Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

MuleSoft Certified Integration Architect - Level 1 MAINTENANCE

Last Update 1 day ago Total Questions : 116

The MuleSoft Certified Integration Architect - Level 1 MAINTENANCE content is now fully updated, with all current exam questions added 1 day ago. Deciding to include MCIA-Level-1-Maintenance practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our MCIA-Level-1-Maintenance exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these MCIA-Level-1-Maintenance sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any MuleSoft Certified Integration Architect - Level 1 MAINTENANCE practice test comfortably within the allotted time.

Question # 21

A leading bank implementing new mule API.

The purpose of API to fetch the customer account balances from the backend application and display them on the online platform the online banking platform. The online banking platform will send an array of accounts to Mule API get the account balances.

As a part of the processing the Mule API needs to insert the data into the database for auditing purposes and this process should not have any performance related implications on the account balance retrieval flow

How should this requirement be implemented to achieve better throughput?

A.

Implement the Async scope fetch the data from the backend application and to insert records in the Audit database

B.

Implement a for each scope to fetch the data from the back-end application and to insert records into the Audit database

C.

Implement a try-catch scope to fetch the data from the back-end application and use the Async scope to insert records into the Audit database

D.

Implement parallel for each scope to fetch the data from the backend application and use Async scope to insert the records into the Audit database

Question # 22

An external web UI application currently accepts occasional HTTP requests from client web browsers to change (insert, update, or delete) inventory pricing information in an inventory system's database. Each inventory pricing change must be transformed and then synchronized with multiple customer experience systems in near real-time (in under 10 seconds). New customer experience systems are expected to be added in the future.

The database is used heavily and limits the number of SELECT queries that can be made to the database to 10 requests per hour per user.

What is the most scalable, idiomatic (used for its intended purpose), decoupled. reusable, and maintainable integration mechanism available to synchronize each inventory pricing change with the various customer experience systems in near real-time?

A.

Write a Mule application with a Database On Table Row event source configured for the inventory pricing database, with the watermark attribute set to an appropriate database column

In the same now, use a Scatter-Gather to call each customer experience system's REST API with transformed inventory-pricing records

B.

Add a trigger to the inventory-pricing database table so that for each change to the inventory pricing database, a stored procedure is called that makes a REST call to a Mule application

Write the Mule application to publish each Mule event as a message to an Anypoint MQ exchange

Write other Mule applications to subscribe to the Anypoint MQ exchange, transform each received message, and then update the Mule application's corres

C.

Replace the external web UI application with a Mule application to accept HTTP requests from client web browsers

In the same Mule application, use a Batch Job scope to test if the database request will succeed, aggregate pricing changes within a short time window, and then update both the inventory pricing database and each customer experience system using a Parallel For Each scope

D.

Write a Mule application with a Database On Table Row event source configured for the inventory pricing database, with the ID attribute set to an appropriate database column

In the same flow, use a Batch Job scope to publish transformed Inventory-pricing records to an Anypoint MQ queue

Write other Mule applications to subscribe to the Anypoint MQ queue, transform each received message, and then update the Mule application's cor

Question # 23

An organization has an HTTPS-enabled Mule application named Orders API that receives requests from another Mule application named Process Orders.

The communication between these two Mule applications must be secured by TLS mutual authentication (two-way TLS).

At a minimum, what must be stored in each truststore and keystore of these two Mule applications to properly support two-way TLS between the two Mule applications while properly protecting each Mule application's keys?

A.

Orders API truststore: The Orders API public key

Process Orders keystore: The Process Orders private key and public key

B.

Orders API truststore: The Orders API private key and public key

Process Orders keystore: The Process Orders private key public key

C.

Orders API truststore: The Process Orders public key

Orders API keystore: The Orders API private key and public key

Process Orders truststore: The Orders API public key

Process Orders keystore: The Process Orders private key and public key

D.

Orders API truststore: The Process Orders public key

Orders API keystore: The Orders API private key

Process Orders truststore: The Orders API public key

Process Orders keystore: The Process Orders private key

Question # 24

A travel company wants to publish a well-defined booking service API to be shared with its business partners. These business partners have agreed to ONLY consume SOAP services and they want to get the service contracts in an easily consumable way before they start any development. The travel company will publish the initial design documents to Anypoint Exchange, then share those documents with the business partners. When using an API-led approach, what is the first design document the travel company should deliver to its business partners?

A.

Create a WSDL specification using any XML editor

B.

Create a RAML API specification using any text editor

C.

Create an OAS API specification in Design Center

D.

Create a SOAP API specification in Design Center

Question # 25

How are the API implementation , API client, and API consumer combined to invoke and process an API ?

A.

The API consumer creates an API implementation , which receives API invocations from an API such that they are processed for an API client

B.

The API consumer creates an API client which sends API invocations to an API such that they are processed by an API implementation

C.

An API client creates an API consumer, which receives API invocation from an API such that they are processed for an API implementation

D.

The API client creates an API consumer which sends API invocations to an API such that they are processed by API implementation

Question # 26

An API implementation is being developed to expose data from a production database via HTTP requests. The API implementation executes a database SELECT statement that is dynamically created based upon data received from each incoming HTTP request. The developers are planning to use various types of testing to make sure the Mule application works as expected, can handle specific workloads, and behaves correctly from an API consumer perspective. What type of testing would typically mock the results from each SELECT statement rather than actually execute it in the production database?

A.

Unit testing (white box)

B.

Integration testing

C.

Functional testing (black box)

D.

Performance testing

Question # 27

As an enterprise architect, what are the two reasons for which you would use a canonical data model in the new integration project using Mulesoft Anypoint platform ( choose two answers )

A.

To have consistent data structure aligned in processes

B.

To isolate areas within a bounded context

C.

To incorporate industry standard data formats

D.

There are multiple canonical definitions of each data type

E.

Because the model isolates the back and systems and support mule applications from change

Question # 28

An organization designing a hybrid, load balanced, single cluster production environment. Due to performance service level agreement goals, it is looking into running the Mule applications in an active-active multi node cluster configuration.

What should be considered when running its Mule applications in this type of environment?

A.

All event sources, regardless of time , can be configured as the target source by the primary node in the cluster

B.

An external load balancer is required to distribute incoming requests throughout the cluster nodes

C.

A Mule application deployed to multiple nodes runs in an isolation from the other nodes in the cluster

D.

Although the cluster environment is fully installed configured and running, it will not process any requests until an outage condition is detected by the primary node in the cluster.

Question # 29

What best describes the Fully Qualified Domain Names (FQDNs), also known as DNS entries, created when a Mule application is deployed to the CloudHub Shared Worker Cloud?

A.

A fixed number of FQDNs are created, IRRESPECTIVE of the environment and VPC design

B.

The FQDNs are determined by the application name chosen, IRRESPECTIVE of the region

C.

The FQDNs are determined by the application name, but can be modified by an administrator after deployment

D.

The FQDNs are determined by both the application name and the region

Question # 30

A leading e-commerce giant will use Mulesoft API's on runtime fabric (RTF) to process customer orders. Some customer's sensitive information such as credit card information is also there as a part of a API payload.

What approach minimizes the risk of matching sensitive data to the original and can convert back to the original value whenever and wherever required?

A.

Apply masking to hide the sensitive information and then use API

B.

manager to detokenize the masking format to return the original value

C.

create a tokenization format and apply a tokenization policy to the API Gateway

D.

Used both masking and tokenization

E.

Apply a field level encryption policy in the API Gateway

Go to page: