Pass the Salesforce Salesforce MuleSoft MuleSoft-Integration-Architect-I Questions and answers with CertsForce

Viewing page 8 out of 9 pages
Viewing questions 71-80 out of questions
Questions # 71:

A new Mule application has been deployed through Runtime Manager to CloudHub 1.0 using a CI/CD pipeline with sensitive properties set as cleartext. The Runtime Manager Administrator opened a high priority incident ticket about this violation of their security requirements indicating

these sensitive properties values must not be stored or visible in Runtime Manager but should be changeable in Runtime Manager by Administrators with proper permissions.

How can the Mule application be deployed while safely hiding the sensitive properties?

Options:

A.

Add an ArrayList of all the sensitive properties’ names in the mule-artifact.json file of

the application


B.

Add encrypted versions of the sensitive properties as global configuration properties in

the Mule application


C.

Add a new wrapper.java.additional.xx parameter for each sensitive property in the

wrapper.conf file used by the CI/CD pipeline scripts


D.

Create a variable for each sensitive property and declare them as hidden in the CI/CD

pipeline scripts


Expert Solution
Questions # 72:

What is required before an API implemented using the components of Anypoint Platform can be managed and governed (by applying API policies) on Anypoint Platform?

Options:

A.

The API must be published to Anypoint Exchange and a corresponding API instance ID must be obtained from API Manager to be used in the API implementation


B.

The API implementation source code must be committed to a source control management system (such as GitHub)


C.

A RAML definition of the API must be created in API designer so it can then be published to Anypoint Exchange


D.

The API must be shared with the potential developers through an API portal so API consumers can interact with the API


Expert Solution
Questions # 73:

An organization's security policies mandate complete control of the login credentials used to log in to Anypoint Platform. What feature of Anypoint Platform should be used to meet this requirement?

Options:

A.

Enterprise Security Module


B.

Client ID Secret


C.

Federated Identity Management


D.

Federated Client Management


Expert Solution
Questions # 74:

A mule application uses an HTTP request operation to involve an external API.

The external API follows the HTTP specification for proper status code usage.

What is possible cause when a 3xx status code is returned to the HTTP Request operation from the external API?

Options:

A.

The request was not accepted by the external API


B.

The request was Redirected to a different URL by the external API


C.

The request was NOT RECEIVED by the external API


D.

The request was ACCEPTED by the external API


Expert Solution
Questions # 75:

How should the developer update the logging configuration in order to enable this package specific debugging?

Options:

A.

In Anypoint Monitoring, define a logging search query with class property set to org.apache.cxf and level set to DEBUG


B.

In the Mule application's log4j2.xml file, add an AsyncLogger element with name property set to org.apache.cxf and level set to DEBUG, then redeploy the Mule application in the CloudHub production environment


C.

In the Mule application's log4j2.xmI file, change the root logger's level property to DEBUG, then redeploy the Mule application to the CloudHub production environment


D.

In Anypoint Runtime Manager, in the Deployed Application Properties tab for the Mule application, add a line item with DEBUG level for package org.apache.cxf and apply the changes


Expert Solution
Questions # 76:

An organization is designing the following two Mule applications that must share data via a common persistent object store instance:

- Mule application P will be deployed within their on-premises datacenter.

- Mule application C will run on CloudHub in an Anypoint VPC.

The object store implementation used by CloudHub is the Anypoint Object Store v2 (OSv2).

what type of object store(s) should be used, and what design gives both Mule applications access to the same object store instance?

Options:

A.

Application P uses the Object Store connector to access a persistent object store Application C accesses this persistent object store via the Object Store REST API through an IPsec tunnel


B.

Application C and P both use the Object Store connector to access the Anypoint Object Store v2


C.

Application C uses the Object Store connector to access a persistent object Application P accesses the persistent object store via the Object Store REST API


D.

Application C and P both use the Object Store connector to access a persistent object store


Expert Solution
Questions # 77:

A customer wants to use the mapped diagnostic context (MDC) and logging variables to enrich its logging and improve tracking by providing more context in the logs.

The customer also wants to improve the throughput and lower the latency of message processing.

As an Mulesoft integration architect can you advise, what should the customer implement to meet these requirements?

Options:

A.

Use synchronous logging and use pattern layout with [%MDC] in the log4j2.xml configuration file and then configure the logging variables


B.

Useasync logger at the level greater than INFO and use pattern layout with [%MDC] in the log4j2,xml configuration file and then configure the logging variables


C.

Useasync logger at the level equal to DEBUG orTRACEand use pattern

layout with [%MDC] in the log4j2.xml configuration file and then configure the logging variables


D.

Use synchronous logging at the INFO DEBUG or Trace level and use pattern layout with [%MDC] in the log4j2.xml configuration file and then configure the logging variables


Expert Solution
Questions # 78:

What are two reasons why a typical MuleSoft customer favors a MuleSoft-hosted Anypoint Platform runtime plane over a customer-hosted runtime for its Mule application deployments? (Choose two.)

Options:

A.

Reduced application latency


B.

Increased application isolation


C.

Reduced time-to-market for the first application


D.

Increased application throughput


E.

Reduced IT operations effort


Expert Solution
Questions # 79:

What API policy would LEAST likely be applied to a Process API?

Options:

A.

Custom circuit breaker


B.

Client ID enforcement


C.

Rate limiting


D.

JSON threat protection


Expert Solution
Questions # 80:

An organization has several APIs that accept JSON data over HTTP POST. The APIs are all publicly available and are associated with several mobile applications and web applications. The organization does NOT want to use any authentication or compliance policies for these APIs, but at the same time, is worried that some bad actor could send payloads that could somehow compromise the applications or servers running the API implementations. What out-of-the-box Anypoint Platform policy can address exposure to this threat?

Options:

A.

Apply a Header injection and removal policy that detects the malicious data before it is used


B.

Apply an IP blacklist policy to all APIs; the blacklist will Include all bad actors


C.

Shut out bad actors by using HTTPS mutual authentication for all API invocations


D.

Apply a JSON threat protection policy to all APIs to detect potential threat vectors


Expert Solution
Viewing page 8 out of 9 pages
Viewing questions 71-80 out of questions