Winter Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Salesforce MuleSoft-Integration-Architect-I Salesforce Certified MuleSoft Integration Architect 1 (SU24) Exam Exam Practice Test

Page: 1 / 27
Total 270 questions

Salesforce Certified MuleSoft Integration Architect 1 (SU24) Exam Questions and Answers

Question 1

A mule application is required to periodically process large data set from a back-end database to Salesforce CRM using batch job scope configured properly process the higher rate of records.

The application is deployed to two cloudhub workers with no persistence queues enabled.

What is the consequence if the worker crashes during records processing?

Options:

A.

Remaining records will be processed by a new replacement worker

B.

Remaining records be processed by second worker

C.

Remaining records will be left and processed

D.

All the records will be processed from scratch by the second worker leading to duplicate processing

Question 2

A high-volume eCommerce retailer receives thousands of orders per hour and requires notification of its order management, warehouse, and billing system for subsequent processing within 15 minutes of order submission through its website.

Which integration technology, when used for its typical and intended purpose, meets the retailer’s requirements for this use case?

Options:

A.

Managed File Transfer (MFT)

B.

Publish/Subscriber Messaging Bus (Pub/Sub)

C.

Enterprise Data Warehouse (EDW)

D.

Extract Transform Load (ETL)

Question 3

In Anypoint Platform, a company wants to configure multiple identity providers (IdPs) for multiple lines of business (LOBs). Multiple business groups, teams, and environments have been defined for these LOBs.

What Anypoint Platform feature can use multiple IdPs across the company’s business groups, teams, and environments?

Options:

A.

MuleSoft-hosted (CloudHub) dedicated load balancers

B.

Client (application) management

C.

Virtual private clouds

D.

Permissions

Question 4

An organization’s IT team must secure all of the internal APIs within an integration solution by using an API proxy to apply required authentication and authorization policies.

Which integration technology, when used for its intended purpose, should the team choose to meet these requirements if all other relevant factors are equal?

Options:

A.

API Management (APIM)

B.

Robotic Process Automation (RPA)

C.

Electronic Data Interchange (EDI)

D.

Integration Platform-as-a-service (PaaS)

Question 5

A retail company is implementing a MuleSoft API to get inventory details from two vendors by Invoking each vendor's online applications. Due to network issues, the invocations to the vendor applications are timing out intermittently, but the requests are successful after re-invoking each

vendor application.

What is the most performant way of implementing the API to invoke each vendor application and to retry invocations that generate timeout errors?

Options:

A.

Use a For-Each scope to invoke the two vendor applications in series, one after the other.

Place the For-Each scope inside an Until-Successful scope to retry requests that raise timeout errors.

B.

Use a Choice scope to Invoke each vendor application on a separate route.

Place the Choice scope inside an Until-Successful scope to retry requests that raise

timeout errors.

C.

Use a Scatter-Gather scope to invoke each vendor application on a separate route.

Use an Until-Successful scope in each route to retry requests that raise timeout errors.

D.

Use a Round-Robin scope to invoke each vendor application on a separate route.

Use a Try-Catch scope in each route to retry requests that raise timeout errors.

Question 6

A company is designing a mule application to consume batch data from a partner's ftps server The data files have been compressed and then digitally signed using PGP.

What inputs are required for the application to securely consumed these files?

Options:

A.

ATLS context Key Store requiring the private key and certificate for the company

PGP public key of partner

PGP private key for the company

B.

ATLS context first store containing a public certificate for partner ftps server and the PGP public key of the partner

TLS contact Key Store containing the FTP credentials

C.

TLS context trust or containing a public certificate for the ftps server The FTP username and password The PGP public key of the partner

D.

The PGP public key of the partner

The PGP private key for the company

The FTP username and password

Question 7

A manufacturing company is developing a new set of APIs for its retail business. One of the APIs is a Master Look Up API, which is a System API,

The API uses a persistent object-store. This API will be used by almost all other APIs to provide master lookup data.

The Master Look Up API is deployed on two CloudHub workers of 0.1 vCore each because there is a lot of master data to be cached. Most of the master

lookup data is stored as a key-value pair. The cache gets refreshed if the key is not found in the cache.

During performance testing, it was determined that the Master Look Up API has a high response time due to the latency of database queries executed to fetch the master lookup data.

What two methods can be used to resolve these performance issues?

Question # 7

Choose 2 answers

Options:

A.

Implement the HTTP caching policy for all GET endpoints for the Master Look Up API

B.

Implement an HTTP caching policy for all GET endpoints in the Master Look Up API

C.

Implement locking to synchronize access to the Object Store

D.

Upgrade the vCore size from 0.1 vCore to 0.2 vCore

Question 8

An organization's security policies mandate complete control of the login credentials used to log in to Anypoint Platform. What feature of Anypoint Platform should be used to meet this requirement?

Options:

A.

Enterprise Security Module

B.

Client ID Secret

C.

Federated Identity Management

D.

Federated Client Management

Question 9

As an enterprise architect, what are the two reasons for which you would use a canonical data model in the new integration project using Mulesoft Anypoint platform ( choose two answers )

Options:

A.

To have consistent data structure aligned in processes

B.

To isolate areas within a bounded context

C.

To incorporate industry standard data formats

D.

There are multiple canonical definitions of each data type

E.

Because the model isolates the back and systems and support mule applications from change

Question 10

An insurance company is using a CIoudHub runtime plane. As a part of requirement, email alert should

be sent to internal operations team every time of policy applied to an API instance is deleted As an integration architect suggest on how this requirement be met?

Options:

A.

Use audit logs in Anypoint platform to detect a policy deletion and configure the Audit logs alert feature to send an email to the operations team

B.

Use Anypoint monitoring to configure an alert that sends an email to the operations team every time a policy is deleted in API manager

C.

Create a custom connector to be triggered every time of policy is deleted in API manager

D.

Implement a new application that uses the Audit log REST API to

detect the policy deletion and send an email to operations team the SMTP connector

Question 11

A Mule application contains a Batch Job with two Batch Steps (Batch_Step_l and Batch_Step_2). A payload with 1000 records is received by the Batch Job.

How many threads are used by the Batch Job to process records, and how does each Batch Step process records within the Batch Job?

Options:

A.

Each Batch Job uses SEVERAL THREADS for the Batch Steps Each Batch Step instance receives ONE record at a time as the payload, and RECORDS are processed IN PARALLEL within and between the two Batch Steps

B.

Each Batch Job uses a SINGLE THREAD for all Batch steps Each Batch step instance receives ONE record at a time as the payload, and RECORDS are processed IN ORDER, first through Batch_Step_l and then through Batch_Step_2

C.

Each Batch Job uses a SINGLE THREAD to process a configured block size of record Each Batch Step instance receives A BLOCK OF records as the payload, and BLOCKS of records are processed IN ORDER

D.

Each Batch Job uses SEVERAL THREADS for the Batch Steps Each Batch Step instance receives ONE record at a time as the payload, and BATCH STEP INSTANCES execute IN PARALLEL to process records and Batch Steps in ANY order as fast as possible

Question 12

Which Anypoint Platform component should a MuleSoft developer use to create an API specification prior to building the API implementation?

Options:

A.

MUnit

B.

API Designer

C.

API Manager

D.

Runtime Manager

Question 13

A marketing organization is designing a Mule application to process campaign data. The Mule application will periodically check for a file in a SFTP location and process the records in the file. The size of the file can vary from 10MB to 5GB. Due to the limited availabiltty of vCores, the Mule application is deployed to a single CloudHub worker configured with vCore size 0.2.

The application must transform and send different formats of this file to three different downstream SFTP locations.

What is the most idiomatic (used for its intended purpose) and performant way to configure the SFTP operations or event sources to process the large files to support these deployment requirements?

Options:

A.

Use an in-memory repeatable stream

B.

Use a file-stored non-repeatable stream

C.

Use an in-memory non-repeatable stream

D.

Use a file-stored repeatable stream

Question 14

A Mule application is synchronizing customer data between two different database systems.

What is the main benefit of using eXtended Architecture (XA) transactions over local transactions to synchronize these two different database systems?

Options:

A.

An XA transaction synchronizes the database systems with the least amount of Mule configuration or coding

B.

An XA transaction handles the largest number of requests in the shortest time

C.

An XA transaction automatically rolls back operations against both database systems if any operation falls

D.

An XA transaction writes to both database systems as fast as possible

Question 15

A system administrator needs to determine when permissions were last changed for an Anypoint Platform user.

Which Anypoint Platform component should the administrator use to obtain this information?

Options:

A.

Audit Logging

B.

Anypoint Monitoring

C.

Anypiont Studio

D.

Mule Stack Traces

Question 16

According to MuleSoft, which system integration term describes the method, format, and protocol used for communication between two system?

Options:

A.

Component

B.

interaction

C.

Message

D.

Interface

Question 17

Customer has deployed mule applications to different customer hosted mule run times. Mule applications are managed from Anypoint platform.

What needs to be configured to monitor these Mule applications from Anypoint monitoring and what sends monitoring data to Anypoint monitoring?

Options:

A.

Enable monitoring of individual applications from runtime manager application settings

Runtime manager agent sends monitoring data from the mule applications to Anypoint monitoring

B.

Install runtime manager agent on each mule runtime

Runtime manager agent since monitoring data from the mule applications to Anypoint monitoring

C.

Anypoint monitoring agent on each mule runtime

Anypoint monitoring agent sends monitoring data from the mule applications to Anypoint monitoring

D.

By default, Anypoint monitoring agent will be installed on each Mule run time

Anypoint Monitoring agent automatically sends monitoring data from the Mule applications to Anypoint monitoring

Question 18

Mule application A receives a request Anypoint MQ message REQU with a payload containing a variable-length list of request objects. Application A uses the For Each scope to split the list into individual objects and sends each object as a message to an Anypoint MQ queue.

Service S listens on that queue, processes each message independently of all other messages, and sends a response message to a response queue.

Application A listens on that response queue and must in turn create and publish a response Anypoint MQ message RESP with a payload containing the list of responses sent by service S in the same order as the request objects originally sent in REQU.

Assume successful response messages are returned by service S for all request messages.

What is required so that application A can ensure that the length and order of the list of objects in RESP and REQU match, while at the same time maximizing message throughput?

Options:

A.

Use a Scatter-Gather within the For Each scope to ensure response message order Configure the Scatter-Gather with a persistent object store

B.

Perform all communication involving service S synchronously from within the For Each scope, so objects in RESP are in the exact same order as request objects in REQU

C.

Use an Async scope within the For Each scope and collect response messages in a second For Each scope in the order In which they arrive, then send RESP using this list of responses

D.

Keep track of the list length and all object indices in REQU, both in the For Each scope and in all communication involving service Use persistent storage when creating RESP

Question 19

A company is modernizing its legal systems lo accelerate access lo applications and data while supporting the adoption of new technologies. The key to achieving this business goal is unlocking the companies' key systems and dala including microservices miming under Docker and kubernetes containers using apis.

Considering the current aggressive backlog and project delivery requirements the company wants to take a strategic approach in the first phase of its transformation projects by quickly deploying API's in mule runtime that are able lo scale, connect to on premises systems and migrate as needed.

Which runtime deployment option supports company's goals?

Options:

A.

Customer hosted self provisioned runtimes

B.

Cloudhub runtimes

C.

Runtime fabric on self managed Kubernetes

D.

Runtime fabric on Vmware metal

Question 20

A leading eCommerce giant will use MuleSoft APIs on Runtime Fabric (RTF) to process customer orders. Some customer-sensitive information, such as credit card information, is required in request payloads or is included in response payloads in some of the APIs. Other API requests and responses are not authorized to access some of this customer-sensitive information but have been implemented to validate and transform based on the structure and format of this customer-sensitive information (such as account IDs, phone numbers, and postal codes).

What approach configures an API gateway to hide sensitive data exchanged between API consumers and API implementations, but can convert tokenized fields back to their original value for other API requests or responses, without having to recode the API implementations?

Later, the project team requires all API specifications to be augmented with an additional non-functional requirement (NFR) to protect the backend services from a high rate of requests, according to defined service-level

agreements (SLAs). The NFR's SLAs are based on a new tiered subscription level "Gold", "Silver", or "Platinum" that must be tied to a new parameter that is being added to the Accounts object in their enterprise data model.

Following MuleSoft's recommended best practices, how should the project team now convey the necessary non-functional requirement to stakeholders?

Options:

A.

Create and deploy API proxies in API Manager for the NFR, change the baseurl in each

API specification to the corresponding API proxy implementation endpoint, and publish each modified API specification to Exchange

B.

Update each API specification with comments about the NFR's SLAs and publish each modified API specification to Exchange

C.

Update each API specification with a shared RAML fragment required to implement the NFR and publish the RAML fragment and each modified API specification to Exchange

D.

Create a shared RAML fragment required to implement the NFR, list each API implementation endpoint in the RAML fragment, and publish the RAML fragment to Exchange

Question 21

A developer is examining the responses from a RESTful web service that is compliant with the Mypertext Transfer Protocol (HTTP/1.1) a8 defined by the Internet Engineering Task Force (IETF).

In this HTTP/1.1-compliant web service, which class of HTTP response status codes should be specified to indicate when client requests are successfully received, understood, and accepted by the web service?

Options:

A.

3xx

B.

2xx

C.

4xx

D.

5xx

Question 22

A large life sciences customer plans to use the Mule Tracing module with the Mapped Diagnostic Context (MDC) logging operations to enrich logging in its Mule application and to improve tracking by providing more context in the Mule application logs. The customer also wants to improve throughput and lower the message processing latency in its Mule application flows.

After installing the Mule Tracing module in the Mule application, how should logging be performed in flows in Mule applications, and what should be changed In the log4j2.xml files?

Options:

A.

In the flows, add Mule Tracing module Set logging variable operations before any Core Logger components.

In log4j2.xml files, change the appender's pattern layout to use %MDC and then assign the appender to a Logger or Root element.

B.

In the flows, add Mule Tracing module Set logging variable operations before any Core

Logger components.

In log4j2.xmI files, change the appender’s pattern layout to use the %MDC placeholder and then assign the appender to an AsyncLogger element.

C.

In the flows, add Mule Tracing module Set logging variable operations before any Core

Logger components.

In log4j2.xmI files, change the appender’'s pattern layout to use %asyncLogger placeholder and then assign the appender to an AsyncLogger element.

D.

In the flows, wrap Logger components in Async scopes. In log4j2.xmI files, change the appender's pattern layout to use the %asyncLogger

placeholder and then assign the appender to a Logger or Root element.

Question 23

According to MuleSoft’s recommended REST conventions, which HTTP method should an API use to specify how AP\ clients can request data from a specified resource?

Options:

A.

POST

B.

PUT

C.

PATCH

D.

GET

Question 24

An organization has deployed both Mule and non-Mule API implementations to integrate its customer and order management systems. All the APIs are available to REST clients on the public internet.

The organization wants to monitor these APIs by running health checks: for example, to determine if an API can properly accept and process requests. The organization does not have subscriptions to any external monitoring tools and also does not want to extend its IT footprint.

What Anypoint Platform feature provides the most idiomatic (used for its intended purpose) way to monitor the availability of both the Mule and the non-Mule API implementations?

Options:

A.

API Functional Monitoring

B.

Runtime Manager

C.

API Manager

D.

Anypoint Visualizer

Question 25

The AnyAirline organization's passenger reservations center is designing an integration solution that combines invocations of three different System APIs (bookFlight, bookHotel, and bookCar) in a business transaction. Each System API makes calls to a single database.

The entire business transaction must be rolled back when at least one of the APIs fails.

What is the most idiomatic (used for its intended purpose) way to integrate these APIs in near real-time that provides the best balance of consistency, performance, and reliability?

Options:

A.

Implement eXtended Architecture (XA) transactions between the API implementations

Coordinate between the API implementations using a Saga pattern

Implement caching in each API implementation to improve performance

B.

Implement local transactions within each API implementation

Configure each API implementation to also participate in the same eXtended Architecture (XA) transaction

Implement caching in each API implementation to improve performance

C.

Implement local transactions in each API implementation

Coordinate between the API implementations using a Saga pattern

Apply various compensating actions depending on where a failure occurs

D.

Implement an eXtended Architecture (XA) transaction manager in a Mule application using a Saga pattern

Connect each API implementation with the Mule application using XA transactions

Apply various compensating actions depending on where a failure occurs

Question 26

49 of A popular retailer is designing a public API for its numerous business partners. Each business partner will invoke the API at the URL 58. https://api.acme.com/partnefs/vl. The API implementation is estimated to require deployment to 5 CloudHub workers.

The retailer has obtained a public X.509 certificate for the name apl.acme.com, signed by a reputable CA, to be used as the server certificate.

Where and how should the X.509 certificate and Mule applications be used to configure load balancing among the 5 CloudHub workers, and what DNS entries should be configured in order for the retailer to support its numerous business partners?

Options:

A.

Add the X.509 certificate to the Mule application's deployable archive, then configure a CloudHub Dedicated Load Balancer (DLB) for each of the Mule application's CloudHub workers

Create a CNAME for api.acme.com pointing to the DLB's A record

B.

Add the X.509 certificate to the CloudHub Shared Load Balancer (SLB), not to the Mule application

Create a CNAME for api.acme.com pointing to the SLB's A record

C.

Add the X.509 certificate to a CloudHub Dedicated Load Balancer (DLB), not to the Mule application

Create a CNAME for api.acme.com pointing to the DLB's A record

D.

Add the x.509 certificate to the Mule application's deployable archive, then configure the CloudHub Shared Load Balancer (SLB)

for each of the Mule application's CloudHub workers

Create a CNAME for api.acme.com pointing to the SLB's A record

Question 27

A project uses Jenkins to implement CI/CD process. It was observed that each Mule package contains some of the Jenkins files and folders for configurations of CI/CD jobs.

As these files and folders are not part of the actual package, expectation is that these should not be part of deployed archive.

Which file can be used to exclude these files and folders from the deployed archive?

Options:

A.

muleignore

B.

_unTrackMule

C.

mulelnclude

D.

_muleExclude

Question 28

A Kubernetes controller automatically adds another pod replica to the resource pool in response to increased application load.

Which scalability option is the controller implementing?

Options:

A.

Down

B.

Diagonal

C.

Vertical

D.

Horizontal

Question 29

A system API EmployeeSAPI is used to fetch employee's data from an underlying SQL database.

The architect must design a caching strategy to query the database only when there is an update to the employees stable or else return a cached response in order to minimize the number of redundant transactions being handled by the database.

What must the architect do to achieve the caching objective?

Options:

A.

Use an On Table Row on employees table and call invalidate cache

Use an object store caching strategy and expiration interval to empty

B.

Use a Scheduler with a fixed frequency every hour triggering an invalidate cache flow

Use an object store caching strategy and expiration interval to empty

C.

Use a Scheduler with a fixed frequency every hour triggering an invalidate cache flow

Use an object store caching strategy and set expiration interval to 1-hour

D.

Use an on table rule on employees table call invalidate cache and said new employees data to cache

Use an object store caching strategy and set expiration interval to 1-hour

Question 30

As part of a growth strategy, a supplier signs a trading agreement with a large customer. The customer sends purchase orders to the supplier according to the ANSI X12 EDI standard, and the supplier creates the orders in its ERP system using the information in the EDI document.

The agreement also requires that the supplier provide a new RESTful API to process request from the customer for current product inventory level from the supplier’ s ERP system.

Which two fundamental integration use cases does the supplier need to deliver to provide an end-to-end solution for this business scenario? (Choose two.)

Options:

A.

Synchronized data transfer

B.

Sharing data with external partners

C.

User interface integration

D.

Streaming data ingestion

E.

Data mashups

Question 31

An organization has several APIs that accept JSON data over HTTP POST. The APIs are all publicly available and are associated with several mobile applications and web applications. The organization does NOT want to use any authentication or compliance policies for these APIs, but at the same time, is worried that some bad actor could send payloads that could somehow compromise the applications or servers running the API implementations. What out-of-the-box Anypoint Platform policy can address exposure to this threat?

Options:

A.

Apply a Header injection and removal policy that detects the malicious data before it is used

B.

Apply an IP blacklist policy to all APIs; the blacklist will Include all bad actors

C.

Shut out bad actors by using HTTPS mutual authentication for all API invocations

D.

Apply a JSON threat protection policy to all APIs to detect potential threat vectors

Question 32

An organization uses a four(4) node customer hosted Mule runtime cluster to host one(1) stateless api implementation. The API is accessed over HTTPS through a load balancer that uses round-robin for load distribution. Each node in the cluster has been sized to be able to accept four(4) times the current number of requests.

Two(2) nodes in the cluster experience a power outage and are no longer available. The load balancer directs the outage and blocks the two unavailable the nodes from receiving further HTTP requests.

What performance-related consequence is guaranteed to happen to average, assuming the remaining cluster nodes are fully operational?

Options:

A.

100% increase in the average response time of the API

B.

50% reduction in the throughput of the API

C.

100% increase in the number of requests received by each remaining node

D.

50% increase in the JVM heap memory consumed by each remaining node

Question 33

According to MuleSoft, what is a major distinguishing characteristic of an application network in relation to the integration of systems, data, and devices?

Options:

A.

It uses a well-organized monolithic approach with standards

B.

It is built for change and self-service

C.

It leverages well-accepted internet standards like HTTP and JSON

D.

It uses CI/CD automation for real-time project delivery

Question 34

An organization is evaluating using the CloudHub shared Load Balancer (SLB) vs creating a CloudHub dedicated load balancer (DLB). They are evaluating how this choice affects the various types of certificates used by CloudHub deployed Mule applications, including MuleSoft-provided, customer-provided, or Mule application-provided certificates. What type of restrictions exist on the types of certificates for the service that can be exposed by the CloudHub Shared Load Balancer (SLB) to external web clients over the public internet?

Options:

A.

Underlying Mule applications need to implement own certificates

B.

Only MuleSoft provided certificates can be used for server side certificate

C.

Only self signed certificates can be used

D.

All certificates which can be used in shared load balancer need to get approved by raising support ticket

Question 35

Which Exchange asset type represents a complete API specification in RAML or OAS format?

Options:

A.

Connectors

B.

REST APIs

C.

API Spec Fragments

D.

SOAP APIs

Question 36

As a part of business requirement , old CRM system needs to be integrated using Mule application. CRM system is capable of exchanging data only via SOAP/HTTP protocol. As an integration architect who follows API led approach , what is the the below step you will perform so that you can share document with CRM team?

Options:

A.

Create RAML specification using Design Center

B.

Create SOAP API specification using Design Center

C.

Create WSDL specification using text editor

D.

Create WSDL specification using Design Center

Question 37

An organization currently uses a multi-node Mule runtime deployment model within their datacenter, so each Mule runtime hosts several Mule applications. The organization is planning to transition to a deployment model based on Docker containers in a Kubernetes cluster. The organization has already created a standard Docker image containing a Mule runtime and all required dependencies (including a JVM), but excluding the Mule application itself.

What is an expected outcome of this transition to container-based Mule application deployments?

Options:

A.

Required redesign of Mule applications to follow microservice architecture principles

B.

Required migration to the Docker and Kubernetes-based Anypoint Platform - Private Cloud Edition

C.

Required change to the URL endpoints used by clients to send requests to the Mule applications

D.

Guaranteed consistency of execution environments across all deployments of a Mule application

Question 38

What aspect of logging is only possible for Mule applications deployed to customer-hosted Mule runtimes, but NOT for Mule applications deployed to CloudHub?

Options:

A.

To send Mule application log entries to Splunk

B.

To change tog4j2 tog levels in Anypoint Runtime Manager without having to restart the Mule application

C.

To log certain messages to a custom log category

D.

To directly reference one shared and customized log4j2.xml file from multiple Mule applications

Question 39

An organization has decided on a cloud migration strategy to minimize the organization's own IT resources. Currently the organization has all of its new applications running on its own premises and uses an on-premises load balancer that exposes all APIs under the base URL (https://api.rutujar.com ).

As part of migration strategy, the organization is planning to migrate all of its new applications and load balancer CloudHub.

What is the most straightforward and cost-effective approach to Mule application deployment and load balancing that preserves the public URL's?

Options:

A.

Deploy the Mule application to Cloudhub

Create a CNAME record for base URL( httpsr://api.rutujar.com) in the Cloudhub shared load balancer that points to the A record of theon-premises load balancer

Apply mapping rules in SLB to map URLto their corresponding Mule applications

B.

Deploy the Mule application to Cloudhub

Update a CNAME record for base URL ( https://api.rutujar.com) in the organization 's DNS server to point to the A record of the Cloudhub dedicated load balancer

Apply mapping rules in DLB to map URLto their corresponding Mule applications

C.

Deploy the Mule application to Cloudhub

Update a CNAME record for base URL ( https://api.rutujar.com) in the organization 's DNS server to point to the A record of the CloudHub shared load balancer

Apply mapping rules in SLB to map URLto their corresponding Mule applications

D.

For each migrated Mule application, deploy an API proxy application to Cloudhub with all traffic to the mule applications routed through a Cloud Hub Dedicated load balancer (DLB)

Update a CNAME record for base URL ( https://api.rutujar.com) in the organization 's DNS server to point to the A record of the CloudHub dedicated load balancer

Apply mapping rules in DLB to map each API proxy appl

Question 40

An organization heeds to procure an enterprise software system to increase cross-selling opportunities and better rack prospect data.

Which category of enterprise software has these core capabilities, when used for its typical and intended purpose?

Options:

A.

Supply Chain Management (SCM)

B.

IT Service Management (ITSM)

C.

Business-to-Business (A2B)

D.

Customer Relationship Management (CRM)

Question 41

As a part of project requirement, Java Invoke static connector in a mule 4 application needs to invoke a static method in a dependency jar file. What are two ways to add the dependency to be visible by the connectors class loader?

(Choose two answers)

Options:

A.

In the Java Invoke static connector configuration, configure a path and name of the dependency jar file

B.

Add the dependency jar file to the java classpath by setting the JVM parameters

C.

Use Maven command to include the dependency jar file when packaging the application

D.

Configure the dependency as a shared library in the project POM

E.

Update mule-artefact.json to export the Java package

Question 42

An organization uses a set of customer-hosted Mule runtimes that are managed using the Mulesoft-hosted control plane. What is a condition that can be alerted on from Anypoint Runtime Manager without any custom components or custom coding?

Options:

A.

When a Mule runtime on a given customer-hosted server is experiencing high memory consumption during certain periods

B.

When an SSL certificate used by one of the deployed Mule applications is about to expire

C.

When the Mute runtime license installed on a Mule runtime is about to expire

D.

When a Mule runtime's customer-hosted server is about to run out of disk space

Question 43

An organization has various integrations implemented as Mule applications. Some of these Mule applications are deployed to custom hosted Mule runtimes (on-premises) while others execute in the MuleSoft-hosted runtime plane (CloudHub). To perform the Integra functionality, these Mule applications connect to various backend systems, with multiple applications typically needing to access the backend systems.

How can the organization most effectively avoid creating duplicates in each Mule application of the credentials required to access the backend systems?

Options:

A.

Create a Mule domain project that maintains the credentials as Mule domain-shared resources Deploy the Mule applications to the Mule domain, so the credentials are available to the Mule applications

B.

Store the credentials in properties files in a shared folder within the organization's data center Have the Mule applications load properties files from this shared location at startup

C.

Segregate the credentials for each backend system into environment-specific properties files Package these properties files in each Mule application, from where they are loaded at startup

D.

Configure or create a credentials service that returns the credentials for each backend system, and that is accessible from customer-hosted and MuleSoft-hosted Mule runtimes Have the Mule applications toad the properties at startup by invoking that credentials service

Question 44

An organization has implemented the cluster with two customer hosted Mule runtimes is hosting an application.

This application has a flow with a JMS listener configured to consume messages from a queue destination. As an integration architect can you advise which JMS listener configuration must be used to receive messages in all the nodes of the cluster?

Options:

A.

Use the parameter primaryNodeOnly= "false" on the JMS listener

B.

Use the parameter primaryNodeOnly= "false" on the JMS listener with a shared subscription

C.

Use the parameter primaryNodeOnly= "true" on the JMS listener with a non­shared subscription

D.

Use the parameter primaryNodeOnly= "true" on the JMS listener

Question 45

Refer to the exhibit.

A Mule application is being designed to expose a SOAP web service to its clients.

What language is typically used inside the web service's interface definition to define the data structures that the web service Is expected to exchange with its clients?

Question # 45

Options:

A.

WSDL

B.

XSD

C.

JSON Schema

D.

RAMI

Question 46

An API implementation is being designed that must invoke an Order API which is known to repeatedly experience downtime. For this reason a fallback API is to be called when the Order API is unavailable. What approach to designing invocation of the fallback API provides the best resilience?

Options:

A.

Redirect client requests through an HTTP 303 temporary redirect status code to the fallback API whenever the Order API is unavailable

B.

Set an option in the HTTP Requester component that invokes the order API to instead invoke a fallback API whenever an HTTP 4XX or 5XX response status code is received from Order API

C.

Create a separate entry for the order API in API manager and then invoke this API as a fallback API if the primary Order API is unavailable

D.

Search Anypoint Exchange for a suitable existing fallback API and them implement invocations to their fallback API in addition to the Order API

Question 47

How are the API implementation , API client, and API consumer combined to invoke and process an API ?

Options:

A.

The API consumer creates an API implementation , which receives API invocations from an API such that they are processed for an API client

B.

The API consumer creates an API client which sends API invocations to an API such that they are processed by an API implementation

C.

An API client creates an API consumer, which receives API invocation from an API such that they are processed for an API implementation

D.

The API client creates an API consumer which sends API invocations to an API such that they are processed by API implementation

Question 48

An organization designing a hybrid, load balanced, single cluster production environment. Due to performance service level agreement goals, it is looking into running the Mule applications in an active-active multi node cluster configuration.

What should be considered when running its Mule applications in this type of environment?

Options:

A.

All event sources, regardless of time , can be configured as the target source by the primary node in the cluster

B.

An external load balancer is required to distribute incoming requests throughout the cluster nodes

C.

A Mule application deployed to multiple nodes runs in an isolation from the other nodes in the cluster

D.

Although the cluster environment is fully installed configured and running, it will not process any requests until an outage condition is detected by the primary node in the cluster.

Question 49

Refer to the exhibit.

Question # 49

Question # 49

A business process involves two APIs that interact with each other asynchronously over HTTP. Each API is implemented as a Mule application. API 1 receives the initial HTTP request and invokes API 2 (in a fire and forget fashion) while API 2, upon completion of the processing, calls back into API l to notify about completion of the asynchronous process.

Each API Is deployed to multiple redundant Mule runtimes and a separate load balancer, and is deployed to a separate network zone.

In the network architecture, how must the firewall rules be configured to enable the above Interaction between API 1 and API 2?

Options:

A.

To authorize the certificate to be used both APIs

B.

To enable communication from each API’s Mule Runtimes and Network zone to the load balancer of the other API

C.

To open direct two-way communication between the Mule Runtimes of both API’s

D.

To allow communication between load balancers used by each API

Question 50

An API client makes an HTTP request to an API gateway with an Accept header containing the value’’ application’’.

What is a valid HTTP response payload for this request in the client requested data format?

Options:

A.

healthy

B.

{"status" "healthy"}

C.

status(‘healthy")

D.

status: healthy

Question 51

What aspects of a CI/CD pipeline for Mule applications can be automated using MuleSoft-provided Maven plugins?

Options:

A.

Compile, package, unit test, validate unit test coverage, deploy

B.

Compile, package, unit test, deploy, integration test (Incorrect)

C.

Compile, package, unit test, deploy, create associated API instances in API Manager

D.

Import from API designer, compile, package, unit test, deploy, publish to Anypoint Exchange

Question 52

How does timeout attribute help inform design decisions while using JMS connector listening for incoming messages in an extended architecture (XA) transaction?

Options:

A.

After the timeout is exceeded, stale JMS consumer threads are destroyed and new threads are created

B.

The timeout specifies the time allowed to pass between receiving JMS messages on the same JMS connection and then after the timeout new JMS connection is established

C.

The time allowed to pass between committing the transaction and the completion of the mule flow and then after the timeout flow processing triggers an error

D.

The timeout defines the time that is allowed to pass without the transaction ending explicitly and after the timeout expires, the transaction rolls back

Question 53

An organization is designing the following two Mule applications that must share data via a common persistent object store instance:

- Mule application P will be deployed within their on-premises datacenter.

- Mule application C will run on CloudHub in an Anypoint VPC.

The object store implementation used by CloudHub is the Anypoint Object Store v2 (OSv2).

what type of object store(s) should be used, and what design gives both Mule applications access to the same object store instance?

Options:

A.

Application P uses the Object Store connector to access a persistent object store Application C accesses this persistent object store via the Object Store REST API through an IPsec tunnel

B.

Application C and P both use the Object Store connector to access the Anypoint Object Store v2

C.

Application C uses the Object Store connector to access a persistent object Application P accesses the persistent object store via the Object Store REST API

D.

Application C and P both use the Object Store connector to access a persistent object store

Question 54

A Mule application is being designed To receive nightly a CSV file containing millions of records from an external vendor over SFTP, The records from the file need to be validated, transformed. And then written to a database. Records can be inserted into the database in any order.

In this use case, what combination of Mule components provides the most effective and performant way to write these records to the database?

Options:

A.

Use a Parallel for Each scope to Insert records one by one into the database

B.

Use a Scatter-Gather to bulk insert records into the database

C.

Use a Batch job scope to bulk insert records into the database.

D.

Use a DataWeave map operation and an Async scope to insert records one by one into the database.

Question 55

A global organization operates datacenters in many countries. There are private network links between these datacenters because all business data (but NOT metadata) must be exchanged over these private network connections.

The organization does not currently use AWS in any way.

The strategic decision has Just been made to rigorously minimize IT operations effort and investment going forward.

What combination of deployment options of the Anypoint Platform control plane and runtime plane(s) best serves this organization at the start of this strategic journey?

Options:

A.

MuleSoft-hosted Anypoint Platform control plane CloudHub Shared Worker Cloud in multiple AWS regions

B.

Anypoint Platform - Private Cloud Edition Customer-hosted runtime plane in each datacenter

C.

MuleSoft-hosted Anypoint Platform control plane Customer-hosted runtime plane in multiple AWS regions

D.

MuleSoft-hosted Anypoint Platform control plane Customer-hosted runtime plane in each datacenter

Question 56

Cloud Hub is an example of which cloud computing service model?

Options:

A.

Platform as a Service (PaaS)

B.

Software as a Service (SaaS)

C.

Monitoring as a Service (MaaS)

D.

Infrastructure as a Service (laaS)

Question 57

A Mule application is running on a customer-hosted Mule runtime in an organization's network. The Mule application acts as a producer of asynchronous Mule events. Each Mule event must be broadcast to all interested external consumers outside the Mule application. The Mule events should be published in a way that is guaranteed in normal situations and also minimizes duplicate delivery in less frequent failure scenarios.

The organizational firewall is configured to only allow outbound traffic on ports 80 and 443. Some external event consumers are within the organizational network, while others are located outside the firewall.

What Anypoint Platform service is most idiomatic (used for its intended purpose) for publishing these Mule events to all external consumers while addressing the desired reliability goals?

Options:

A.

CloudHub VM queues

B.

Anypoint MQ

C.

Anypoint Exchange

D.

CloudHub Shared Load Balancer

Question 58

A mule application designed to fulfil two requirements

a) Processing files are synchronously from an FTPS server to a back-end database using VM intermediary queues for load balancing VM events

b) Processing a medium rate of records from a source to a target system using batch job scope

Considering the processing reliability requirements for FTPS files, how should VM queues be configured for processing files as well as for the batch job scope if the application is deployed to Cloudhub workers?

Options:

A.

Use Cloud hub persistent queues for FTPS files processing

There is no need to configure VM queues for the batch jobs scope as it uses by default the worker's disc for VM queueing

B.

Use Cloud hub persistent VM queue for FTPS file processing

There is no need to configure VM queues for the batch jobs scope as it uses by default the worker's JVM memory for VM queueing

C.

Use Cloud hub persistent VM queues for FTPS file processing

Disable VM queue for the batch job scope

D.

Use VM connector persistent queues for FTPS file processing Disable VM queue for the batch job scope

Question 59

The ABC company has an Anypoint Runtime Fabric on VMs/Bare Metal (RTF-VM) appliance installed on its own customer-hosted AWS infrastructure.

Mule applications are deployed to this RTF-VM appliance. As part of the company standards, the Mule application logs must be forwarded to an external log management tool (LMT).

Given the company's current setup and requirements, what is the most idiomatic (used for its intended purpose) way to send Mule application logs to the external LMT?

Options:

A.

In RTF-VM, install and configure the external LTM's log-forwarding agent

B.

In RTF-VM, edit the pod configuration to automatically install and configure an Anypoint Monitoring agent

C.

In each Mule application, configure custom Log4j settings

D.

In RTF-VM. configure the out-of-the-box external log forwarder

Question 60

A Mule application is being designed for deployment to a single CloudHub worker. The Mule application will have a flow that connects to a SaaS system to perform some operations each time the flow is invoked.

The SaaS system connector has operations that can be configured to request a short-lived token (fifteen minutes) that can be reused for subsequent connections within the fifteen minute time window. After the token expires, a new token must be requested and stored.

What is the most performant and idiomatic (used for its intended purpose) Anypoint Platform component or service to use to support persisting and reusing tokens in the Mule application to help speed up reconnecting the Mule application to the SaaS application?

Options:

A.

Nonpersistent object store

B.

Persistent object store

C.

Variable

D.

Database

Question 61

Which of the below requirements prevent the usage of Anypoint MQ in a company's network? (Choose two answers)

Options:

A.

single message payload can be up to 15 MB

B.

payloads must be encrypted

C.

the message broker must be hosted on premises

D.

support for point-to-point messaging

E.

ability for a third party outside the company's network to consume events from the queue

Question 62

An organization plans to migrate all its Mule applications to Runtime Fabric (RTF). Currently, all Mule applications have been deployed to CloudHub using automated CI/CD scripts.

What steps should be taken to properly migrate the applications from CloudHub to RTF, while keeping the same automated CI/CD deployment strategy?

Options:

A.

A runtimefabric dependency should be added as a mule-plugin to the pom.xml file in all the Mule applications.

B.

runtimeFabric command-line parameter should be added to the CI/CD deployment scripts.

C.

A runtimefFabricDeployment profile should be added to Mule configuration properties YAML files in all the Mule applications.

CI/CD scripts must be modified to use the new configuration properties.

D.

runtimefabricDeployment profile should be added to the pom.xml file in all the Mule applications. CI/CD scripts must be modified to use the new RTF profile.

E.

- The pom.xml and Mule configuration YAML files can remain unchanged in each Mule application.

A --runtimeFabric command-line parameter should be added to the CI/CD deployment scripts

Question 63

What is an advantage of using OAuth 2.0 client credentials and access tokens over only API keys for API authentication?

Options:

A.

If the access token is compromised, the client credentials do not to be reissued.

B.

If the access token is compromised, I can be exchanged for an API key.

C.

If the client ID is compromised, it can be exchanged for an API key

D.

If the client secret is compromised, the client credentials do not have to be reissued.

Question 64

Refer to the exhibit.

Question # 64

A Mule application has an HTTP Listener that accepts HTTP DELETE requests. This Mule application Is deployed to three CloudHub workers under the control of the CloudHub Shared Load Balancer.

A web client makes a sequence of requests to the Mule application's public URL.

How is this sequence of web client requests distributed among the HTTP Listeners running in the three CloudHub workers?

Options:

A.

Each request is routed to the PRIMARY CloudHub worker in the PRIMARY Availability Zone (AZ)

B.

Each request is routed to ONE ARBiTRARY CloudHub worker in the PRIMARY Availability Zone (AZ)

C.

Each request Is routed to ONE ARBiTRARY CloudHub worker out of ALL three CloudHub workers

D.

Each request is routed (scattered) to ALL three CloudHub workers at the same time

Question 65

Refer to the exhibit.

Question # 65

An organization uses a 2-node Mute runtime cluster to host one stateless API implementation. The API is accessed over HTTPS through a load balancer that uses round-robin for load distribution.

Two additional nodes have been added to the cluster and the load balancer has been configured to recognize the new nodes with no other change to the load balancer.

What average performance change is guaranteed to happen, assuming all cluster nodes are fully operational?

Options:

A.

50% reduction in the response time of the API

B.

100% increase in the throughput of the API

C.

50% reduction In the JVM heap memory consumed by each node

D.

50% reduction In the number of requests being received by each node

Question 66

An API has been unit tested and is ready for integration testing. The API is governed by a Client ID Enforcement policy in all environments.

What must the testing team do before they can start integration testing the API in the Staging environment?

Options:

A.

They must access the API portal and create an API notebook using the Client ID and Client Secret supplied by the API portal in the Staging environment

B.

They must request access to the API instance in the Staging environment and obtain a Client ID and Client Secret to be used for testing the API

C.

They must be assigned as an API version owner of the API in the Staging environment

D.

They must request access to the Staging environment and obtain the Client ID and Client Secret for that environment to be used for testing the API

Question 67

An organization is choosing between API-led connectivity and other integration approaches.

According to MuleSoft, which business benefits is associated with an API-led connectivity approach using Anypoint Platform?

Options:

A.

improved security through adoption of monolithic architectures

B.

Increased developer productivity through sell-service of API assets

C.

Greater project predictability through tight coupling of systems

D.

Higher outcome repeatability through centralized development

Question 68

An external web UI application currently accepts occasional HTTP requests from client web browsers to change (insert, update, or delete) inventory pricing information in an inventory system's database. Each inventory pricing change must be transformed and then synchronized with multiple customer experience systems in near real-time (in under 10 seconds). New customer experience systems are expected to be added in the future.

The database is used heavily and limits the number of SELECT queries that can be made to the database to 10 requests per hour per user.

What is the most scalable, idiomatic (used for its intended purpose), decoupled. reusable, and maintainable integration mechanism available to synchronize each inventory pricing change with the various customer experience systems in near real-time?

Options:

A.

Write a Mule application with a Database On Table Row event source configured for the inventory pricing database, with the watermark attribute set to an appropriate database column

In the same now, use a Scatter-Gather to call each customer experience system's REST API with transformed inventory-pricing records

B.

Add a trigger to the inventory-pricing database table so that for each change to the inventory pricing database, a stored procedure is called that makes a REST call to a Mule application

Write the Mule application to publish each Mule event as a message to an Anypoint MQ exchange

Write other Mule applications to subscribe to the Anypoint MQ exchange, transform each received message, and then update the Mule application's corresp

C.

Replace the external web UI application with a Mule application to accept HTTP requests from client web browsers

In the same Mule application, use a Batch Job scope to test if the database request will succeed, aggregate pricing changes within a short time window, and then update both the inventory pricing database and each customer experience system using a Parallel For Each scope

D.

Write a Mule application with a Database On Table Row event source configured for the inventory pricing database, with the ID attribute set to an appropriate database column

In the same flow, use a Batch Job scope to publish transformed Inventory-pricing records to an Anypoint MQ queue

Write other Mule applications to subscribe to the Anypoint MQ queue, transform each received message, and then update the Mule application's corr

Question 69

Refer to the exhibit.

Question # 69

A Mule application is being designed to be deployed to several CIoudHub workers. The Mule application's integration logic is to replicate changed Accounts from Satesforce to a backend system every 5 minutes.

A watermark will be used to only retrieve those Satesforce Accounts that have been modified since the last time the integration logic ran.

What is the most appropriate way to implement persistence for the watermark in order to support the required data replication integration logic?

Question # 69

Options:

A.

Persistent Anypoint MQ Queue

B.

Persistent Object Store

C.

Persistent Cache Scope

D.

Persistent VM Queue

Question 70

What requirement prevents using Anypoint MQ as the messaging broker for a Mule application?

Options:

A.

When the payload sent through the message broker must use XML format

B.

When the payload sent through the message broker must be encrypted

C.

When the messaging broker must support point-to-point messaging

D.

When the messaging broker must be deployed on-premises

Question 71

When using Anypoint Platform across various lines of business with their own Anypoint Platform business groups, what configuration of Anypoint Platform is always performed at the organization level as opposed to at the business group level?

Options:

A.

Environment setup

B.

Identity management setup

C.

Role and permission setup

D.

Dedicated Load Balancer setup

Question 72

An organization is creating a set of new services that are critical for their business. The project team prefers using REST for all services but is willing to use SOAP with common WS-" standards if a particular service requires it.

What requirement would drive the team to use SOAP/WS-* for a particular service?

Options:

A.

Must use XML payloads for the service and ensure that it adheres to a specific schema

B.

Must publish and share the service specification (including data formats) with the consumers of the service

C.

Must support message acknowledgement and retry as part of the protocol

D.

Must secure the service, requiring all consumers to submit a valid SAML token

Question 73

In a Mule Application, a flow contains two (2) JMS consume operations that are used to connect to a JMS broker and consume messages from two(2) JMS destination. The Mule application then joins the two JMS messages together.

The JMS broker does not implement high availability (HA) and periodically experiences scheduled outages of upto 10 mins for routine maintenance.

What is the most idiomatic (used for its intented purpose) way to build the mule flow so it can best recover from the expected outages?

Options:

A.

Configure a reconnection strategy for the JMS connector

B.

Enclose the two(2) JMS operation in an Until Successful scope

C.

Consider a transaction for the JMS connector

D.

Enclose the two(2) JMS operations in a Try scope with an Error Continue error handler

Question 74

An integration team follows MuleSoft’s recommended approach to full lifecycle API development.

Which activity should this team perform during the API implementation phase?

Options:

A.

Validate the API specification

B.

Use the API specification to build the MuleSoft application

C.

Design the API specification

D.

Use the API specification to monitor the MuleSoft application

Question 75

Refer to the exhibit.

Question # 75

One of the backend systems invoked by an API implementation enforces rate limits on the number of requests a particular client can make. Both the backend system and the API implementation are deployed to several non-production environments in addition to production.

Rate limiting of the backend system applies to all non-production environments. The production environment, however, does NOT have any rate limiting.

What is the most effective approach to conduct performance tests of the API implementation in a staging (non-production) environment?

Options:

A.

Create a mocking service that replicates the backend system's production performance characteristics. Then configure the API implementation to use the mocking service and conduct the performance tests

B.

Use MUnit to simulate standard responses from the backend system then conduct performance tests to identify other bottlenecks in the system

C.

Include logic within the API implementation that bypasses invocations of the backend system in a performance test situation. Instead invoking local stubs that replicate typical backend system responses then conduct performance tests using this API Implementation

D.

Conduct scaled-down performance tests in the staging environment against the rate limited backend system then upscale performance results to full production scale

Question 76

Refer to the exhibit.

Question # 76

Anypoint Platform supports role-based access control (RBAC) to features of the platform. An organization has configured an external Identity Provider for identity management with Anypoint Platform.

What aspects of RBAC must ALWAYS be controlled from the Anypoint Platform control plane and CANNOT be controlled via the external Identity Provider?

Options:

A.

Controlling the business group within Anypoint Platform to which the user belongs

B.

Assigning Anypoint Platform permissions to a role

C.

Assigning Anypoint Platform role(s) to a user

D.

Removing a user's access to Anypoint Platform when they no longer work for the organization

Question 77

A Mule application is built to support a local transaction for a series of operations on a single database. The Mule application has a Scatter-Gather that participates in the local transaction.

What is the behavior of the Scatter-Gather when running within this local transaction?

Options:

A.

Execution of each route within the Scatter-Gather occurs sequentially

Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations

B.

Execution of all routes within the Scatter-Gather occurs in parallel

Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations

C.

Execution of each route within the Scatter-Gather occurs sequentially

Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations

D.

Execution of each route within the Scatter-Gather occurs in parallel

Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations

Question 78

A set of integration Mule applications, some of which expose APIs, are being created to enable a new business process. Various stakeholders may be impacted by this. These stakeholders are a combination of semi-technical users (who understand basic integration terminology and concepts such as JSON and XML) and technically skilled potential consumers of the Mule applications and APIs.

What Is an effective way for the project team responsible for the Mule applications and APIs being built to communicate with these stakeholders using Anypoint Platform and its supplied toolset?

Options:

A.

Use Anypoint Design Center to implement the Mule applications and APIs and give the various stakeholders access to these Design Center projects, so they can collaborate and provide feedback

B.

Create Anypoint Exchange entries with pages elaborating the integration design, including API notebooks (where applicable) to help the stakeholders understand and interact with the Mule applications and APIs at various levels of technical depth

C.

Use Anypoint Exchange to register the various Mule applications and APIs and share the RAML definitions with the stakeholders, so they can be discovered

D.

Capture documentation about the Mule applications and APIs inline within the Mule integration flows and use Anypoint Studio's Export Documentation feature to provide an HTML version of this documentation to the stakeholders

Question 79

A company is using Mulesoft to develop API's and deploy them to Cloudhub and on premises targets. Recently it has decided to enable Runtime Fabric deployment option as well and infrastructure is set up for this option.

What can be used to deploy Runtime Fabric?

Options:

A.

AnypointCLI

B.

Anypoint platform REST API's

C.

Directly uploading ajar file from the Runtime manager

D.

Mule maven plug-in

Question 80

A project team is working on an API implementation using the RAML definition as a starting point. The team has updated the definition to include new operations and has published a new version to exchange. Meanwhile another team is working on a mule application consuming the same API implementation.

During the development what has to be performed by the mule application team to take advantage of the newly added operations?

Options:

A.

Scaffold the client application with the new definition

B.

Scaffold API implementation application with the new definition

C.

Update the REST connector from exchange in the client application

D.

Update the API connector in the API implementation and publish to exchange

Question 81

An API implementation is being developed to expose data from a production database via HTTP requests. The API implementation executes a database SELECT statement that is dynamically created based upon data received from each incoming HTTP request. The developers are planning to use various types of testing to make sure the Mule application works as expected, can handle specific workloads, and behaves correctly from an API consumer perspective. What type of testing would typically mock the results from each SELECT statement rather than actually execute it in the production database?

Options:

A.

Unit testing (white box)

B.

Integration testing

C.

Functional testing (black box)

D.

Performance testing

Page: 1 / 27
Total 270 questions