New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

MCIA-Level-1 Exam Dumps - MuleSoft Certified Integration Architect - Level 1

Go to page:
Question # 17

As an enterprise architect, what are the two reasons for which you would use a canonical data model in the new integration project using Mulesoft Anypoint platform ( choose two answers )

A.

To have consistent data structure aligned in processes

B.

To isolate areas within a bounded context

C.

To incorporate industry standard data formats

D.

There are multiple canonical definitions of each data type

E.

Because the model isolates the back and systems and support mule applications from change

Full Access
Question # 18

What Is a recommended practice when designing an integration Mule 4 application that reads a large XML payload as a stream?

A.

The payload should be dealt with as a repeatable XML stream, which must only be traversed (iterated-over) once and CANNOT be accessed randomly from DataWeave expressions and scripts

B.

The payload should be dealt with as an XML stream, without converting it to a single Java object (POJO)

C.

The payload size should NOT exceed the maximum available heap memory of the Mute runtime on which the Mule application executes

D.

The payload must be cached using a Cache scope If It Is to be sent to multiple backend systems

Full Access
Question # 19

To implement predictive maintenance on its machinery equipment, ACME Tractors has installed thousands of IoT sensors that will send data for each machinery asset as sequences of JMS messages, in near real-time, to a JMS queue named SENSOR_DATA on a JMS server. The Mule application contains a JMS Listener operation configured to receive incoming messages from the JMS servers SENSOR_DATA JMS queue. The Mule application persists each received JMS message, then sends a transformed version of the corresponding Mule event to the machinery equipment back-end systems.

The Mule application will be deployed to a multi-node, customer-hosted Mule runtime cluster. Under normal conditions, each JMS message should be processed exactly once.

How should the JMS Listener be configured to maximize performance and concurrent message processing of the JMS queue?

A.

Set numberOfConsumers = 1

Set primaryNodeOnly = false

B.

Set numberOfConsumers = 1

Set primaryNodeOnly = true

C.

Set numberOfConsumers to a value greater than one

Set primaryNodeOnly = true

D.

Set numberOfConsumers to a value greater than one

Set primaryNodeOnly = false

Full Access
Question # 20

A retail company is implementing a MuleSoft API to get inventory details from two vendors by Invoking each vendor's online applications. Due to network issues, the invocations to the vendor applications are timing out intermittently, but the requests are successful after re-invoking each

vendor application.

What is the most performant way of implementing the API to invoke each vendor application and to retry invocations that generate timeout errors?

A.

Use a For-Each scope to invoke the two vendor applications in series, one after the other.

Place the For-Each scope inside an Until-Successful scope to retry requests that raise timeout errors.

B.

Use a Choice scope to Invoke each vendor application on a separate route.

Place the Choice scope inside an Until-Successful scope to retry requests that raise

timeout errors.

C.

Use a Scatter-Gather scope to invoke each vendor application on a separate route.

Use an Until-Successful scope in each route to retry requests that raise timeout errors.

D.

Use a Round-Robin scope to invoke each vendor application on a separate route.

Use a Try-Catch scope in each route to retry requests that raise timeout errors.

Full Access
Question # 21

An organization has several APIs that accept JSON data over HTTP POST. The APIs are all publicly available and are associated with several mobile applications and web applications. The organization does NOT want to use any authentication or compliance policies for these APIs, but at the same time, is worried that some bad actor could send payloads that could somehow compromise the applications or servers running the API implementations. What out-of-the-box Anypoint Platform policy can address exposure to this threat?

A.

Apply a Header injection and removal policy that detects the malicious data before it is used

B.

Apply an IP blacklist policy to all APIs; the blacklist will Include all bad actors

C.

Shut out bad actors by using HTTPS mutual authentication for all API invocations

D.

Apply a JSON threat protection policy to all APIs to detect potential threat vectors

Full Access
Question # 22

An organization is migrating all its Mule applications to Runtime Fabric (RTF). None of the Mule applications use Mule domain projects.

Currently, all the Mule applications have been manually deployed to a server group among several customer hosted Mule runtimes.

Port conflicts between these Mule application deployments are currently managed by the DevOps team who carefully manage Mule application properties files.

When the Mule applications are migrated from the current customer-hosted server group to Runtime Fabric (RTF), fo the Mule applications need to be rewritten and what DevOps port configuration responsibilities change or stay the same?

A.

Yes, the Mule applications Must be rewritten

DevOps No Longer needs to manage port conflicts between the Mule applications

B.

Yes, the Mule applications Must be rewritten

DevOps Must Still Manage port conflicts.

C.

NO, The Mule applications do NOT need to be rewritten

DevOps MUST STILL manage port conflicts

D.

NO, the Mule applications do NO need to be rewritten

DevOps NO LONGER needs to manage port conflicts between the Mule applications.

Full Access
Question # 23

What comparison is true about a CloudHub Dedicated Load Balancer (DLB) vs. the CloudHub Shared Load Balancer (SLB)?

A.

Only a DLB allows the configuration of a custom TLS server certificate

B.

Only the SLB can forward HTTP traffic to the VPC-internal ports of the CloudHub workers

C.

Both a DLB and the SLB allow the configuration of access control via IP whitelists

D.

Both a DLB and the SLB implement load balancing by sending HTTP requests to workers with the lowest workloads

Full Access
Question # 24

An organization if struggling frequent plugin version upgrades and external plugin project dependencies. The team wants to minimize the impact on applications by creating best practices that will define a set of default dependencies across all new and in progress projects.

How can these best practices be achieved with the applications having the least amount of responsibility?

A.

Create a Mule plugin project with all the dependencies and add it as a dependency in each application's POM.xml file

B.

Create a mule domain project with all the dependencies define in its POM.xml file and add each application to the domain Project

C.

Add all dependencies in each application's POM.xml file

D.

Create a parent POM of all the required dependencies and reference each in each application's POM.xml file

Full Access
Go to page: