Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

A Mule application is built to support a local transaction for a series of operations on a single database. The Mule application has a Scatter-Gather that participates in the local transaction.

What is the behavior of the Scatter-Gather when running within this local transaction?

A.

Execution of each route within the Scatter-Gather occurs sequentially

Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations

B.

Execution of all routes within the Scatter-Gather occurs in parallel

Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations

C.

Execution of each route within the Scatter-Gather occurs sequentially

Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations

D.

Execution of each route within the Scatter-Gather occurs in parallel

Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations

Full Access
Question # 5

The ABC company has an Anypoint Runtime Fabric on VMs/Bare Metal (RTF-VM) appliance installed on its own customer-hosted AWS infrastructure.

Mule applications are deployed to this RTF-VM appliance. As part of the company standards, the Mule application logs must be forwarded to an external log management tool (LMT).

Given the company's current setup and requirements, what is the most idiomatic (used for its intended purpose) way to send Mule application logs to the external LMT?

A.

In RTF-VM, install and configure the external LTM's log-forwarding agent

B.

In RTF-VM, edit the pod configuration to automatically install and configure an Anypoint Monitoring agent

C.

In each Mule application, configure custom Log4j settings

D.

In RTF-VM. configure the out-of-the-box external log forwarder

Full Access
Question # 6

Insurance organization is planning to deploy Mule application in MuleSoft Hosted runtime plane. As a part of requirement , application should be scalable . highly available. It also has regulatory requirement which demands logs to be retained for at least 2 years. As an Integration Architect what step you will recommend in order to achieve this?

A.

It is not possible to store logs for 2 years in CloudHub deployment. External log management system is required.

B.

When deploying an application to CloudHub , logs retention period should be selected as 2 years

C.

When deploying an application to CloudHub, worker size should be sufficient to store 2 years data

D.

Logging strategy should be configured accordingly in log4j file deployed with the application.

Full Access
Question # 7

A leading bank implementing new mule API.

The purpose of API to fetch the customer account balances from the backend application and display them on the online platform the online banking platform. The online banking platform will send an array of accounts to Mule API get the account balances.

As a part of the processing the Mule API needs to insert the data into the database for auditing purposes and this process should not have any performance related implications on the account balance retrieval flow

How should this requirement be implemented to achieve better throughput?

A.

Implement the Async scope fetch the data from the backend application and to insert records in the Audit database

B.

Implement a for each scope to fetch the data from the back-end application and to insert records into the Audit database

C.

Implement a try-catch scope to fetch the data from the back-end application and use the Async scope to insert records into the Audit database

D.

Implement parallel for each scope to fetch the data from the backend application and use Async scope to insert the records into the Audit database

Full Access
Question # 8

A company is designing an integration Mule application to process orders by submitting them to a back-end system for offline processing. Each order will be received by the Mule application through an HTTP5 POST and must be acknowledged immediately.

Once acknowledged the order will be submitted to a back-end system. Orders that cannot be successfully submitted due to the rejections from the back-end system will need to be processed manually (outside the banking system).

The mule application will be deployed to a customer hosted runtime and will be able to use an existing ActiveMQ broker if needed. The ActiveMQ broker is located inside the organization's firewall. The back-end system has a track record of unreliability due to both minor network connectivity issues and longer outages.

Which combination of Mule application components and ActiveMQ queues are required to ensure automatic submission of orders to the back-end system while supporting but minimizing manual order processing?

A.

One or more On Error scopes to assist calling the back-end system An Untill successful scope containing VM components for long retries A persistent dead-letter VM queue configure in Cloud hub

B.

An Until Successful scope to call the back-end system One or more ActiveMQ long-retry queues One or more ActiveMQ dead-letter queues for manual processing

C.

One or more on-Error scopes to assist calling the back-end system one or more ActiveMQ long-retry queues A persistent dead-letter Object store configuration in the CloudHub object store service

D.

A batch job scope to call the back in system An Untill successful scope containing Object Store components for long retries. A dead-letter object store configured in the Mule application

Full Access
Question # 9

An organization has several APIs that accept JSON data over HTTP POST. The APIs are all publicly available and are associated with several mobile applications and web applications. The organization does NOT want to use any authentication or compliance policies for these APIs, but at the same time, is worried that some bad actor could send payloads that could somehow compromise the applications or servers running the API implementations. What out-of-the-box Anypoint Platform policy can address exposure to this threat?

A.

Apply a Header injection and removal policy that detects the malicious data before it is used

B.

Apply an IP blacklist policy to all APIs; the blacklist will Include all bad actors

C.

Shut out bad actors by using HTTPS mutual authentication for all API invocations

D.

Apply a JSON threat protection policy to all APIs to detect potential threat vectors

Full Access
Question # 10

A new upstream API Is being designed to offer an SLA of 500 ms median and 800 ms maximum (99th percentile) response time. The corresponding API implementation needs to sequentially invoke 3 downstream APIs of very similar complexity. The first of these downstream APIs offers the following SLA for its response time: median: 100 ms, 80th percentile: 500 ms, 95th percentile: 1000 ms. If possible, how can a timeout be set in the upstream API for the invocation of the first downstream API to meet the new upstream API's desired SLA?

A.

Set a timeout of 100 ms; that leaves 400 ms for the other two downstream APIs to complete

B.

Do not set a timeout; the Invocation of this API Is mandatory and so we must wait until it responds

C.

Set a timeout of 50 ms; this times out more invocations of that API but gives additional room for retries

D.

No timeout is possible to meet the upstream API's desired SLA; a different SLA must be negotiated with the first downstream API or invoke an alternative API

Full Access
Question # 11

A mule application uses an HTTP request operation to involve an external API.

The external API follows the HTTP specification for proper status code usage.

What is possible cause when a 3xx status code is returned to the HTTP Request operation from the external API?

A.

The request was not accepted by the external API

B.

The request was Redirected to a different URL by the external API

C.

The request was NOT RECEIVED by the external API

D.

The request was ACCEPTED by the external API

Full Access
Question # 12

To implement predictive maintenance on its machinery equipment, ACME Tractors has installed thousands of IoT sensors that will send data for each machinery asset as sequences of JMS messages, in near real-time, to a JMS queue named SENSOR_DATA on a JMS server. The Mule application contains a JMS Listener operation configured to receive incoming messages from the JMS servers SENSOR_DATA JMS queue. The Mule application persists each received JMS message, then sends a transformed version of the corresponding Mule event to the machinery equipment back-end systems.

The Mule application will be deployed to a multi-node, customer-hosted Mule runtime cluster. Under normal conditions, each JMS message should be processed exactly once.

How should the JMS Listener be configured to maximize performance and concurrent message processing of the JMS queue?

A.

Set numberOfConsumers = 1

Set primaryNodeOnly = false

B.

Set numberOfConsumers = 1

Set primaryNodeOnly = true

C.

Set numberOfConsumers to a value greater than one

Set primaryNodeOnly = true

D.

Set numberOfConsumers to a value greater than one

Set primaryNodeOnly = false

Full Access
Question # 13

An ABC Farms project team is planning to build a new API that is required to work with data from different domains across the organization.

The organization has a policy that all project teams should leverage existing investments by reusing existing APIs and related resources and documentation that other project teams have already developed and deployed.

To support reuse, where on Anypoint Platform should the project team go to discover and read existing APIs, discover related resources and documentation, and interact with mocked versions of those APIs?

A.

Design Center

B.

API Manager

C.

Runtime Manager

D.

Anypoint Exchange

Full Access
Question # 14

As a part of business requirement , old CRM system needs to be integrated using Mule application. CRM system is capable of exchanging data only via SOAP/HTTP protocol. As an integration architect who follows API led approach , what is the the below step you will perform so that you can share document with CRM team?

A.

Create RAML specification using Design Center

B.

Create SOAP API specification using Design Center

C.

Create WSDL specification using text editor

D.

Create WSDL specification using Design Center

Full Access
Question # 15

An organization has implemented a continuous integration (CI) lifecycle that promotes Mule applications through code, build, and test stages. To standardize the organization's CI journey, a new dependency control approach is being designed to store artifacts that include information such as dependencies, versioning, and build promotions.

To implement these process improvements, the organization will now require developers to maintain all dependencies related to Mule application code in a shared location.

What is the most idiomatic (used for its intended purpose) type of system the organization should use in a shared location to standardize all dependencies related to Mule application code?

A.

A MuleSoft-managed repository atrepository.mulesoft.org

B.

A binary artifact repository

C.

API Community Manager

D.

The Anypoint Object Store service at cloudhub.io

Full Access
Question # 16

An organization is creating a Mule application that will be deployed to CloudHub. The Mule application has a property named dbPassword that stores a database user’s password.

The organization's security standards indicate that the dbPassword property must be hidden from every Anypoint Platform user after the value is set in the Runtime Manager Properties tab.

What configuration in the Mule application helps hide the dbPassword property value in Runtime Manager?

A.

Use secure::dbPassword as the property placeholder name and store the cleartext (unencrypted) value in a secure properties placeholder file

B.

Use secure::dbPassword as the property placeholder name and store the property encrypted value in a secure properties placeholder file

C.

Add the dbPassword property to the secureProperties section of the pom.xml file

D.

Add the dbPassword property to the secureProperties section of the mule-artifact.json file

Full Access
Question # 17

Which Mulesoft feature helps users to delegate their access without sharing sensitive credentials or giving full control of accounts to 3rd parties?

A.

Secure Scheme

B.

client id enforcement policy

C.

Connected apps

D.

Certificates

Full Access