Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

MuleSoft MCIA-Level-1-Maintenance - MuleSoft Certified Integration Architect - Level 1 MAINTENANCE

Page: 3 / 4
Total 116 questions

An application deployed to a runtime fabric environment with two cluster replicas is designed to periodically trigger of flow for processing a high-volume set of records from the source system and synchronize with the SaaS system using the Batch job scope

After processing 1000 records in a periodic synchronization of 1 lakh records, the replicas in which batch job instance was started went down due to unexpected failure in the runtime fabric environment

What is the consequence of losing the replicas that run the Batch job instance?

A.

The remaining 99000 records will be lost and left and processed

B.

The second replicas will take over processing the remaining

99000 records

C.

A new replacement replica will be available and will be process all 1,00,000 records from scratch leading to duplicate record processing

D.

A new placement replica will be available and will take or processing the remaining 99,000 records

A global, high-volume shopping Mule application is being built and will be deployed to CloudHub. To improve performance, the Mule application uses a Cache scope that maintains cache state in a CloudHub object store. Web clients will access the Mule application over HTTP from all around the world, with peak volume coinciding with business hours in the web client's geographic location. To achieve optimal performance, what Anypoint Platform region should be chosen for the CloudHub object store?

A.

Choose the same region as to where the Mule application is deployed

B.

Choose the US-West region, the only supported region for CloudHub object stores

C.

Choose the geographically closest available region for each web client

D.

Choose a region that is the traffic-weighted geographic center of all web clients

A finance giant is planning to migrate all its Mule applications to Runtime fabric (RTF). Currently all Mule applications are deployed cloud hub using automated CI/CD scripts.

As an integration architect, which of the below step would you suggest to ensure that the applications from cloudhub are migrated properly to Runtime Fabric (RTF) with an assumption that organization is keen on keeping the same deployment strategy.

A.

No changes need to be made to POM.xml file and CI/CD script should be modified as per the RTF configurations

B.

runtimeFabric dependency should be added as a mule plug-in to POM.xml file and CI/CD script should be modified as per the RTF configurations

C.

runtimeFabric deployment should be added to POM.xml file in all

the mule applications and CI/CD script should be modified as per the RTF configurations

D.

runtimeFabric profile should be added mule configuration files in the mule applications and CI/CD script should be modified as per the RTF configurations

What is true about automating interactions with Anypoint Platform using tools such as Anypoint Platform REST API's, Anypoint CLI or the Mule Maven plugin?

A.

By default, the Anypoint CLI and Mule Maven plugin are not included in the Mule runtime

B.

Access to Anypoint Platform API;s and Anypoint CLI can be controlled separately thruough the roles and permissions in Anypoint platform, so that specific users can get access to Anypoint CLI while others get access to the platform API's

C.

Anypoint Platform API's can only automate interactions with CloudHub while the Mule maven plugin is required for deployment to customer hosted Mule runtimes

D.

API policies can be applied to the Anypoint platform API's so that only certain LOS's has access to specific functions

An organization has several APIs that accept JSON data over HTTP POST. The APIs are all publicly available and are associated with several mobile applications and web applications. The organization does NOT want to use any authentication or compliance policies for these APIs, but at the same time, is worried that some bad actor could send payloads that could somehow compromise the applications or servers running the API implementations. What out-of-the-box Anypoint Platform policy can address exposure to this threat?

A.

Apply a Header injection and removal policy that detects the malicious data before it is used

B.

Apply an IP blacklist policy to all APIs; the blacklist will Include all bad actors

C.

Shut out bad actors by using HTTPS mutual authentication for all API invocations

D.

Apply a JSON threat protection policy to all APIs to detect potential threat vectors

An organization has just developed a Mule application that implements a REST API. The mule application will be deployed to a cluster of customer hosted Mule runtimes.

What additional infrastructure component must the customer provide in order to distribute inbound API requests across the Mule runtimes of the cluster?

A.

A message broker

B.

An HTTP Load Balancer

C.

A database

D.

An Object Store

A customer wants to use the mapped diagnostic context (MDC) and logging variables to enrich its logging and improve tracking by providing more context in the logs.

The customer also wants to improve the throughput and lower the latency of message processing.

As an Mulesoft integration architect can you advise, what should the customer implement to meet these requirements?

A.

Use synchronous logging and use pattern layout with [%MDC] in the log4j2.xml configuration file and then configure the logging variables

B.

Useasync logger at the level greater than INFO and use pattern layout with [%MDC] in the log4j2,xml configuration file and then configure the logging variables

C.

Useasync logger at the level equal to DEBUG orTRACEand use pattern

layout with [%MDC] in the log4j2.xml configuration file and then configure the logging variables

D.

Use synchronous logging at the INFO DEBUG or Trace level and use pattern layout with [%MDC] in the log4j2.xml configuration file and then configure the logging variables

Which of the below requirements prevent the usage of Anypoint MQ in a company's network?(Choose two answers)

A.

single message payload can be up to 15 MB

B.

payloads must be encrypted

C.

the message broker must be hosted on premises

D.

support for point-to-point messaging

E.

ability for a third party outside the company's network to consume events from the queue

What is a key difference between synchronous and asynchronous logging from Mule applications?

A.

Synchronous logging writes log messages in a single logging thread but does not block the Mule event being processed by the next event processor

B.

Asynchronous logging can improve Mule event processing throughput while also reducing the processing time for each Mule event

C.

Asynchronous logging produces more reliable audit trails with more accurate timestamps

D.

Synchronous logging within an ongoing transaction writes log messages in the same thread that processes the current Mule event

An organization has deployed both Mule and non-Mule API implementations to integrate its customer and order management systems. All the APIs are available to REST clients on the public internet.

The organization wants to monitor these APIs by running health checks: for example, to determine if an API can properly accept and process requests. The organization does not have subscriptions to any external monitoring tools and also does not want to extend its IT footprint.

What Anypoint Platform feature provides the most idiomatic (used for its intended purpose) way to monitor the availability of both the Mule and the non-Mule API implementations?

A.

API Functional Monitoring

B.

Runtime Manager

C.

API Manager

D.

Anypoint Visualizer