New Year Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

MuleSoft-Integration-Architect-I Salesforce Certified MuleSoft Platform Integration Architect (Mule-Arch-202) Questions and Answers

Questions 4

An organization is building a test suite for their applications using m-unit. The integration architect has recommended using test recorder in studio to record the processing flows and then configure unit tests based on the capture events

What are the two considerations that must be kept in mind while using test recorder

(Choose two answers)

Options:

A.

Tests for flows cannot be created with Mule errors raised insidethe flow or already existing in the incoming event

B.

Recorder supports smoking a message before or inside a ForEach processor

C.

The recorder support loops where the structure of the data been testedchanges inside the iteration

D.

A recorded flow execution ends successfully but the result doesnot reach its destination because the application is killed

E.

Mocking values resulting from parallel processes are possible and will not affect the execution of the processes that follow in the test

Buy Now
Questions 5

An integration Mute application consumes and processes a list of rows from a CSV file. Each row must be read from the CSV file, validated, and the row data sent to a JMS queue, in the exact order as in the CSV file.

If any processing step for a row falls, then a log entry must be written for that row, but processing of other rows must not be affected.

What combination of Mute components is most idiomatic (used according to their intended purpose) when Implementing the above requirements?

Options:

A.

Scatter-Gather component On Error Continue scope

B.

VM connector first Successful scope On Error Propagate scope

C.

For Each scope On Error Continue scope

D.

Async scope On Error Propagate scope

Buy Now
Questions 6

A REST API is being designed to implement a Mule application.

What standard interface definition language can be used to define REST APIs?

Options:

A.

Web Service Definition Language(WSDL)

B.

OpenAPI Specification (OAS)

C.

YAML

D.

AsyncAPI Specification

Buy Now
Questions 7

An organization has several APIs that accept JSON data over HTTP POST. The APIs are all publicly available and are associated with several mobile applications and web applications. The organization does NOT want to use any authentication or compliance policies for these APIs, but at the same time, is worried that some bad actor could send payloads that could somehow compromise the applications or servers running the API implementations. What out-of-the-box Anypoint Platform policy can address exposure to this threat?

Options:

A.

Apply a Header injection and removal policy that detects the malicious data before it is used

B.

Apply an IP blacklist policy to all APIs; the blacklist will Include all bad actors

C.

Shut out bad actors by using HTTPS mutual authentication for all API invocations

D.

Apply a JSON threat protection policy to all APIs to detect potential threat vectors

Buy Now
Questions 8

A project team uses RAML specifications to document API functional requirements and deliver API definitions. As per the current legal requirement, all designed API definitions to be augmented with an additional non-functional requirement to protect the services from a high rate of requests according to define service level agreements.

Assuming that the project is following Mulesoft API governance and policies, how should the project team convey the necessary non-functional requirement to stakeholders?

Options:

A.

Create proxies in API manager for the non functional requirement and publish to exchange

B.

Add all non functional requirements as comments to RAML specification and publish to exchange

C.

Create various SLA's in API manager for the non functional requirement and publish to exchange

D.

Update API definitions with the fragment for the appropriate policy and publish to exchange

Buy Now
Questions 9

Refer to the exhibit.

A customer is running Mule applications on Runtime Fabric for Self-Managed Kubernetes

(RTF-BYOKS) in a multi-cloud environment.

Based on this configuration, how do Agents and Runtime Manager

communicate, and what Is exchanged between them?

Options:

A.

BLOCKING_IO, UBER

B.

UBER, Dedicated NIO Selector Pool

C.

CPU_LITE, CPU_INTENSIVE

D.

Shared NIO Selector Pool, CPU_LITE

Buy Now
Questions 10

As a part of design , Mule application is required call the Google Maps API to perform a distance computation. The application is deployed to cloudhub.

At the minimum what should be configured in the TLS context of the HTTP request configuration to meet these requirements?

Options:

A.

The configuration is built-in and nothing extra is required for the TLS context

B.

Request a private key from Google and create a PKCS12 file with it and add it in keyStore as a part of TLS context

C.

Download the Google public certificate from a browser, generate JKS file from it and add it in key store as a part of TLS context

D.

Download the Google public certificate from a browser, generate a JKS file from it and add it in Truststore as part of the TLS context

Buy Now
Questions 11

According to MuteSoft, which principle is common to both Service Oriented Architecture (SOA) and API-led connectivity approaches?

Options:

A.

Service centralization

B.

Service statefulness

C.

Service reusability

D.

Service interdependence

Buy Now
Questions 12

An organization is migrating all its Mule applications to Runtime Fabric (RTF). None of the Mule applications use Mule domain projects.

Currently, all the Mule applications have been manually deployed to a server group among several customer hosted Mule runtimes.

Port conflicts between these Mule application deployments are currently managed by the DevOps team who carefully manage Mule application properties files.

When the Mule applications are migrated from the current customer-hosted server group to Runtime Fabric (RTF), fo the Mule applications need to be rewritten and what DevOps port configuration responsibilities change or stay the same?

Options:

A.

Yes, the Mule applications Must be rewrittenDevOps No Longer needs to manage port conflicts between the Mule applications

B.

Yes, the Mule applications Must be rewrittenDevOps Must Still Manage port conflicts.

C.

NO, The Mule applications do NOT need to be rewrittenDevOps MUST STILL manage port conflicts

D.

NO, the Mule applications do NO need to be rewrittenDevOps NO LONGER needs to manage port conflicts between the Mule applications.

Buy Now
Questions 13

Why would an Enterprise Architect use a single enterprise-wide canonical data model (CDM) when designing an integration solution using Anypoint Platform?

Options:

A.

To reduce dependencies when integrating multiple systems that use different data formats

B.

To automate Al-enabled API implementation generation based on normalized backend databases from separate vendors

C.

To leverage a data abstraction layer that shields existing Mule applications from nonbackward compatible changes to the model's data structure

D.

To remove the need to perform data transformation when processing message payloads in Mule applications

Buy Now
Questions 14

A marketing organization is designing a Mule application to process campaign data. The Mule application will periodically check for a file in a SFTP location and process the records in the file. The size of the file can vary from 10MB to 5GB. Due to the limited availabiltty of vCores, the Mule application is deployed to a single CloudHub worker configured with vCore size 0.2.

The application must transform and send different formats of this file to three different downstream SFTP locations.

What is the most idiomatic (used for its intended purpose) and performant way to configure the SFTP operations or event sources to process the large files to support these deployment requirements?

Options:

A.

Use an in-memory repeatable stream

B.

Use a file-stored non-repeatable stream

C.

Use an in-memory non-repeatable stream

D.

Use a file-stored repeatable stream

Buy Now
Questions 15

A Mule application currently writes to two separate SQL Server database instances across the internet using a single XA transaction. It is 58. proposed to split this one transaction into two separate non-XA transactions with no other changes to the Mule application.

What non-functional requirement can be expected to be negatively affected when implementing this change?

Options:

A.

Throughput

B.

Consistency

C.

Response time

D.

Availability

Buy Now
Questions 16

What condition requires using a CloudHub Dedicated Load Balancer?

Options:

A.

When cross-region load balancing is required between separate deployments of the same Mule application

B.

When custom DNS names are required for API implementations deployed to customer-hosted Mule runtimes

C.

When API invocations across multiple CloudHub workers must be load balanced

D.

When server-side load-balanced TLS mutual authentication is required between API implementations and API clients

Buy Now
Questions 17

An organization has implemented the cluster with two customer hosted Mule runtimes is hosting an application.

This application has a flow with a JMS listener configured to consume messages from a queue destination. As an integration architect can you advise which JMS listener configuration must be used to receive messages in all the nodes of the cluster?

Options:

A.

Use the parameter primaryNodeOnly= "false" on the JMS listener

B.

Use the parameter primaryNodeOnly= "false" on the JMS listener with a shared subscription

C.

Use the parameter primaryNodeOnly= "true" on the JMS listener with a non­shared subscription

D.

Use the parameter primaryNodeOnly= "true" on the JMS listener

Buy Now
Questions 18

Which component of Anypoint platform belongs to the platform control plane?

Options:

A.

Runtime Fabric

B.

Runtime Replica

C.

Anypoint Connectors

D.

API Manager

Buy Now
Questions 19

As a part of project requirement, client will send a stream of data to mule application. Payload size can vary between 10mb to 5GB. Mule application is required to transform the data and send across multiple sftp servers. Due to the cost cuttings in the organization, mule application can only be allocated one worker with size of 0.2 vCore.

As an integration architect , which streaming strategy you would suggest to handle this scenario?

Options:

A.

In-memory non repeatable stream

B.

File based non-repeatable stream

C.

In-memory repeatable stream

D.

File based repeatable storage

Buy Now
Questions 20

An organization is in the process of building automated deployments using a CI/CD process. As a part of automated deployments, it wants to apply policies to API Instances.

What tool can the organization use to promote and deploy API Manager policies?

Options:

A.

Anypoint CLI

B.

MUnit Maven plugin

C.

Mule Maven plugin

D.

Runtime Manager agent

Buy Now
Questions 21

Which of the below requirements prevent the usage of Anypoint MQ in a company's network? (Choose two answers)

Options:

A.

single message payload can be up to 15 MB

B.

payloads must be encrypted

C.

the message broker must be hosted on premises

D.

support for point-to-point messaging

E.

ability for a third party outside the company's network to consume events from the queue

Buy Now
Questions 22

What aspects of a CI/CD pipeline for Mule applications can be automated using MuleSoft-provided Maven plugins?

Options:

A.

Compile, package, unit test, validate unit test coverage, deploy

B.

Compile, package, unit test, deploy, integration test (Incorrect)

C.

Compile, package, unit test, deploy, create associated API instances in API Manager

D.

Import from API designer, compile, package, unit test, deploy, publish to Anypoint Exchange

Buy Now
Questions 23

Additional nodes are being added to an existing customer-hosted Mule runtime cluster to improve performance. Mule applications deployed to this cluster are invoked by API clients through a load balancer.

What is also required to carry out this change?

Options:

A.

A new load balancer must be provisioned to allow traffic to the new nodes in a round-robin fashion

B.

External monitoring tools or log aggregators must be configured to recognize the new nodes

C.

API implementations using an object store must be adjusted to recognize the new nodes and persist to them

D.

New firewall rules must be configured to accommodate communication between API clients and the new nodes

Buy Now
Questions 24

An organization's governance process requires project teams to get formal approval from all key stakeholders for all new Integration design specifications. An integration Mule application Is being designed that interacts with various backend systems. The Mule application will be created using Anypoint Design Center or Anypoint Studio and will then be deployed to a customer-hosted runtime.

What key elements should be included in the integration design specification when requesting approval for this Mule application?

Options:

A.

SLAs and non-functional requirements to access the backend systems

B.

Snapshots of the Mule application's flows, including their error handling

C.

A list of current and future consumers of the Mule application and their contact details

D.

The credentials to access the backend systems and contact details for the administrator of each system

Buy Now
Questions 25

An organization will deploy Mule applications to Cloudhub, Business requirements mandate that all application logs be stored ONLY in an external splunk consolidated logging service and NOT in Cloudhub.

In order to most easily store Mule application logs ONLY in Splunk, how must Mule application logging be configured in Runtime Manager, and where should the log4j2 splunk appender be defined?

Options:

A.

Keep the default logging configuration in RuntimeManagerDefine the splunk appender in ONE global log4j.xml file that is uploaded once to Runtime Manager to support at Mule application deployments.

B.

Disable Cloudhub logging in Runtime ManagerDefine the splunk appender in EACH Mule application’s log4j2.xml file

C.

Disable Cloudhub logging in Runtime ManagerDefine the splunk appender in ONE global log4j.xml file that is uploaded once to Runtime Manger to support at Mule application deployments.

D.

Keep the default logging configuration in Runtime ManagerDefine the Splunk appender in EACH Mule application log4j2.xml file

Buy Now
Questions 26

A manufacturing company plans to deploy Mule applications to its own

Azure Kubernetes service infrastructure.The organization wants to make

the Mule applications more available and robust by deploying each Mule

application to an isolated Mule runtime in a Docker container while

managing all the Mule applications from the MuleSoft-hosted control plane.

What choice of runtime plane meets these organizational requirements?

Options:

A.

CloudHub 2.0

B.

Customer-hosted self-provisioned runtime plane

C.

Anypoint Service Mesh

D.

Anypoint Runtime Fabric

Buy Now
Questions 27

A leading e-commerce giant will use Mulesoft API's on runtime fabric (RTF) to process customer orders. Some customer's sensitive information such as credit card information is also there as a part of a API payload.

What approach minimizes the risk of matching sensitive data to the original and can convert back to the original value whenever and wherever required?

Options:

A.

Apply masking to hide the sensitive information and then use API

B.

manager to detokenize the masking format to return the original value

C.

create a tokenization format and apply a tokenization policy to the API Gateway

D.

Used both masking and tokenization

E.

Apply a field level encryption policy in the API Gateway

Buy Now
Questions 28

What is true about the network connections when a Mule application uses a JMS connector to interact with a JMS provider (message broker)?

Options:

A.

To complete sending a JMS message, the JMS connector must establish a network connection with the JMS message recipient

B.

To receive messages into the Mule application, the JMS provider initiates a network connection to the JMS connector and pushes messages along this connection

C.

The JMS connector supports both sending and receiving of JMS messages over the protocol determined by the JMS provider

D.

The AMQP protocol can be used by the JMS connector to portably establish connections to various types of JMS providers

Buy Now
Questions 29

Which Anypoint Platform component should a MuleSoft developer use to create an API specification prior to building the API implementation?

Options:

A.

MUnit

B.

API Designer

C.

API Manager

D.

Runtime Manager

Buy Now
Questions 30

Refer to the exhibit.

Anypoint Platform supports role-based access control (RBAC) to features of the platform. An organization has configured an external Identity Provider for identity management with Anypoint Platform.

What aspects of RBAC must ALWAYS be controlled from the Anypoint Platform control plane and CANNOT be controlled via the external Identity Provider?

Options:

A.

Controlling the business group within Anypoint Platform to which the user belongs

B.

Assigning Anypoint Platform permissions to a role

C.

Assigning Anypoint Platform role(s) to a user

D.

Removing a user's access to Anypoint Platform when they no longer work for the organization

Buy Now
Questions 31

When using Anypoint Platform across various lines of business with their own Anypoint Platform business groups, what configuration of Anypoint Platform is always performed at the organization level as opposed to at the business group level?

Options:

A.

Environment setup

B.

Identity management setup

C.

Role and permission setup

D.

Dedicated Load Balancer setup

Buy Now
Questions 32

What API policy would LEAST likely be applied to a Process API?

Options:

A.

Custom circuit breaker

B.

Client ID enforcement

C.

Rate limiting

D.

JSON threat protection

Buy Now
Questions 33

An integration architect is designing an API that must accept requests from API clients for both XML and JSON content over HTTP/1.1 by default.

Which API architectural style, when used for its intended and typical purposes, should the architect choose to meet these requirements?

Options:

A.

SOAP

B.

GraphQL

C.

REST

D.

grRPC

Buy Now
Questions 34

An API client is implemented as a Mule application that includes an HTTP Request operation using a default configuration. The HTTP Request operation invokes an external API that follows standard HTTP status code conventions, which causes the HTTP Request operation to return a 4xx status code.

What is a possible cause of this status code response?

Options:

A.

An error occurred inside the external API implementation when processing the HTTP request that was received from the outbound HTTP Request operation of the Mule application

B.

The external API reported that the API implementation has moved to a different external endpoint

C.

The HTTP response cannot be interpreted by the HTTP Request operation of the Mule application after it was received from the external API

D.

The external API reported an error with the HTTP request that was received from the outbound HTTP Request operation of the Mule application

Buy Now
Questions 35

As a part of business requirement , old CRM system needs to be integrated using Mule application. CRM system is capable of exchanging data only via SOAP/HTTP protocol. As an integration architect who follows API led approach , what is the the below step you will perform so that you can share document with CRM team?

Options:

A.

Create RAML specification using Design Center

B.

Create SOAP API specification using Design Center

C.

Create WSDL specification using text editor

D.

Create WSDL specification using Design Center

Buy Now
Questions 36

What Mule application can have API policies applied by Anypoint Platform to the endpoint exposed by that Mule application?

Options:

A.

A Mule application that accepts requests over HTTP/1x

B.

A Mule application that accepts JSON requests over TCP but is NOT required to provide a response.

C.

A Mule application that accepts JSON requests over WebSocket

D.

A Mule application that accepts gRPC requests over HTTP/2

Buy Now
Questions 37

A travel company wants to publish a well-defined booking service API to be shared with its business partners. These business partners have agreed to ONLY consume SOAP services and they want to get the service contracts in an easily consumable way before they start any development. The travel company will publish the initial design documents to Anypoint Exchange, then share those documents with the business partners. When using an API-led approach, what is the first design document the travel company should deliver to its business partners?

Options:

A.

Create a WSDL specification using any XML editor

B.

Create a RAML API specification using any text editor

C.

Create an OAS API specification in Design Center

D.

Create a SOAP API specification in Design Center

Buy Now
Questions 38

An organization is sizing an Anypoint VPC to extend their internal network to Cloudhub.

For this sizing calculation, the organization assumes 150 Mule applications will be deployed among three(3) production environments and will use Cloudhub’s default zero-downtime feature. Each Mule application is expected to be configured with two(2) Cloudhub workers.This is expected to result in several Mule application deployments per hour.

Options:

A.

10.0.0.0/21(2048 IPs)

B.

10.0.0.0/22(1024IPs)

C.

10.0.0.0/23(512 IPs)

D.

10.0.0.0/24(256 IPs)

Buy Now
Questions 39

Refer to the exhibit.

An organization is designing a Mule application to receive data from one external business partner. The two companies currently have no shared IT infrastructure and do not want to establish one. Instead, all communication should be over the public internet (with no VPN).

What Anypoint Connector can be used in the organization's Mule application to securely receive data from this external business partner?

Options:

A.

File connector

B.

VM connector

C.

SFTP connector

D.

Object Store connector

Buy Now
Questions 40

Which Anypoint Platform component helps integration developers discovers and share reusable APIs, connectors, and templates?

Options:

A.

Anypoint Exchange

B.

API Manager

C.

Anypoint Studio

D.

Design Center

Buy Now
Questions 41

An organization plans to migrate all its Mule applications to Runtime Fabric (RTF). Currently, all Mule applications have been deployed to CloudHub using automated CI/CD scripts.

What steps should be taken to properly migrate the applications from CloudHub to RTF, while keeping the same automated CI/CD deployment strategy?

Options:

A.

A runtimefabric dependency should be added as a mule-plugin to the pom.xml file in all the Mule applications.

B.

runtimeFabric command-line parameter should be added to the CI/CD deployment scripts.

C.

A runtimefFabricDeployment profile should be added to Mule configuration properties YAML files in all the Mule applications.CI/CD scripts must be modified to use the new configuration properties.

D.

runtimefabricDeployment profile should be added to the pom.xml file in all the Mule applications. CI/CD scripts must be modified to use the new RTF profile.

E.

- The pom.xml and Mule configuration YAML files can remain unchanged in each Mule application.A --runtimeFabric command-line parameter should be added to the CI/CD deployment scripts

Buy Now
Questions 42

What requirement prevents using Anypoint MQ as the messaging broker for a Mule application?

Options:

A.

When the payload sent through the message broker must use XML format

B.

When the payload sent through the message broker must be encrypted

C.

When the messaging broker must support point-to-point messaging

D.

When the messaging broker must be deployed on-premises

Buy Now
Questions 43

A platform architect includes both an API gateway and a service mesh in the architect of a distributed application for communication management.

Which type of communication management does a service mesh typically perform in this architecture?

Options:

A.

Between application services and the firewall

B.

Between the application and external API clients

C.

Between services within the application

D.

Between the application and external API implementations.

Buy Now
Questions 44

What is maximum vCores can be allocated to application deployed to CloudHub?

Options:

A.

1 vCores

B.

2 vCores

C.

4 vCores

D.

16 vCores

Buy Now
Questions 45

Which Salesforce API is invoked to deploy, retrieve, create, update, or delete customization information, such as custom object definitions using Mule Salesforce Connectors in a Mule application?

Options:

A.

sObject Platform Action API

B.

User Interface API

C.

Metadata API

D.

Process Rules API

Buy Now
Questions 46

An integration team uses Anypoint Platform and follows MuleSoft's recommended approach to full lifecycle API development.

Which step should the team's API designer take before the API developers implement the AP! Specification?

Options:

A.

Generate test cases using MUnit so the API developers can observe the results of running the API

B.

Use the scaffolding capability of Anypoint Studio to create an API portal based on the API specification

C.

Publish the API specification to Exchange and solicit feedback from the API's consumers

D.

Use API Manager to version the API specification

Buy Now
Questions 47

A Mule application is synchronizing customer data between two different database systems.

What is the main benefit of using XA transaction over local transactions to synchronize these two database system?

Options:

A.

Reduce latency

B.

Increase throughput

C.

Simplifies communincation

D.

Ensure consistency

Buy Now
Questions 48

Which Mulesoft feature helps users to delegate their access without sharing sensitive credentials or giving full control of accounts to 3rd parties?

Options:

A.

Secure Scheme

B.

client id enforcement policy

C.

Connected apps

D.

Certificates

Buy Now
Questions 49

An API has been updated in Anypoint Exchange by its API producer from version 3.1.1 to 3.2.0 following accepted semantic versioning practices and the changes have been communicated via the API's public portal. The API endpoint does NOT change in the new version. How should the developer of an API client respond to this change?

Options:

A.

The update should be identified as a project risk and full regression testing of the functionality that uses this API should be run.

B.

The API producer should be contacted to understand the change to existing functionality.

C.

The API producer should be requested to run the old version in parallel with the new one.

D.

The API client code ONLY needs to be changed if it needs to take advantage of new features.

Buy Now
Questions 50

An organization uses a four(4) node customer hosted Mule runtime cluster to host one(1) stateless api implementation. The API is accessed over HTTPS through a load balancer that uses round-robin for load distribution. Each node in the cluster has been sized to be able to accept four(4) times the current number of requests.

Two(2) nodes in the cluster experience a power outage and are no longer available. The load balancer directs the outage and blocks the two unavailable the nodes from receiving further HTTP requests.

What performance-related consequence is guaranteed to happen to average, assuming the remaining cluster nodes are fully operational?

Options:

A.

100% increase in the average response time of the API

B.

50% reduction in the throughput of the API

C.

100% increase in the number of requests received by each remaining node

D.

50% increase in the JVM heap memory consumed by each remaining node

Buy Now
Questions 51

What is true about automating interactions with Anypoint Platform using tools such as Anypoint Platform REST API's, Anypoint CLI or the Mule Maven plugin?

Options:

A.

By default, the Anypoint CLI and Mule Maven plugin are not included in the Mule runtime

B.

Access to Anypoint Platform API;s and Anypoint CLI can be controlled separately thruough the roles and permissions in Anypoint platform, so that specific users can get access to Anypoint CLI while others get access to the platform API's

C.

Anypoint Platform API's can only automate interactions with CloudHub while the Mule maven plugin is required for deployment to customer hosted Mule runtimes

D.

API policies can be applied to the Anypoint platform API's so that only certain LOS's has access to specific functions

Buy Now
Questions 52

An XA transaction Is being configured that involves a JMS connector listening for Incoming JMS messages. What is the meaning of the timeout attribute of the XA transaction, and what happens after the timeout expires?

Options:

A.

The time that is allowed to pass between committing the transaction and the completion of the Mule flow After the timeout, flow processing triggers an error

B.

The time that Is allowed to pass between receiving JMS messages on the same JMS connection After the timeout, a new JMS connection Is established

C.

The time that Is allowed to pass without the transaction being ended explicitly After the timeout, the transaction Is forcefully rolled-back

D.

The time that Is allowed to pass for state JMS consumer threads to be destroyed After the timeout, a new JMS consumer thread is created

Buy Now
Questions 53

What are two reasons why a typical MuleSoft customer favors a MuleSoft-hosted Anypoint Platform runtime plane over a customer-hosted runtime for its Mule application deployments? (Choose two.)

Options:

A.

Reduced application latency

B.

Increased application isolation

C.

Reduced time-to-market for the first application

D.

Increased application throughput

E.

Reduced IT operations effort

Buy Now
Questions 54

A Mule application is built to support a local transaction for a series of operations on a single database. The Mule application has a Scatter-Gather that participates in the local transaction.

What is the behavior of the Scatter-Gather when running within this local transaction?

Options:

A.

Execution of each route within the Scatter-Gather occurs sequentiallyAny error that occurs inside the Scatter-Gather will result in a rollback of all the database operations

B.

Execution of all routes within the Scatter-Gather occurs in parallelAny error that occurs inside the Scatter-Gather will result in a rollback of all the database operations

C.

Execution of each route within the Scatter-Gather occurs sequentiallyAny error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations

D.

Execution of each route within the Scatter-Gather occurs in parallelAny error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations

Buy Now
Questions 55

An organization is designing the following two Mule applications that must share data via a common persistent object store instance:

- Mule application P will be deployed within their on-premises datacenter.

- Mule application C will run on CloudHub in an Anypoint VPC.

The object store implementation used by CloudHub is the Anypoint Object Store v2 (OSv2).

what type of object store(s) should be used, and what design gives both Mule applications access to the same object store instance?

Options:

A.

Application P uses the Object Store connector to access a persistent object store Application C accesses this persistent object store via the Object Store REST API through an IPsec tunnel

B.

Application C and P both use the Object Store connector to access the Anypoint Object Store v2

C.

Application C uses the Object Store connector to access a persistent object Application P accesses the persistent object store via the Object Store REST API

D.

Application C and P both use the Object Store connector to access a persistent object store

Buy Now
Questions 56

An organization has various integrations implemented as Mule applications. Some of these Mule applications are deployed to custom hosted Mule runtimes (on-premises) while others execute in the MuleSoft-hosted runtime plane (CloudHub). To perform the Integra functionality, these Mule applications connect to various backend systems, with multiple applications typically needing to access the backend systems.

How can the organization most effectively avoid creating duplicates in each Mule application of the credentials required to access the backend systems?

Options:

A.

Create a Mule domain project that maintains the credentials as Mule domain-shared resources Deploy the Mule applications to the Mule domain, so the credentials are available to the Mule applications

B.

Store the credentials in properties files in a shared folder within the organization's data center Have the Mule applications load properties files from this shared location at startup

C.

Segregate the credentials for each backend system into environment-specific properties files Package these properties files in each Mule application, from where they are loaded at startup

D.

Configure or create a credentials service that returns the credentials for each backend system, and that is accessible from customer-hosted and MuleSoft-hosted Mule runtimes Have the Mule applications toad the properties at startup by invoking that credentials service

Buy Now
Questions 57

A corporation has deployed Mule applications to different customer-hosted Mule runtimes. Mule applications deployed to these Mule runtimes are managed by Anypoint Platform.

What needs to be installed or configured (if anything) to monitor these Mule applications from Anypoint Monitoring, and how is monitoring data from each Mule application sent to Anypoint Monitoring?

Options:

A.

Enable monitoring of individual Mule applications from the Runtime Managerapplication settings.Runtime Manager sends monitoring data to Anypoint Monitoring for each deployed Mule application.

B.

Install a Runtime Manager agent on each Mule runtime.Each Runtime Manager agent sends monitoring data from the Mule applicationsrunning in its Mule runtime to Runtime Manager, then Runtime Manager sendsmonitoring data to Anypoint Monitoring.

C.

Leave the out-of-the-box Anypoint Monitoring agent unchanged in its default Muleruntime installation.Each Anypoint Monitoring agent sends monitoring data from the Mule applicationsrunning in its Mule runtime to Runtime Manager, then Runtime Manager sendsmonitoring data to Anypoint Monitoring.

D.

Install an Anypoint Monitoring agent on each Mule runtime.Each Anypoint Monitoring agent sends monitoring data from the Mule applicationsrunning in its Mule runtime to Anypoint Monitoring.

Buy Now
Questions 58

What is a core pillar of the MuleSoft Catalyst delivery approach?

Options:

A.

Business outcomes

B.

Technology centralization

C.

Process thinking

D.

Scope reduction

Buy Now
Questions 59

What comparison is true about a CloudHub Dedicated Load Balancer (DLB) vs. the CloudHub Shared Load Balancer (SLB)?

Options:

A.

Only a DLB allows the configuration of a custom TLS server certificate

B.

Only the SLB can forward HTTP traffic to the VPC-internal ports of the CloudHub workers

C.

Both a DLB and the SLB allow the configuration of access control via IP whitelists

D.

Both a DLB and the SLB implement load balancing by sending HTTP requests to workers with the lowest workloads

Buy Now
Questions 60

What aspects of a CI/CD pipeline for Mute applications can be automated using MuleSoft-provided Maven plugins?

Options:

A.

Compile, package, unit test, deploy, create associated API instances in API ManagerB Import from API designer, compile, package, unit test, deploy, publish to Am/point Exchange

B.

Compile, package, unit test, validate unit test coverage, deploy

C.

Compile, package, unit test, deploy, integration test

Buy Now
Questions 61

A company is using Mulesoft to develop API's and deploy them to Cloudhub and on premises targets. Recently it has decided to enable Runtime Fabric deployment option as well and infrastructure is set up for this option.

What can be used to deploy Runtime Fabric?

Options:

A.

AnypointCLI

B.

Anypoint platform REST API's

C.

Directly uploading ajar file from the Runtime manager

D.

Mule maven plug-in

Buy Now
Questions 62

An organization plans to use the Anypoint Platform audit logging service to log Anypoint MQ actions.

What consideration must be kept in mind when leveraging Anypoint MQ Audit Logs?

Options:

A.

Anypoint MQ Audit Logs include logs for sending, receiving, or browsing messages

B.

Anypoint MQ Audit Logs include fogs for failed Anypoint MQ operations

C.

Anypoint MQ Audit Logs include logs for queue create, delete, modify, and purge operations

Buy Now
Questions 63

An organization has defined a common object model in Java to mediate the communication between different Mule applications in a consistent way. A Mule application is being built to use this common object model to process responses from a SOAP API and a REST API and then write the processed results to an order management system.

The developers want Anypoint Studio to utilize these common objects to assist in creating mappings for various transformation steps in the Mule application.

What is the most idiomatic (used for its intended purpose) and performant way to utilize these common objects to map between the inbound and outbound systems in the Mule application?

Options:

A.

Use JAXB (XML) and Jackson (JSON) data bindings

B.

Use the WSS module

C.

Use the Java module

D.

Use the Transform Message component

Buy Now
Questions 64

A payment processing company has implemented a Payment Processing API Mule application to process credit card and debit card transactions, Because the Payment Processing API handles highly sensitive information, the payment processing company requires that data must be encrypted both In-transit and at-rest.

To meet these security requirements, consumers of the Payment Processing API must create request message payloads in a JSON format specified by the API, and the message payload values must be encrypted.

How can the Payment Processing API validate requests received from API consumers?

Options:

A.

A Transport Layer Security (TLS) - Inbound policy can be applied in API Manager to decrypt the message payload and the Mule application implementation can then usethe JSON Validation module to validate the JSON data

B.

The Mule application implementation can use the APIkit module to decrypt and then validate the JSON data

C.

The Mule application implementation can use the Validation module to decrypt and then validate the JSON data

D.

The Mule application implementation can use DataWeave to decrypt the message payload and then use the JSON Scheme Validation module to validate the JSON data

Buy Now
Questions 65

A company is planning to migrate its deployment environment from on-premises cluster to a Runtime Fabric (RTF) cluster. It also has a requirement to enable Mule applications deployed to a Mule runtime instance to store and share data across application replicas and restarts.

How can these requirements be met?

Options:

A.

Anypoint object store V2 to share data between replicas in the RTF cluster

B.

Install the object store pod on one of the cluster nodes

C.

Configure Persistence Gateway in any of the servers using Mule Object Store

D.

Configure Persistent Gateway at the RTF

Buy Now
Questions 66

An organization is successfully using API led connectivity, however, as the application network grows, all the manually performed tasks to publish share and discover, register, apply policies to, and deploy an API are becoming repetitive pictures driving the organization to automate this process using efficient CI/'CD pipeline. Considering Anypoint platforms capabilities how should the organization approach automating is API lifecycle?

Options:

A.

Use runtime manager rest apis for API management and mavenforAPI deployment

B.

Use Maven with a custom configuration required for the API lifecycle

C.

Use Anypoint CLI or Anypoint Platform REST apis with scripting language such as groovy

D.

Use Exchange rest api's for API management and MavenforAPI deployment

Buy Now
Questions 67

An API implementation is being developed to expose data from a production database via HTTP requests. The API implementation executes a database SELECT statement that is dynamically created based upon data received from each incoming HTTP request. The developers are planning to use various types of testing to make sure the Mule application works as expected, can handle specific workloads, and behaves correctly from an API consumer perspective. What type of testing would typically mock the results from each SELECT statement rather than actually execute it in the production database?

Options:

A.

Unit testing (white box)

B.

Integration testing

C.

Functional testing (black box)

D.

Performance testing

Buy Now
Questions 68

When designing an upstream API and its implementation, the development team has been advised to not set timeouts when invoking downstream API. Because the downstream API has no SLA that can be relied upon. This is the only donwstream API dependency of that upstream API. Assume the downstream API runs uninterrupted without crashing. What is the impact of this advice?

Options:

A.

The invocation of the downstream API will run to completion without timing out.

B.

An SLA for the upstream API CANNOT be provided.

C.

A default timeout of 500 ms will automatically be applied by the Mule runtime in which the upstream API implementation executes.

D.

A load-dependent timeout of less than 1000 ms will be applied by the Mule runtime in which the downstream API implementation executes.

Buy Now
Questions 69

What is not true about Mule Domain Project?

Options:

A.

This allows Mule applications to share resources

B.

Expose multiple services within the Mule domain on the same port

C.

Only available Anypoint Runtime Fabric

D.

Send events (messages) to other Mule applications using VM queues

Buy Now
Questions 70

What operation can be performed through a JMX agent enabled in a Mule application?

Options:

A.

View object store entries

B.

Replay an unsuccessful message

C.

Set a particular tog4J2 log level to TRACE

D.

Deploy a Mule application

Buy Now
Questions 71

An integration team follows MuleSoft’s recommended approach to full lifecycle API development.

Which activity should this team perform during the API implementation phase?

Options:

A.

Validate the API specification

B.

Use the API specification to build the MuleSoft application

C.

Design the API specification

D.

Use the API specification to monitor the MuleSoft application

Buy Now
Questions 72

Mule application muleA deployed in cloudhub uses Object Store v2 to share data across instances. As a part of new requirement , application muleB which is deployed in same region wants to access this Object Store.

Which of the following option you would suggest which will have minimum latency in this scenario?

Options:

A.

Object Store REST API

B.

Object Store connector

C.

Both of the above option will have same latency

D.

Object Store of one mule application cannot be accessed by other mule application.

Buy Now
Questions 73

What approach configures an API gateway to hide sensitive data exchanged between API consumers and API implementations, but can convert tokenized fields back to their original value for other API requests or responses, without having to recode the API implementations?

Options:

A.

Create both masking and tokenization formats and use both to apply a tokenization policy in an API gateway to mask sensitive values in message payloads withcharacters, and apply a corresponding detokenization policy to return the originalvalues to other APIs

B.

Create a masking format and use it to apply a tokenization policy in an API gateway to mask sensitive values in message payloads with characters, and apply a corresponding detokenization policy to return the original values to other APIs

C.

Use a field-level encryption policy in an API gateway to replace sensitive fields in message payload with encrypted values, and apply a corresponding field-leveldecryption policy to return the original values to other APIs

D.

Create a tokenization format and use it to apply a tokenization policy in an API gateway to replace sensitive fields in message payload with similarly formattedtokenized values, and apply a corresponding detokenization policy to return the original values to other APIs

Buy Now
Questions 74

49 of A popular retailer is designing a public API for its numerous business partners. Each business partner will invoke the API at the URL 58. https://api.acme.com/partnefs/vl. The API implementation is estimated to require deployment to 5 CloudHub workers.

The retailer has obtained a public X.509 certificate for the name apl.acme.com, signed by a reputable CA, to be used as the server certificate.

Where and how should the X.509 certificate and Mule applications be used to configure load balancing among the 5 CloudHub workers, and what DNS entries should be configured in order for the retailer to support its numerous business partners?

Options:

A.

Add the X.509 certificate to the Mule application's deployable archive, then configure a CloudHub Dedicated Load Balancer (DLB) for each of the Mule application's CloudHub workersCreate a CNAME for api.acme.com pointing to the DLB's A record

B.

Add the X.509 certificate to the CloudHub Shared Load Balancer (SLB), not to the Mule applicationCreate a CNAME for api.acme.com pointing to the SLB's A record

C.

Add the X.509 certificate to a CloudHub Dedicated Load Balancer (DLB), not to the Mule applicationCreate a CNAME for api.acme.com pointing to the DLB's A record

D.

Add the x.509 certificate to the Mule application's deployable archive, then configure the CloudHub Shared Load Balancer (SLB)for each of the Mule application's CloudHub workersCreate a CNAME for api.acme.com pointing to the SLB's A record

Buy Now
Questions 75

An organization uses one specific CloudHub (AWS) region for all CloudHub deployments. How are CloudHub workers assigned to availability zones (AZs) when the organization's Mule applications are deployed to CloudHub in that region?

Options:

A.

Workers belonging to a given environment are assigned to the same AZ within that region.

B.

AZs are selected as part of the Mule application's deployment configuration.

C.

Workers are randomly distributed across available AZs within that region.

D.

An AZ is randomly selected for a Mule application, and all the Mule application's CloudHub workers are assigned to that one AZ

Buy Now
Questions 76

According to MuleSoft, what Action should an IT organization take regarding its technology assets in order to close the IT delivery.

Options:

A.

Make assets easily discoverable via a central repository

B.

Focus project delivery efforts on custom assets that meet the specific requirements of each individual line of business

C.

Create weekly meetings that all members of IT attend to present justification and request approval to use existing assets

D.

Hire additional staff to meet the demand for asset creation required for approved projects and timelines

Buy Now
Questions 77

A company is modernizing its legal systems lo accelerate access lo applications and data while supporting the adoption of new technologies. The key to achieving this business goal is unlocking the companies' key systems and dala including microservices miming under Docker and kubernetes containers using apis.

Considering the current aggressive backlog and project delivery requirements the company wants to take a strategic approach in the first phase of its transformation projects by quickly deploying API's in mule runtime that are able lo scale, connect to on premises systems and migrate as needed.

Which runtime deployment option supports company's goals?

Options:

A.

Customer hosted self provisioned runtimes

B.

Cloudhub runtimes

C.

Runtime fabric on self managed Kubernetes

D.

Runtime fabric on Vmware metal

Buy Now
Questions 78

A mule application must periodically process a large dataset which varies from 6 GB lo 8 GB from a back-end database and write transform data lo an FTPS server using a properly configured bad job scope.

The performance requirements of an application are approved to run in the cloud hub 0.2 vCore with 8 GB storage capacity and currency requirements are met.

How can the high rate of records be effectively managed in this application?

Options:

A.

Use streaming with a file storage repeatable strategy for reading records from the database and batch aggregator with streaming to write to FTPS

B.

Use streaming with an in-memory reputable store strategy for reading records from the database and batch aggregator with streaming to write to FTPS

C.

Use streaming with a file store repeatable strategy for reading records from the database and batch aggregator with an optimal size

D.

Use streaming with a file store repeatable strategy reading records from the database and batch aggregator without any required configuration

Buy Now
Questions 79

A large life sciences customer plans to use the Mule Tracing module with the Mapped Diagnostic Context (MDC) logging operations to enrich logging in its Mule application and to improve tracking by providing more context in the Mule application logs. The customer also wants to improve throughput and lower the message processing latency in its Mule application flows.

After installing the Mule Tracing module in the Mule application, how should logging be performed in flows in Mule applications, and what should be changed In the log4j2.xml files?

Options:

A.

In the flows, add Mule Tracing module Set logging variable operations before any Core Logger components.In log4j2.xml files, change the appender's pattern layout to use %MDC and then assign the appender to a Logger or Root element.

B.

In the flows, add Mule Tracing module Set logging variable operations before any CoreLogger components.In log4j2.xmI files, change the appender’s pattern layout to use the %MDC placeholder and then assign the appender to an AsyncLogger element.

C.

In the flows, add Mule Tracing module Set logging variable operations before any CoreLogger components.In log4j2.xmI files, change the appender’'s pattern layout to use %asyncLogger placeholder and then assign the appender to an AsyncLogger element.

D.

In the flows, wrap Logger components in Async scopes. In log4j2.xmI files, change the appender's pattern layout to use the %asyncLoggerplaceholder and then assign the appender to a Logger or Root element.

Buy Now
Questions 80

A Mule application is being designed To receive nightly a CSV file containing millions of records from an external vendor over SFTP, The records from the file need to be validated, transformed. And then written to a database. Records can be inserted into the database in any order.

In this use case, what combination of Mule components provides the most effective and performant way to write these records to the database?

Options:

A.

Use a Parallel for Each scope to Insert records one by one into the database

B.

Use a Scatter-Gather to bulk insert records into the database

C.

Use a Batch job scope to bulk insert records into the database.

D.

Use a DataWeave map operation and an Async scope to insert records one by one into the database.

Buy Now
Questions 81

An organization is evaluating using the CloudHub shared Load Balancer (SLB) vs creating a CloudHub dedicated load balancer (DLB). They are evaluating how this choice affects the various types of certificates used by CloudHub deployed Mule applications, including MuleSoft-provided, customer-provided, or Mule application-provided certificates. What type of restrictions exist on the types of certificates for the service that can be exposed by the CloudHub Shared Load Balancer (SLB) to external web clients over the public internet?

Options:

A.

Underlying Mule applications need to implement own certificates

B.

Only MuleSoft provided certificates can be used for server side certificate

C.

Only self signed certificates can be used

D.

All certificates which can be used in shared load balancer need to get approved by raising support ticket

Buy Now
Exam Name: Salesforce Certified MuleSoft Platform Integration Architect (Mule-Arch-202)
Last Update: Dec 11, 2025
Questions: 273

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now MuleSoft-Integration-Architect-I testing engine

PDF (Q&A)

$43.57  $124.49
buy now MuleSoft-Integration-Architect-I pdf