Pass the MuleSoft MuleSoft Certified Architect MCIA-Level-1 Questions and answers with CertsForce

Viewing page 2 out of 9 pages
Viewing questions 11-20 out of questions
Questions # 11:

An organization is designing Mule application which connects to a legacy backend. It has been reported that backend services are not highly available and experience downtime quite often. As an integration architect which of the below approach you would propose to achieve high reliability goals?

Options:

A.

Alerts can be configured in Mule runtime so that backend team can be communicated when services are down


B.

Until Successful scope can be implemented while calling backend API's


C.

On Error Continue scope to be used to call in case of error again


D.

Create a batch job with all requests being sent to backend using that job as per the availability of backend API's


Expert Solution
Questions # 12:

What Is a recommended practice when designing an integration Mule 4 application that reads a large XML payload as a stream?

Options:

A.

The payload should be dealt with as a repeatable XML stream, which must only be traversed (iterated-over) once and CANNOT be accessed randomly from DataWeave expressions and scripts


B.

The payload should be dealt with as an XML stream, without converting it to a single Java object (POJO)


C.

The payload size should NOT exceed the maximum available heap memory of the Mute runtime on which the Mule application executes


D.

The payload must be cached using a Cache scope If It Is to be sent to multiple backend systems


Expert Solution
Questions # 13:

An organization has just developed a Mule application that implements a REST API. The mule application will be deployed to a cluster of customer hosted Mule runtimes.

What additional infrastructure component must the customer provide in order to distribute inbound API requests across the Mule runtimes of the cluster?

Options:

A.

A message broker


B.

An HTTP Load Balancer


C.

A database


D.

An Object Store


Expert Solution
Questions # 14:

In which order are the API Client, API Implementation, and API interface components called in a typical REST request?

Options:

A.

API Client > API implementation > API Interface


B.

API interface > API Client > API Implementation


C.

API Client > API Interface > API implementation


D.

API Implementation > API Interface > API Client


Expert Solution
Questions # 15:

Refer to the exhibit.

Question # 15

A Mule 4 application has a parent flow that breaks up a JSON array payload into 200 separate items, then sends each item one at a time inside an Async scope to a VM queue.

A second flow to process orders has a VM Listener on the same VM queue. The rest of this flow processes each received item by writing the item to a database.

This Mule application is deployed to four CloudHub workers with persistent queues enabled.

What message processing guarantees are provided by the VM queue and the CloudHub workers, and how are VM messages routed among the CloudHub workers for each invocation of the parent flow under normal operating conditions where all the CloudHub workers remain online?

Options:

A.

EACH item VM message is processed AT MOST ONCE by ONE CloudHub worker, with workers chosen in a deterministic round-robin fashion Each of the four CloudHub workers can be expected to process 1/4 of the Item VM messages (about 50 items)


B.

EACH item VM message is processed AT LEAST ONCE by ONE ARBITRARY CloudHub worker Each of the four CloudHub workers can be expected to process some item VM messages


C.

ALL Item VM messages are processed AT LEAST ONCE by the SAME CloudHub worker where the parent flow was invoked

This one CloudHub worker processes ALL 200 item VM messages


D.

ALL item VM messages are processed AT MOST ONCE by ONE ARBITRARY CloudHub worker

This one CloudHub worker processes ALL 200 item VM messages


Expert Solution
Questions # 16:

What is required before an API implemented using the components of Anypoint Platform can be managed and governed (by applying API policies) on Anypoint Platform?

Options:

A.

The API must be published to Anypoint Exchange and a corresponding API instance ID must be obtained from API Manager to be used in the API implementation


B.

The API implementation source code must be committed to a source control management system (such as GitHub)


C.

A RAML definition of the API must be created in API designer so it can then be published to Anypoint Exchange


D.

The API must be shared with the potential developers through an API portal so API consumers can interact with the API


Expert Solution
Questions # 17:

Which Mulesoft feature helps users to delegate their access without sharing sensitive credentials or giving full control of accounts to 3rd parties?

Options:

A.

Secure Scheme


B.

client id enforcement policy


C.

Connected apps


D.

Certificates


Expert Solution
Questions # 18:

A rale limiting policy has been applied to a soap VI.2 API published in Clondhub. The API implementation catches errors in a global error handler on error propagate in the main flow for HTTP: RETRY_EXHAUSTED with HTTP status set to 429 and any with the HTTP status set to 500.

What is the expected H1TP status when the client exceeds the quota of the API calls?

Options:

A.

HTTP status 429 as defined in the HTTP:RETRY EXHAUSTED error handler in the API B. HTTP status 500 as defined in the ANY error handler in the API since an API:RETRY_EXHAUSTED will be generated


B.

HTTP status 401 unauthorized for policy violation


C.

HTTP status 400 from the rate-limiting policy violation since the call does not reach the back-end


Expert Solution
Questions # 19:

When the mule application using VM is deployed to a customer-hosted cluster or multiple cloudhub workers, how are messages consumed by the Mule engine?

Options:

A.

in non-deterministic way


B.

by starting an XA transaction for each new message


C.

in a deterministic way


D.

the primary only in order to avoid duplicate processing


Expert Solution
Questions # 20:

An organization's security requirements mandate centralized control at all times over authentication and authorization of external applications when invoking web APIs managed on Anypoint Platform.

What Anypoint Platform feature is most idiomatic (used for its intended purpose), straightforward, and maintainable to use to meet this requirement?

Options:

A.

Client management configured in access management


B.

Identity management configured in access management


C.

Enterprise Security module coded in Mule applications


D.

External access configured in API Manager


Expert Solution
Viewing page 2 out of 9 pages
Viewing questions 11-20 out of questions