New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the MuleSoft MuleSoft Certified Platform Architect MCPA-Level-1 Questions and answers with CertsForce

Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions
Questions # 21:

Traffic is routed through an API proxy to an API implementation. The API proxy is managed by API Manager and the API implementation is deployed to a CloudHub VPC using Runtime Manager. API policies have been applied to this API. In this deployment scenario, at what point are the API policies enforced on incoming API client requests?

Options:

A.

At the API proxy


B.

At the API implementation


C.

At both the API proxy and the API implementation


D.

At a MuleSoft-hosted load balancer


Expert Solution
Questions # 22:

An API implementation is deployed to CloudHub.

What conditions can be alerted on using the default Anypoint Platform functionality, where the alert conditions depend on the end-to-end request processing of the API implementation?

Options:

A.

When the API is invoked by an unrecognized API client


B.

When a particular API client invokes the API too often within a given time period


C.

When the response time of API invocations exceeds a threshold


D.

When the API receives a very high number of API invocations


Expert Solution
Questions # 23:

A Rate Limiting policy is applied to an API implementation to protect the back-end system. Recently, there have been surges in demand that cause some API client

POST requests to the API implementation to be rejected with policy-related errors, causing delays and complications to the API clients.

How should the API policies that are applied to the API implementation be changed to reduce the frequency of errors returned to API clients, while still protecting the back-end

system?

Options:

A.

Keep the Rate Limiting policy and add 9 Client ID Enforcement policy


B.

Remove the Rate Limiting policy and add an HTTP Caching policy


C.

Remove the Rate Limiting policy and add a Spike Control policy


D.

Keep the Rate Limiting policy and add an SLA-based Spike Control policy


Expert Solution
Questions # 24:

A customer has an ELA contract with MuleSoft. An API deployed to CloudHub is consistently experiencing performance issues. Based on the root cause analysis, it is

determined that autoscaling needs to be applied.

How can this be achieved?

Options:

A.

Configure a policy so that when the number of HTTP requests reaches a certain threshold the number of workers/replicas increases (horizontal scaling)


B.

Configure two separate policies: When CPU and memory reach certain threshold, increase the worker/replica type (vertical sealing) and the number of workers/replicas (horizontal sealing)


C.

Configure a policy based on CPU usage so that CloudHub auto-adjusts the number of workers/replicas (horizontal scaling)


D.

Configure a policy so that when the response time reaches a certain threshold the worker/replica type increases (vertical scaling)


Expert Solution
Questions # 25:

An Anypoint Platform organization has been configured with an external identity provider (IdP) for identity management and client management. What credentials or token must be provided to Anypoint CLI to execute commands against the Anypoint Platform APIs?

Options:

A.

The credentials provided by the IdP for identity management


B.

The credentials provided by the IdP for client management


C.

An OAuth 2.0 token generated using the credentials provided by the IdP for client management


D.

An OAuth 2.0 token generated using the credentials provided by the IdP for identity management


Expert Solution
Questions # 26:

When could the API data model of a System API reasonably mimic the data model exposed by the corresponding backend system, with minimal improvements over the backend system's data model?

Options:

A.

When there is an existing Enterprise Data Model widely used across the organization


B.

When the System API can be assigned to a bounded context with a corresponding data model


C.

When a pragmatic approach with only limited isolation from the backend system is deemed appropriate


D.

When the corresponding backend system is expected to be replaced in the near future


Expert Solution
Questions # 27:

An organization wants to create a Center for Enablement (C4E). The IT director schedules a series of meetings with IT senior managers.

What should be on the agenda of the first meeting?

Options:

A.

Define C4E objectives, mission statement, guiding principles, a


B.

Explore API monetization options based on identified use cases through MuleSoft


C.

A walk through of common-services best practices for logging, auditing, exception handling, caching, security via policy, and rate limiting/throttling via policy


D.

Specify operating model for the MuleSoft Integrations division


Expert Solution
Questions # 28:

A company wants to move its Mule API implementations into production as quickly as possible. To protect access to all Mule application data and metadata, the company requires that all Mule applications be deployed to the company's customer-hosted infrastructure within the corporate firewall. What combination of runtime plane and control plane options meets these project lifecycle goals?

Options:

A.

Manually provisioned customer-hosted runtime plane and customer-hosted control plane


B.

MuleSoft-hosted runtime plane and customer-hosted control plane


C.

Manually provisioned customer-hosted runtime plane and MuleSoft-hosted control plane


D.

iPaaS provisioned customer-hosted runtime plane and MuleSoft-hosted control plane


Expert Solution
Questions # 29:

A company stores financial transaction data in two legacy systems. For each legacy system, a separate, dedicated System API (SAPI) exposes data for that legacy system. A Process API (PAPI) merges the data retrieved from ail of the System APIs into a common format. Several API clients call the PAPI through its public domain name.

The company now wants to expose a subset of financial data to a newly developed mobile application that uses a different Bounded Context Data Model. The company wants to follow MuleSoft's best practices for building out an effective application network.

Following MuleSoft's best practices, how can the company expose financial data needed by the mobile application in a way that minimizes the impact on the currently running API clients, API implementations, and support asset reuse?

Options:

A.

Add two new Experience APIs (EAPI-i and EAPI-2}.

Add Mobile PAPI-2 to expose the Intended subset of financial data as requested.

Both PAPIs access the Legacy Systems via SAPI-1 and SAP]-2.


B.

Add two new Experience APIs (EAPI-i and EAPI-2}.

Add Mobile PAPI-2 to expose the Intended subset of financial data as requested.

Both PAPIs access the Legacy Systems via SAPI-1 and SAP]-2.


C.

Create a new mobile Experince API (EAPI) chat exposes that subset of PAPI endpoints.

Add transformtion login to the mobile Experince API implementation to make mobile data compatible with the required PAPIs.

29


D.

Develop and deploy is new PAPI implementation with data transformation and ... login to support this required endpoints of both mobile and web clients.

Deploy an API Proxy with an endpoint from API Manager that redirect the existing PAPI endpoints to the new PAPI.


Expert Solution
Questions # 30:

Refer to the exhibit.

What is a valid API in the sense of API-led connectivity and application networks?

A) Java RMI over TCP

B) Java RMI over TCP

Question # 30

C) CORBA over HOP

D) XML over UDP

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions