Winter Sale Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Salesforce MuleSoft-Platform-Architect-I Salesforce Certified MuleSoft Platform Architect (Mule-Arch-201) Exam Practice Test

Salesforce Certified MuleSoft Platform Architect (Mule-Arch-201) Questions and Answers

Question 1

True or False. We should always make sure that the APIs being designed and developed are self-servable even if it needs more man-day effort and resources.

Options:

A.

FALSE

B.

TRUE

Question 2

A Platform Architect inherits a legacy monolithic SOAP-based web service that performs a number of tasks, including showing all policies belonging to a client. The service connects to two back-end systems — a life-insurance administration system and a general-insurance administration system — and then queries for insurance policy information within each system, aggregates the results, and presents a SOAP-based response to a user interface (UI).

The architect wants to break up the monolithic web service to follow API-led conventions.

Which part of the service should be put into the process layer?

Options:

A.

Combining the insurance policy information from the administration systems

B.

Presenting the SOAP-based response to the UI

C.

Authenticating and maintaining connections to each of the back-end administration systems

D.

Querying the data from the administration systems

Question 3

When should idempotency be taken into account?

Options:

A.

When making requests to update currently locked entities

B.

When storing the results of s previous request for use in response to subsequent requests

C.

When sending concurrent update requests for the same entity

D.

When preventing duplicate processing from multiple sent requests

Question 4

A client has several applications running on the Salesforce service cloud. The business requirement for integration is to get daily data changes from Account and Case

Objects. Data needs to be moved to the client's private cloud AWS DynamoDB instance as a single JSON and the business foresees only wanting five attributes from the

Account object, which has 219 attributes (some custom) and eight attributes from the Case Object.

What design should be used to support the API/ Application data model?

Options:

A.

Create separate entities for Account and Case Objects by mimicking all the attributes in SAPI, which are combined by the PAPI and filtered to provide JSON output containing 13 attributes.

B.

Request client’s AWS project team to replicate all the attributes and create Account and Case JSON table in DynamoDB. Then create separate entities for Account and Case Objects by mimicking all the attributes in SAPI to transfer ISON data to DynamoD for respective Objects

C.

Start implementing an Enterprise Data Model by defining enterprise Account and Case Objects and implement SAPI and DynamoDB tables based on the Enterprise Data Model,

D.

Create separate entities for Account with five attributes and Case with eight attributes in SAPI, which are combined by the PAPI to provide JSON output containing 13 attributes.

Question 5

A system API has a guaranteed SLA of 100 ms per request. The system API is deployed to a primary environment as well as to a disaster recovery (DR) environment, with different DNS names in each environment. An upstream process API invokes the system API and the main goal of this process API is to respond to client requests in the least possible time. In what order should the system APIs be invoked, and what changes should be made in order to speed up the response time for requests from the process API?

Options:

A.

In parallel, invoke the system API deployed to the primary environment and the system API deployed to the DR environment, and ONLY use the first response

B.

In parallel, invoke the system API deployed to the primary environment and the system API deployed to the DR environment using a scatter-gather configured with a timeout, and then merge the responses

C.

Invoke the system API deployed to the primary environment, and if it fails, invoke the system API deployed to the DR environment

D.

Invoke ONLY the system API deployed to the primary environment, and add timeout and retry logic to avoid intermittent failures

Question 6

Which statement is true about Spike Control policy and Rate Limiting policy?

Options:

A.

All requests are rejected after the limit is reached in Rate Limiting policy, whereas the requests are queued in Spike Control policy after the limit is reached

B.

In a clustered environment, the Rate Limiting.and Spike Control policies are applied to each node in the cluster

C.

To protect Experience APIs by limiting resource consumption, Rate Limiting policy must be applied

D.

In order to apply Rate Limiting and Spike Control policies, a contract to bind client application and API is needed for both

Question 7

What is the most performant out-of-the-box solution in Anypoint Platform to track transaction state in an asynchronously executing long-running process implemented as a Mule application deployed to multiple CloudHub workers?

Options:

A.

Redis distributed cache

B.

java.util.WeakHashMap

C.

Persistent Object Store

D.

File-based storage

Question 8

An enterprise is embarking on the API-led digital transformation journey, and the central IT team has started to define System APIs. Currently there is no Enterprise

Data Model being defined within the enterprise, and the definition of a clean Bounded Context Data Model requires too much effort.

According to MuleSoft's recommended guidelines, how should the System API data model be defined?

Options:

A.

If there are misspellings of the data fields in the back-end system, Systerm APIs should not correct it, and expose it as-is to mirror the back-end systems

B.

The data model of the System APIs should make use of data types that approximately mirror those from the back-end systems

C.

The data model should define its own naming convention, and not follow the same naming as the back-end systems

D.

The System APIs should expose all back-end system fields

Question 9

An organization is deploying their new implementation of the OrderStatus System API to multiple workers in CloudHub. This API fronts the organization's on-premises Order Management System, which is accessed by the API implementation over an IPsec tunnel.

What type of error typically does NOT result in a service outage of the OrderStatus System API?

Options:

A.

A CloudHub worker fails with an out-of-memory exception

B.

API Manager has an extended outage during the initial deployment of the API implementation

C.

The AWS region goes offline with a major network failure to the relevant AWS data centers

D.

The Order Management System is Inaccessible due to a network outage in the organization's on-premises data center

Question 10

An API implementation is updated. When must the RAML definition of the API also be updated?

Options:

A.

When the API implementation changes the structure of the request or response messages

B.

When the API implementation changes from interacting with a legacy backend system deployed on-premises to a modern, cloud-based (SaaS) system

C.

When the API implementation is migrated from an older to a newer version of the Mule runtime

D.

When the API implementation is optimized to improve its average response time

Question 11

What is most likely NOT a characteristic of an integration test for a REST API implementation?

Options:

A.

The test needs all source and/or target systems configured and accessible

B.

The test runs immediately after the Mule application has been compiled and packaged

C.

The test is triggered by an external HTTP request

D.

The test prepares a known request payload and validates the response payload

Question 12

An Anypoint Platform organization has been configured with an external identity provider (IdP) for identity management and client management. What credentials or token must be provided to Anypoint CLI to execute commands against the Anypoint Platform APIs?

Options:

A.

The credentials provided by the IdP for identity management

B.

The credentials provided by the IdP for client management

C.

An OAuth 2.0 token generated using the credentials provided by the IdP for client management

D.

An OAuth 2.0 token generated using the credentials provided by the IdP for identity management

Question 13

When using CloudHub with the Shared Load Balancer, what is managed EXCLUSIVELY by the API implementation (the Mule application) and NOT by Anypoint Platform?

Options:

A.

The assignment of each HTTP request to a particular CloudHub worker

B.

The logging configuration that enables log entries to be visible in Runtime Manager

C.

The SSL certificates used by the API implementation to expose HTTPS endpoints

D.

The number of DNS entries allocated to the API implementation

Question 14

A Mule 4 API has been deployed to CloudHub and a Basic Authentication - Simple policy has been applied to all API methods and resources. However, the API is still accessible

by clients without using authentication.

How is this possible?

Options:

A.

The APE Router component is pointing to the incorrect Exchange version of the APT

B.

The Autodiscovery element is not present, in the deployed Mule application

C.

No… for client applications have been created of this API

D.

One of the application’s CloudHub workers restarted

Question 15

The application network is recomposable: it is built for change because it "bends but does not break"

Options:

A.

TRUE

B.

FALSE

Question 16

A company requires Mule applications deployed to CloudHub to be isolated between non-production and production environments. This is so Mule applications deployed to non-production environments can only access backend systems running in their customer-hosted non-production environment, and so Mule applications deployed to production environments can only access backend systems running in their customer-hosted production environment. How does MuleSoft recommend modifying Mule applications, configuring environments, or changing infrastructure to support this type of per-environment isolation between Mule applications and backend systems?

Options:

A.

Modify properties of Mule applications deployed to the production Anypoint Platform environments to prevent access from non-production Mule applications

B.

Configure firewall rules in the infrastructure inside each customer-hosted environment so that only IP addresses from the corresponding Anypoint Platform environments are allowed to communicate with corresponding backend systems

C.

Create non-production and production environments in different Anypoint Platform business groups

D.

Create separate Anypoint VPCs for non-production and production environments, then configure connections to the backend systems in the corresponding customer-hosted environments

Question 17

What best explains the use of auto-discovery in API implementations?

Options:

A.

It makes API Manager aware of API implementations and hence enables it to enforce policies

B.

It enables Anypoint Studio to discover API definitions configured in Anypoint Platform

C.

It enables Anypoint Exchange to discover assets and makes them available for reuse

D.

It enables Anypoint Analytics to gain insight into the usage of APIs

Question 18

A Rate Limiting policy is applied to an API implementation to protect the back-end system. Recently, there have been surges in demand that cause some API client

POST requests to the API implementation to be rejected with policy-related errors, causing delays and complications to the API clients.

How should the API policies that are applied to the API implementation be changed to reduce the frequency of errors returned to API clients, while still protecting the back-end

system?

Options:

A.

Keep the Rate Limiting policy and add 9 Client ID Enforcement policy

B.

Remove the Rate Limiting policy and add an HTTP Caching policy

C.

Remove the Rate Limiting policy and add a Spike Control policy

D.

Keep the Rate Limiting policy and add an SLA-based Spike Control policy

Question 19

Say, there is a legacy CRM system called CRM-Z which is offering below functions:

1. Customer creation

2. Amend details of an existing customer

3. Retrieve details of a customer

4. Suspend a customer

Options:

A.

Implement a system API named customerManagement which has all the functionalities wrapped in it as various operations/resources

B.

Implement different system APIs named createCustomer, amendCustomer, retrieveCustomer and suspendCustomer as they are modular and has seperation of concerns

C.

Implement different system APIs named createCustomerInCRMZ, amendCustomerInCRMZ, retrieveCustomerFromCRMZ and suspendCustomerInCRMZ as they are modular and has seperation of concerns

Question 20

An organization uses various cloud-based SaaS systems and multiple on-premises systems. The on-premises systems are an important part of the organization's application network and can only be accessed from within the organization's intranet.

What is the best way to configure and use Anypoint Platform to support integrations with both the cloud-based SaaS systems and on-premises systems?

A) Use CloudHub-deployed Mule runtimes in an Anypoint VPC managed by Anypoint Platform Private Cloud Edition control plane

B) Use CloudHub-deployed Mule runtimes in the shared worker cloud managed by the MuleSoft-hosted Anypoint Platform control plane

C) Use an on-premises installation of Mule runtimes that are completely isolated with NO external network access, managed by the Anypoint Platform Private Cloud Edition control plane

D) Use a combination of Cloud Hub-deployed and manually provisioned on-premises Mule runtimes managed by the MuleSoft-hosted Anypoint Platform control plane

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 21

Refer to the exhibit.

what is true when using customer-hosted Mule runtimes with the MuleSoft-hosted Anypoint Platform control plane (hybrid deployment)?

Options:

A.

Anypoint Runtime Manager initiates a network connection to a Mule runtime in order to deploy Mule applications

B.

The MuleSoft-hosted Shared Load Balancer can be used to load balance API invocations to the Mule runtimes

C.

API implementations can run successfully in customer-hosted Mule runtimes, even when they are unable to communicate with the control plane

D.

Anypoint Runtime Manager automatically ensures HA in the control plane by creating a new Mule runtime instance in case of a node failure

Question 22

An organization has created an API-led architecture that uses various API layers to integrate mobile clients with a backend system. The backend system consists of a number of specialized components and can be accessed via a REST API. The process and experience APIs share the same bounded-context model that is different from the backend data model. What additional canonical models, bounded-context models, or anti-corruption layers are best added to this architecture to help process data consumed from the backend system?

Options:

A.

Create a bounded-context model for every layer and overlap them when the boundary contexts overlap, letting API developers know about the differences between upstream and downstream data models

B.

Create a canonical model that combines the backend and API-led models to simplify and unify data models, and minimize data transformations.

C.

Create a bounded-context model for the system layer to closely match the backend data model, and add an anti-corruption layer to let the different bounded contexts cooperate across the system and process layers

D.

Create an anti-corruption layer for every API to perform transformation for every data model to match each other, and let data simply travel between APIs to avoid the complexity and overhead of building canonical models

Question 23

A team is planning to enhance an Experience API specification, and they are following API-led connectivity design principles.

What is their motivation for enhancing the API?

Options:

A.

The primary API consumer wants certain kinds of endpoints changed from the Center for Enablement standard to the consumer system standard

B.

The underlying System API is updated to provide more detailed data for several heavily used resources

C.

An IP Allowlist policy is being added to the API instances in the Development and Staging environments

D.

A Canonical Data Model is being adopted that impacts several types of data included in the API

Question 24

An API has been updated in Anypoint exchange by its API producer from version 3.1.1 to 3.2.0 following accepted semantic versioning practices and the changes have been communicated via the APIs public portal. The API endpoint does NOT change in the new version. How should the developer of an API client respond to this change?

Options:

A.

The API producer should be requested to run the old version in parallel with the new one

B.

The API producer should be contacted to understand the change to existing functionality

C.

The API client code only needs to be changed if it needs to take advantage of the new features

D.

The API clients need to update the code on their side and need to do full regression

Question 25

How can the application of a rate limiting API policy be accurately reflected in the RAML definition of an API?

Options:

A.

By refining the resource definitions by adding a description of the rate limiting policy behavior

B.

By refining the request definitions by adding a remaining Requests query parameter with description, type, and example

C.

By refining the response definitions by adding the out-of-the-box Anypoint Platform rate-limit-enforcement securityScheme with description, type, and example

D.

By refining the response definitions by adding the x-ratelimit-* response headers with description, type, and example

Question 26

What do the API invocation metrics provided by Anypoint Platform provide?

Options:

A.

ROI metrics from APIs that can be directly shared with business users

B.

Measurements of the effectiveness of the application network based on the level of reuse

C.

Data on past API invocations to help identify anomalies and usage patterns across various APIs

D.

Proactive identification of likely future policy violations that exceed a given threat threshold

Question 27

Traffic is routed through an API proxy to an API implementation. The API proxy is managed by API Manager and the API implementation is deployed to a CloudHub VPC using Runtime Manager. API policies have been applied to this API. In this deployment scenario, at what point are the API policies enforced on incoming API client requests?

Options:

A.

At the API proxy

B.

At the API implementation

C.

At both the API proxy and the API implementation

D.

At a MuleSoft-hosted load balancer

Question 28

An online store's marketing team has noticed an increase in customers leaving online baskets without checking out. They suspect a technology issue is at the root cause of the baskets being left behind. They approach the Center for Enablement to ask for help identifying the issue. Multiple APIs from across all the layers of their application network are involved in the shopping application.

Which feature of the Anypoint Platform can be used to view metrics from all involved APIs at the same time?

Options:

A.

Custom dashboards

B.

Built-in dashboards

C.

Functional monitoring

D.

API Manager

Question 29

A new upstream API Is being designed to offer an SLA of 500 ms median and 800 ms maximum (99th percentile) response time. The corresponding API implementation needs to sequentially invoke 3 downstream APIs of very similar complexity.

The first of these downstream APIs offers the following SLA for its response time: median: 100 ms, 80th percentile: 500 ms, 95th percentile: 1000 ms.

If possible, how can a timeout be set in the upstream API for the invocation of the first downstream API to meet the new upstream API's desired SLA?

Options:

A.

Set a timeout of 50 ms; this times out more invocations of that API but gives additional room for retries

B.

Set a timeout of 100 ms; that leaves 400 ms for the other two downstream APIs to complete

C.

No timeout is possible to meet the upstream API's desired SLA; a different SLA must be negotiated with the first downstream API or invoke an alternative API

D.

Do not set a timeout; the Invocation of this API Is mandatory and so we must wait until it responds

Question 30

An operations team is analyzing the effort needed to set up monitoring of their application network. They are looking at which API invocation metrics can be used to identify and predict trouble without having to write custom scripts or install additional analytics software or tools.

Which type of metrics can satisfy this goal of directly identifying and predicting failures?

Options:

A.

The number and types of API policy violations per day

B.

The effectiveness of the application network based on the level of reuse

C.

The number and types of past API invocations across the application network

D.

The ROI from each APT invocation

Question 31

A customer wants to monitor and gain insights about the number of requests coming in a given time period as well as to measure key performance indicators

(response times, CPU utilization, number of active APIs).

Which tool provides these data insights?

Options:

A.

Anypoint Monitoring

B.

APT Manager

C.

Runtime Alerts

D.

Functional Monitoring

Question 32

When can CloudHub Object Store v2 be used?

Options:

A.

To store an unlimited number of key-value pairs

B.

To store payloads with an average size greater than 15MB

C.

To store information in Mule 4 Object Store v1

D.

To store key-value pairs with keys up to 300 characters

Question 33

What correctly characterizes unit tests of Mule applications?

Options:

A.

They test the validity of input and output of source and target systems

B.

They must be run in a unit testing environment with dedicated Mule runtimes for the environment

C.

They must be triggered by an external client tool or event source

D.

They are typically written using MUnit to run in an embedded Mule runtime that does not require external connectivity

Question 34

Question 10: Skipped

An API implementation returns three X-RateLimit-* HTTP response headers to a requesting API client. What type of information do these response headers indicate to the API client?

Options:

A.

The error codes that result from throttling

B.

A correlation ID that should be sent in the next request

C.

The HTTP response size

D.

The remaining capacity allowed by the API implementation

Question 35

What is a key requirement when using an external Identity Provider for Client Management in Anypoint Platform?

Options:

A.

Single sign-on is required to sign in to Anypoint Platform

B.

The application network must include System APIs that interact with the Identity Provider

C.

To invoke OAuth 2.0-protected APIs managed by Anypoint Platform, API clients must submit access tokens issued by that same Identity Provider

D.

APIs managed by Anypoint Platform must be protected by SAML 2.0 policies

Question 36

A Platinum customer uses the U.S. control plane and deploys applications to CloudHub in Singapore with a default log configuration.

The compliance officer asks where the logs and monitoring data reside?

Options:

A.

Logs are held in:Singapore and monitoring data is held in the United States

B.

Logs and monitoring data are held in the United States

C.

Logs are held in the United States and monitoring data is held in Singapore

D.

Logs and monitoring data are held in Singapore

Question 37

When could the API data model of a System API reasonably mimic the data model exposed by the corresponding backend system, with minimal improvements over the backend system's data model?

Options:

A.

When there is an existing Enterprise Data Model widely used across the organization

B.

When the System API can be assigned to a bounded context with a corresponding data model

C.

When a pragmatic approach with only limited isolation from the backend system is deemed appropriate

D.

When the corresponding backend system is expected to be replaced in the near future

Question 38

What API policy would be LEAST LIKELY used when designing an Experience API that is intended to work with a consumer mobile phone or tablet application?

Options:

A.

OAuth 2.0 access token enforcement

B.

Client ID enforcement

C.

JSON threat protection

D.

IPwhitellst

Question 39

In which layer of API-led connectivity, does the business logic orchestration reside?

Options:

A.

System Layer

B.

Experience Layer

C.

Process Layer

Question 40

Refer to the exhibit.

What is a valid API in the sense of API-led connectivity and application networks?

A) Java RMI over TCP

B) Java RMI over TCP

C) CORBA over HOP

D) XML over UDP

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 41

What is a best practice when building System APIs?

Options:

A.

Document the API using an easily consumable asset like a RAML definition

B.

Model all API resources and methods to closely mimic the operations of the backend system

C.

Build an Enterprise Data Model (Canonical Data Model) for each backend system and apply it to System APIs

D.

Expose to API clients all technical details of the API implementation's interaction wifch the backend system

Question 42

To minimize operation costs, a customer wants to use a CloudHub 1.0 solution. The customer's requirements are:

* Separate resources with two Business groups

* High-availability (HA) for all APIs

* Route traffic via Dedicated load balancer (DLBs)

* Separate environments into production and non-production

Which solution meets the customer's needs?

Options:

A.

One production and one non-production Virtual Private Cloud (VPC). Use availability zones to differentiate between Business groups. Allocate maximum CIDR per VPCs to ensure HA across availability zones

B.

One production and one non-production Virtual Private Cloud (VPC) per Business group. Minimize CIDR aligning with projected application total. Choose a MuleSoft CloudHub 1.0 region with multiple availability zones. Deploy multiple workers for HA,

C.

One production and one non-production Virtual Private Cloud (VPC) per Business group. Minimize CIDR aligning with projected application total. Divide availability zones during deployment of APIs for HA.

D.

One production and one non-production Virtual Private Claud (VPC). Configure subnet to differentiate between business groups. Allocate maximum CIDR per VPCs to make it easier to add Child groups. Span VPC to cover three availability zones.

Question 43

What is true about where an API policy is defined in Anypoint Platform and how it is then applied to API instances?

Options:

A.

The API policy Is defined In Runtime Manager as part of the API deployment to a Mule runtime, and then ONLY applied to the specific API Instance

B.

The API policy Is defined In API Manager for a specific API Instance, and then ONLY applied to the specific API instance

C.

The API policy Is defined in API Manager and then automatically applied to ALL API instances

D.

The API policy is defined in API Manager, and then applied to ALL API instances in the specified environment

Question 44

An API implementation is deployed to CloudHub.

What conditions can be alerted on using the default Anypoint Platform functionality, where the alert conditions depend on the end-to-end request processing of the API implementation?

Options:

A.

When the API is invoked by an unrecognized API client

B.

When a particular API client invokes the API too often within a given time period

C.

When the response time of API invocations exceeds a threshold

D.

When the API receives a very high number of API invocations

Question 45

Which three tools automate the deployment of Mule applications?

Choose 3 answers

Options:

A.

Runtime Manager

B.

Anypoint Platform CLI

C.

Platform APIs

D.

Anypoint Studio

E.

Mule Mayen plugin

F.

API Community Manager