on two different routes

Use the Try-Catch scope to implement retry mechanism for timeout errors on each route

Full Access
Question # 76

A stock broking company makes use of CloudHub VPC to deploy Mule applications. Mule application needs to connect to a database application in the customers on-premises corporate data center and also to a Kafka cluster running in AWS VPC.

How is access enabled for the API to connect to the database application and Kafka cluster securely?

A.

Set up a transit gateway to the customers on-premises corporate datacenter to AWS VPC

B.

Setup AnyPoint VPN to the customer's on-premise corporate data

center and VPC peering with AWS VPC

C.

Setup VPC peering with AWS VPC and the customers devices corporate data center

D.

Setup VPC peering with the customers onto my service corporate data center and Anypoint VPN to AWS VPC

Full Access
Question # 77

A company is designing an integration Mule application to process orders by submitting them to a back-end system for offline processing. Each order will be received by the Mule application through an HTTP5 POST and must be acknowledged immediately.

Once acknowledged the order will be submitted to a back-end system. Orders that cannot be successfully submitted due to the rejections from the back-end system will need to be processed manually (outside the banking system).

The mule application will be deployed to a customer hosted runtime and will be able to use an existing ActiveMQ broker if needed. The ActiveMQ broker is located inside the organization's firewall. The back-end system has a track record of unreliability due to both minor network connectivity issues and longer outages.

Which combination of Mule application components and ActiveMQ queues are required to ensure automatic submission of orders to the back-end system while supporting but minimizing manual order processing?

A.

One or more On Error scopes to assist calling the back-end system An Untill successful scope containing VM components for long retries A persistent dead-letter VM queue configure in Cloud hub

B.

An Until Successful scope to call the back-end system One or more ActiveMQ long-retry queues One or more ActiveMQ dead-letter queues for manual processing

C.

One or more on-Error scopes to assist calling the back-end system one or more ActiveMQ long-retry queues A persistent dead-letter Object store configuration in the CloudHub object store service

D.

A batch job scope to call the back in system An Untill successful scope containing Object Store components for long retries. A dead-letter object store configured in the Mule application

Full Access
Question # 78

A project team uses RAML specifications to document API functional requirements and deliver API definitions. As per the current legal requirement, all designed API definitions to be augmented with an additional non-functional requirement to protect the services from a high rate of requests according to define service level agreements.

Assuming that the project is following Mulesoft API governance and policies, how should the project team convey the necessary non-functional requirement to stakeholders?

A.

Create proxies in API manager for the non functional requirement and publish to exchange

B.

Add all non functional requirements as comments to RAML specification and publish to exchange

C.

Create various SLA's in API manager for the non functional requirement and publish to exchange

D.

Update API definitions with the fragment for the appropriate policy and publish to exchange

Full Access
Question # 79

An organization is building out a test suite for their application using MUnit.

The Integration Architect has recommended using Test Recorder in Anypoint Studio to record the processing flows and then configure unit tests based on the captured events.

What Is a core consideration that must be kept In mind while using Test Recorder?

A.

The Recorder supports loops where the structure of the data being tested changes inside the Iteration

B.

Mocking values resulting from parallel processes are possible and will not affect theexecution of the processors that follow in the test

C.

The Recorder supports mocking a message before or inside a Foreach processor

D.

Tests for flows cannot be created if Mule errors are raised Inside the flows, even if the errors are handled by On-Error Continue error handlers

Full Access