Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Salesforce Salesforce MuleSoft MuleSoft-Platform-Architect-I Questions and answers with CertsForce

Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions
Questions # 31:

An organization requires several APIs to be secured with OAuth 2.0, and PingFederate has been identified as the identity provider for API client authorization, The

PingFederate Client Provider is configured in access management, and the PingFederate OAuth 2.0 Token Enforcement policy is configured for the API instances required by the

organization. The API instances reside in two business groups (Group A and Group B) within the Master Organization (Master Org).

What should be done to allow API consumers to access the API instances?

Options:

A.

The API administrator should configure the correct client discovery URL in both child business groups, and the API consumer should request access to the API in Ping Identity


B.

The API administrator should grant access to the API consumers by creating contracts in the relevant API instances in API Manager


C.

The APL consumer should create a client application and request access to the APT in Anypoint Exchange, and the API administrator should approve the request


D.

The APT consumer should create a client application and request access to the API in Ping Identity, and the organization's Ping Identity workflow will grant access


Expert Solution
Questions # 32:

What is a best practice when building System APIs?

Options:

A.

Document the API using an easily consumable asset like a RAML definition


B.

Model all API resources and methods to closely mimic the operations of the backend system


C.

Build an Enterprise Data Model (Canonical Data Model) for each backend system and apply it to System APIs


D.

Expose to API clients all technical details of the API implementation's interaction wifch the backend system


Expert Solution
Questions # 33:

A manufacturing company has deployed an API implementation to CloudHub and has not configured it to be automatically restarted by CloudHub when the worker is

not responding.

Which statement is true when no API Client invokes that API implementation?

Options:

A.

No alert on the API invocations and APT implementation can be raised


B.

Alerts on the APT invocation and API implementation can be raised


C.

No alert on the API invocations is raised but alerts on the API implementation can be raised


D.

Alerts on the API invocations are raised but no alerts on the API implementation can be raised


Expert Solution
Questions # 34:

When could the API data model of a System API reasonably mimic the data model exposed by the corresponding backend system, with minimal improvements over the backend system's data model?

Options:

A.

When there is an existing Enterprise Data Model widely used across the organization


B.

When the System API can be assigned to a bounded context with a corresponding data model


C.

When a pragmatic approach with only limited isolation from the backend system is deemed appropriate


D.

When the corresponding backend system is expected to be replaced in the near future


Expert Solution
Questions # 35:

What Mule application deployment scenario requires using Anypoint Platform Private Cloud Edition or Anypoint Platform for Pivotal Cloud Foundry?

Options:

A.

When it Is required to make ALL applications highly available across multiple data centers


B.

When it is required that ALL APIs are private and NOT exposed to the public cloud


C.

When regulatory requirements mandate on-premises processing of EVERY data item, including meta-data


D.

When ALL backend systems in the application network are deployed in the organization's intranet


Expert Solution
Questions # 36:

Which two statements are true about the technology architecture of an Anypoint Virtual Private Cloud (VPC)?

Choose 2 answers

Options:

A.

Ports 8081 and 8082 are used


B.

CIDR blacks are used


C.

Anypoint VPC is responsible for load balancing the applications


D.

Round-robin load balancing is used to distribute client requests across different applications


E.

By default, HTTP requests can be made from the public internet to workers at port 6091


Expert Solution
Questions # 37:

An organization has several APIs that accept JSON data over HTTP POST. The APIs are all publicly available and are associated with several mobile applications and web applications.

The organization does NOT want to use any authentication or compliance policies for these APIs, but at the same time, is worried that some bad actor could send payloads that could somehow compromise the applications or servers running the API implementations.

What out-of-the-box Anypoint Platform policy can address exposure to this threat?

Options:

A.

Shut out bad actors by using HTTPS mutual authentication for all API invocations


B.

Apply an IP blacklist policy to all APIs; the blacklist will Include all bad actors


C.

Apply a Header injection and removal policy that detects the malicious data before it is used


D.

Apply a JSON threat protection policy to all APIs to detect potential threat vectors


Expert Solution
Questions # 38:

An organization wants to create a Center for Enablement (C4E). The IT director schedules a series of meetings with IT senior managers.

What should be on the agenda of the first meeting?

Options:

A.

Define C4E objectives, mission statement, guiding principles, a


B.

Explore API monetization options based on identified use cases through MuleSoft


C.

A walk through of common-services best practices for logging, auditing, exception handling, caching, security via policy, and rate limiting/throttling via policy


D.

Specify operating model for the MuleSoft Integrations division


Expert Solution
Questions # 39:

A company wants to move its Mule API implementations into production as quickly as possible. To protect access to all Mule application data and metadata, the company requires that all Mule applications be deployed to the company's customer-hosted infrastructure within the corporate firewall. What combination of runtime plane and control plane options meets these project lifecycle goals?

Options:

A.

Manually provisioned customer-hosted runtime plane and customer-hosted control plane


B.

MuleSoft-hosted runtime plane and customer-hosted control plane


C.

Manually provisioned customer-hosted runtime plane and MuleSoft-hosted control plane


D.

iPaaS provisioned customer-hosted runtime plane and MuleSoft-hosted control plane


Expert Solution
Questions # 40:

An enterprise is embarking on the API-led digital transformation journey, and the central IT team has started to define System APIs. Currently there is no Enterprise

Data Model being defined within the enterprise, and the definition of a clean Bounded Context Data Model requires too much effort.

According to MuleSoft's recommended guidelines, how should the System API data model be defined?

Options:

A.

If there are misspellings of the data fields in the back-end system, Systerm APIs should not correct it, and expose it as-is to mirror the back-end systems


B.

The data model of the System APIs should make use of data types that approximately mirror those from the back-end systems


C.

The data model should define its own naming convention, and not follow the same naming as the back-end systems


D.

The System APIs should expose all back-end system fields


Expert Solution
Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions