Pass the Salesforce Salesforce MuleSoft MuleSoft-Platform-Architect-I Questions and answers with CertsForce

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

A Rate Limiting policy is applied to an API implementation to protect the back-end system. Recently, there have been surges in demand that cause some API client

POST requests to the API implementation to be rejected with policy-related errors, causing delays and complications to the API clients.

How should the API policies that are applied to the API implementation be changed to reduce the frequency of errors returned to API clients, while still protecting the back-end

system?

Options:

A.

Keep the Rate Limiting policy and add 9 Client ID Enforcement policy


B.

Remove the Rate Limiting policy and add an HTTP Caching policy


C.

Remove the Rate Limiting policy and add a Spike Control policy


D.

Keep the Rate Limiting policy and add an SLA-based Spike Control policy


Expert Solution
Questions # 2:

What is a key performance indicator (KPI) that measures the success of a typical C4E that is immediately apparent in responses from the Anypoint Platform APIs?

Options:

A.

The number of production outage incidents reported in the last 24 hours


B.

The number of API implementations that have a publicly accessible HTTP endpoint and are being managed by Anypoint Platform


C.

The fraction of API implementations deployed manually relative to those deployed using a CI/CD tool


D.

The number of API specifications in RAML or OAS format published to Anypoint Exchange


Expert Solution
Questions # 3:

What condition requires using a CloudHub Dedicated Load Balancer?

Options:

A.

When cross-region load balancing is required between separate deployments of the same Mule application


B.

When custom DNS names are required for API implementations deployed to customer-hosted Mule runtimes


C.

When API invocations across multiple CloudHub workers must be load balanced


D.

When server-side load-balanced TLS mutual authentication is required between API implementations and API clients


Expert Solution
Questions # 4:

When could the API data model of a System API reasonably mimic the data model exposed by the corresponding backend system, with minimal improvements over the backend system's data model?

Options:

A.

When there is an existing Enterprise Data Model widely used across the organization


B.

When the System API can be assigned to a bounded context with a corresponding data model


C.

When a pragmatic approach with only limited isolation from the backend system is deemed appropriate


D.

When the corresponding backend system is expected to be replaced in the near future


Expert Solution
Questions # 5:

What API policy would LEAST likely be applied to a Process API?

Options:

A.

Custom circuit breaker


B.

Client ID enforcement


C.

Rate limiting


D.

JSON threat protection


Expert Solution
Questions # 6:

Refer to the exhibit.

Question # 6

A developer is building a client application to invoke an API deployed to the STAGING environment that is governed by a client ID enforcement policy.

What is required to successfully invoke the API?

Options:

A.

The client ID and secret for the Anypoint Platform account owning the API in the STAGING environment


B.

The client ID and secret for the Anypoint Platform account's STAGING environment


C.

The client ID and secret obtained from Anypoint Exchange for the API instance in the STAGING environment


D.

A valid OAuth token obtained from Anypoint Platform and its associated client ID and secret


Expert Solution
Questions # 7:

A REST API is being designed to implement a Mule application.

What standard interface definition language can be used to define REST APIs?

Options:

A.

Web Service Definition Language(WSDL)


B.

OpenAPI Specification (OAS)


C.

YAML


D.

AsyncAPI Specification


Expert Solution
Questions # 8:

To minimize operation costs, a customer wants to use a CloudHub 1.0 solution. The customer's requirements are:

* Separate resources with two Business groups

* High-availability (HA) for all APIs

* Route traffic via Dedicated load balancer (DLBs)

* Separate environments into production and non-production

Which solution meets the customer's needs?

Options:

A.

One production and one non-production Virtual Private Cloud (VPC).

Use availability zones to differentiate between Business groups.

Allocate maximum CIDR per VPCs to ensure HA across availability zones


B.

One production and one non-production Virtual Private Cloud (VPC) per Business group.

Minimize CIDR aligning with projected application total.

Choose a MuleSoft CloudHub 1.0 region with multiple availability zones.

Deploy multiple workers for HA,


C.

One production and one non-production Virtual Private Cloud (VPC) per Business group.

Minimize CIDR aligning with projected application total.

Divide availability zones during deployment of APIs for HA.


D.

One production and one non-production Virtual Private Claud (VPC).

Configure subnet to differentiate between business groups.

Allocate maximum CIDR per VPCs to make it easier to add Child groups.

Span VPC to cover three availability zones.


Expert Solution
Questions # 9:

An organization requires several APIs to be secured with OAuth 2.0, and PingFederate has been identified as the identity provider for API client authorization, The

PingFederate Client Provider is configured in access management, and the PingFederate OAuth 2.0 Token Enforcement policy is configured for the API instances required by the

organization. The API instances reside in two business groups (Group A and Group B) within the Master Organization (Master Org).

What should be done to allow API consumers to access the API instances?

Options:

A.

The API administrator should configure the correct client discovery URL in both child business groups, and the API consumer should request access to the API in Ping Identity


B.

The API administrator should grant access to the API consumers by creating contracts in the relevant API instances in API Manager


C.

The APL consumer should create a client application and request access to the APT in Anypoint Exchange, and the API administrator should approve the request


D.

The APT consumer should create a client application and request access to the API in Ping Identity, and the organization's Ping Identity workflow will grant access


Expert Solution
Questions # 10:

A system API has a guaranteed SLA of 100 ms per request. The system API is deployed to a primary environment as well as to a disaster recovery (DR) environment, with different DNS names in each environment. An upstream process API invokes the system API and the main goal of this process API is to respond to client requests in the least possible time. In what order should the system APIs be invoked, and what changes should be made in order to speed up the response time for requests from the process API?

Options:

A.

In parallel, invoke the system API deployed to the primary environment and the system API deployed to the DR environment, and ONLY use the first response


B.

In parallel, invoke the system API deployed to the primary environment and the system API deployed to the DR environment using a scatter-gather configured with a timeout, and then merge the responses


C.

Invoke the system API deployed to the primary environment, and if it fails, invoke the system API deployed to the DR environment


D.

Invoke ONLY the system API deployed to the primary environment, and add timeout and retry logic to avoid intermittent failures


Expert Solution
Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions