New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Salesforce Salesforce MuleSoft MuleSoft-Platform-Architect-I Questions and answers with CertsForce

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

An organization wants to make sure only known partners can invoke the organization's APIs. To achieve this security goal, the organization wants to enforce a Client ID Enforcement policy in API Manager so that only registered partner applications can invoke the organization's APIs. In what type of API implementation does MuleSoft recommend adding an API proxy to enforce the Client ID Enforcement policy, rather than embedding the policy directly in the application's JVM?

Options:

A.

A Mule 3 application using APIkit


B.

A Mule 3 or Mule 4 application modified with custom Java code


C.

A Mule 4 application with an API specification


D.

A Non-Mule application


Expert Solution
Questions # 2:

A retail company with thousands of stores has an API to receive data about purchases and insert it into a single database. Each individual store sends a batch of purchase data to the API about every 30 minutes. The API implementation uses a database bulk insert command to submit all the purchase data to a database using a custom JDBC driver provided by a data analytics solution provider. The API implementation is deployed to a single CloudHub worker. The JDBC driver processes the data into a set of several temporary disk files on the CloudHub worker, and then the data is sent to an analytics engine using a proprietary protocol. This process usually takes less than a few minutes. Sometimes a request fails. In this case, the logs show a message from the JDBC driver indicating an out-of-file-space message. When the request is resubmitted, it is successful. What is the best way to try to resolve this throughput issue?

Options:

A.

se a CloudHub autoscaling policy to add CloudHub workers


B.

Use a CloudHub autoscaling policy to increase the size of the CloudHub worker


C.

Increase the size of the CloudHub worker(s)


D.

Increase the number of CloudHub workers


Expert Solution
Questions # 3:

An organization has built an application network following the API-led connectivity approach recommended by MuleSoft. To protect the application network against

attacks from malicious external API clients, the organization plans to apply JSON Threat Protection policies.

To which API-led connectivity layer should the JSON Threat Protection policies most commonly be applied?

Options:

A.

All layers


B.

System layer


C.

Process layer


D.

Experience layer


Expert Solution
Questions # 4:

What Anypoint Platform Capabilities listed below fall under APIs and API Invocations/Consumers category? Select TWO.

Options:

A.

API Operations and Management


B.

API Runtime Execution and Hosting


C.

API Consumer Engagement


D.

API Design and Development


Expert Solution
Questions # 5:

An API client calls one method from an existing API implementation. The API implementation is later updated. What change to the API implementation would require the API client's invocation logic to also be updated?

Options:

A.

When the data type of the response is changed for the method called by the API client


B.

When a new method is added to the resource used by the API client


C.

When a new required field is added to the method called by the API client


D.

When a child method is added to the method called by the API client


Expert Solution
Questions # 6:

When using CloudHub with the Shared Load Balancer, what is managed EXCLUSIVELY by the API implementation (the Mule application) and NOT by Anypoint Platform?

Options:

A.

The assignment of each HTTP request to a particular CloudHub worker


B.

The logging configuration that enables log entries to be visible in Runtime Manager


C.

The SSL certificates used by the API implementation to expose HTTPS endpoints


D.

The number of DNS entries allocated to the API implementation


Expert Solution
Questions # 7:

A company is using an on-prem cluster in the data center as a runtime plane and MuleSoft-hosted control plane.

How can the company monitor the detailed performance metrics on the Mule applications deployed to the cluster from the control plane?

Options:

A.

The settings of the Monitoring section in the control plane must be updated to enable detailed logging on the metrics to be captured


B.

Monitoring Agent must be installed on each node in the cluster


C.

Due to the potential performance impact on the runtime nodes, the Monitoring agent should be installed on a separate server


D.

There is no action needed as the on-prem runtime automatically sends the performance data to the control plane


Expert Solution
Questions # 8:

An API is protected with a Client ID Enforcement policy and uses the default configuration. Access is requested for the client application to the API, and an approved

contract now exists between the client application and the API

How can a consumer of this API avoid a 401 error "Unauthorized or invalid client application credentials"?

Options:

A.

Send the obtained token as a header in every call


B.

Send the obtained: client_id and client_secret in the request body


C.

Send the obtained clent_id and clent_secret as URI parameters in every call


D.

Send the obtained clent_id and client_secret in the header of every API Request call


Expert Solution
Questions # 9:

An API implementation is deployed to CloudHub.

What conditions can be alerted on using the default Anypoint Platform functionality, where the alert conditions depend on the API invocations to an API implementation?

Options:

A.

When the API invocations are sent directly to the internal DNS record of the API implementation


B.

When the API invocations are not over-a- secure TLS/SSL communication channel


C.

When the APL invecations originate from a geography different than the API


D.

When the number of API invocations are below a threshold


Expert Solution
Questions # 10:

In which layer of API-led connectivity, does the business logic orchestration reside?

Options:

A.

System Layer


B.

Experience Layer


C.

Process Layer


Expert Solution
Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions