Pass the Salesforce Salesforce MuleSoft MuleSoft-Platform-Architect-I Questions and answers with CertsForce

Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions
Questions # 21:

An operations team is analyzing the effort needed to set up monitoring of their application network. They are looking at which API invocation metrics can be used to identify and predict trouble without having to write custom scripts or install additional analytics software or tools.

Which type of metrics can satisfy this goal of directly identifying and predicting failures?

Options:

A.

The number and types of API policy violations per day


B.

The effectiveness of the application network based on the level of reuse


C.

The number and types of past API invocations across the application network


D.

The ROI from each APT invocation


Expert Solution
Questions # 22:

When must an API implementation be deployed to an Anypoint VPC?

Options:

A.

When the API Implementation must invoke publicly exposed services that are deployed outside of CloudHub in a customer- managed AWS instance


B.

When the API implementation must be accessible within a subnet of a restricted customer-hosted network that does not allow public access


C.

When the API implementation must be deployed to a production AWS VPC using the Mule Maven plugin


D.

When the API Implementation must write to a persistent Object Store


Expert Solution
Questions # 23:

An organization has created an API-led architecture that uses various API layers to integrate mobile clients with a backend system. The backend system consists of a number of specialized components and can be accessed via a REST API. The process and experience APIs share the same bounded-context model that is different from the backend data model. What additional canonical models, bounded-context models, or anti-corruption layers are best added to this architecture to help process data consumed from the backend system?

Options:

A.

Create a bounded-context model for every layer and overlap them when the boundary contexts overlap, letting API developers know about the differences between upstream and downstream data models


B.

Create a canonical model that combines the backend and API-led models to simplify and unify data models, and minimize data transformations.


C.

Create a bounded-context model for the system layer to closely match the backend data model, and add an anti-corruption layer to let the different bounded contexts cooperate across the system and process layers


D.

Create an anti-corruption layer for every API to perform transformation for every data model to match each other, and let data simply travel between APIs to avoid the complexity and overhead of building canonical models


Expert Solution
Questions # 24:

Several times a week, an API implementation shows several thousand requests per minute in an Anypoint Monitoring dashboard, Between these bursts, the

dashboard shows between two and five requests per minute. The API implementation is running on Anypoint Runtime Fabric with two non-clustered replicas, reserved vCPU 1.0

and vCPU Limit 2.0.

An API consumer has complained about slow response time, and the dashboard shows the 99 percentile is greater than 120 seconds at the time of the complaint. It also shows

greater than 90% CPU usage during these time periods.

In manual tests in the QA environment, the API consumer has consistently reproduced the slow response time and high CPU usage, and there were no other API requests at

this time. In a brainstorming session, the engineering team has created several proposals to reduce the response time for requests.

Which proposal should be pursued first?

Options:

A.

Increase the vCPU resources of the API implementation


B.

Modify the API client to split the problematic request into smaller, less-demanding requests


C.

Increase the number of replicas of the API implementation


D.

Throttle the APT client to reduce the number of requests per minute


Expert Solution
Questions # 25:

What CANNOT be effectively enforced using an API policy in Anypoint Platform?

Options:

A.

Guarding against Denial of Service attacks


B.

Maintaining tamper-proof credentials between APIs


C.

Logging HTTP requests and responses


D.

Backend system overloading


Expert Solution
Questions # 26:

What is a typical result of using a fine-grained rather than a coarse-grained API deployment model to implement a given business process?

Options:

A.

A decrease in the number of connections within the application network supporting the business process


B.

A higher number of discoverable API-related assets in the application network


C.

A better response time for the end user as a result of the APIs being smaller in scope and complexity


D.

An overall tower usage of resources because each fine-grained API consumes less resources


Expert Solution
Questions # 27:

Which component monitors APIs and endpoints at scheduled intervals, receives reports about whether tests pass or fail, and displays statistics about API and endpoint

performance?

Options:

A.

API Analytics


B.

Anypoint Monitoring dashboards


C.

APT Functional Monitoring


D.

Anypoint Runtime Manager alerts


Expert Solution
Questions # 28:

Which of the below, when used together, makes the IT Operational Model effective?

Options:

A.

Create reusable assets, Do marketing on the created assets across organization, Arrange time to time LOB reviews to ensure assets are being consumed or not


B.

Create reusable assets, Make them discoverable so that LOB teams can self-serve and browse the APIs, Get active feedback and usage metrics


C.

Create resuable assets, make them discoverable so that LOB teams can self-serve and browse the APIs


Expert Solution
Questions # 29:

A company stores financial transaction data in two legacy systems. For each legacy system, a separate, dedicated System API (SAPI) exposes data for that legacy system. A Process API (PAPI) merges the data retrieved from ail of the System APIs into a common format. Several API clients call the PAPI through its public domain name.

The company now wants to expose a subset of financial data to a newly developed mobile application that uses a different Bounded Context Data Model. The company wants to follow MuleSoft's best practices for building out an effective application network.

Following MuleSoft's best practices, how can the company expose financial data needed by the mobile application in a way that minimizes the impact on the currently running API clients, API implementations, and support asset reuse?

Options:

A.

Add two new Experience APIs (EAPI-i and EAPI-2}.

Add Mobile PAPI-2 to expose the Intended subset of financial data as requested.

Both PAPIs access the Legacy Systems via SAPI-1 and SAP]-2.


B.

Add two new Experience APIs (EAPI-i and EAPI-2}.

Add Mobile PAPI-2 to expose the Intended subset of financial data as requested.

Both PAPIs access the Legacy Systems via SAPI-1 and SAP]-2.


C.

Create a new mobile Experince API (EAPI) chat exposes that subset of PAPI endpoints.

Add transformtion login to the mobile Experince API implementation to make mobile data compatible with the required PAPIs.

29


D.

Develop and deploy is new PAPI implementation with data transformation and ... login to support this required endpoints of both mobile and web clients.

Deploy an API Proxy with an endpoint from API Manager that redirect the existing PAPI endpoints to the new PAPI.


Expert Solution
Questions # 30:

A client has several applications running on the Salesforce service cloud. The business requirement for integration is to get daily data changes from Account and Case

Objects. Data needs to be moved to the client's private cloud AWS DynamoDB instance as a single JSON and the business foresees only wanting five attributes from the

Account object, which has 219 attributes (some custom) and eight attributes from the Case Object.

What design should be used to support the API/ Application data model?

Options:

A.

Create separate entities for Account and Case Objects by mimicking all the attributes in SAPI, which are combined by the PAPI and filtered to provide JSON output containing 13 attributes.


B.

Request client’s AWS project team to replicate all the attributes and create Account and Case JSON table in DynamoDB. Then create separate entities for Account and Case Objects by mimicking all the attributes in SAPI to

transfer ISON data to DynamoD for respective Objects


C.

Start implementing an Enterprise Data Model by defining enterprise Account and Case Objects and implement SAPI and DynamoDB tables based on the Enterprise Data Model,


D.

Create separate entities for Account with five attributes and Case with eight attributes in SAPI, which are combined by the PAPI to provide JSON output containing 13 attributes.


Expert Solution
Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions