March Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

An API has been updated in Anypoint Exchange by its API producer from version 3.1.1 to 3.2.0 following accepted semantic versioning practices and the changes have been communicated via the API's public portal. The API endpoint does NOT change in the new version. How should the developer of an API client respond to this change?

A.

The update should be identified as a project risk and full regression testing of the functionality that uses this API should be run.

B.

The API producer should be contacted to understand the change to existing functionality.

C.

The API producer should be requested to run the old version in parallel with the new one.

D.

The API client code ONLY needs to be changed if it needs to take advantage of new features.

Full Access
Question # 5

An organization designing a hybrid, load balanced, single cluster production environment. Due to performance service level agreement goals, it is looking into running the Mule applications in an active-active multi node cluster configuration.

What should be considered when running its Mule applications in this type of environment?

A.

All event sources, regardless of time , can be configured as the target source by the primary node in the cluster

B.

An external load balancer is required to distribute incoming requests throughout the cluster nodes

C.

A Mule application deployed to multiple nodes runs in an isolation from the other nodes in the cluster

D.

Although the cluster environment is fully installed configured and running, it will not process any requests until an outage condition is detected by the primary node in the cluster.

Full Access
Question # 6

To implement predictive maintenance on its machinery equipment, ACME Tractors has installed thousands of IoT sensors that will send data for each machinery asset as sequences of JMS messages, in near real-time, to a JMS queue named SENSOR_DATA on a JMS server. The Mule application contains a JMS Listener operation configured to receive incoming messages from the JMS servers SENSOR_DATA JMS queue. The Mule application persists each received JMS message, then sends a transformed version of the corresponding Mule event to the machinery equipment back-end systems.

The Mule application will be deployed to a multi-node, customer-hosted Mule runtime cluster. Under normal conditions, each JMS message should be processed exactly once.

How should the JMS Listener be configured to maximize performance and concurrent message processing of the JMS queue?

A.

Set numberOfConsumers = 1

Set primaryNodeOnly = false

B.

Set numberOfConsumers = 1

Set primaryNodeOnly = true

C.

Set numberOfConsumers to a value greater than one

Set primaryNodeOnly = true

D.

Set numberOfConsumers to a value greater than one

Set primaryNodeOnly = false

Full Access
Question # 7

An API client is implemented as a Mule application that includes an HTTP Request operation using a default configuration. The HTTP Request operation invokes an external API that follows standard HTTP status code conventions, which causes the HTTP Request operation to return a 4xx status code.

What is a possible cause of this status code response?

A.

An error occurred inside the external API implementation when processing the HTTP request that was received from the outbound HTTP Request operation of the Mule application

B.

The external API reported that the API implementation has moved to a different external endpoint

C.

The HTTP response cannot be interpreted by the HTTP Request operation of the Mule application after it was received from the external API

D.

The external API reported an error with the HTTP request that was received from the outbound HTTP Request operation of the Mule application

Full Access
Question # 8

Which productivity advantage does Anypoint Platform have to both implement and manage an AP?

A.

Automatic API proxy generation

B.

Automatic API specification generation

C.

Automatic API semantic versioning

D.

Automatic API governance

Full Access
Question # 9

Anypoint Exchange is required to maintain the source code of some of the assets committed to it, such as Connectors, Templates, and API specifications.

What is the best way to use an organization's source-code management (SCM) system in this context?

A.

Organizations should continue to use an SCM system of their choice, in addition to keeping source code for these asset types in Anypoint Exchange, thereby enabling parallel development, branching, and merging

B.

Organizations need to use Anypoint Exchange as the main SCM system to centralize versioning and avoid code duplication

C.

Organizations can continue to use an SCM system of their choice for branching and merging, as long as they follow the branching and merging strategy enforced by Anypoint Exchange

D.

Organizations need to point Anypoint Exchange to their SCM system so Anypoint Exchange can pull source code when requested by developers and provide it to Anypoint Studio

Full Access
Question # 10

What is not true about Mule Domain Project?

A.

This allows Mule applications to share resources

B.

Expose multiple services within the Mule domain on the same port

C.

Only available Anypoint Runtime Fabric

D.

Send events (messages) to other Mule applications using VM queues

Full Access
Question # 11

Refer to the exhibit.

A shopping cart checkout process consists of a web store backend sending a sequence of API invocations to an Experience API, which in turn invokes a Process API. All API invocations are over HTTPS POST. The Java web store backend executes in a Java EE application server, while all API implementations are Mule applications executing in a customer -hosted Mule runtime.

End-to-end correlation of all HTTP requests and responses belonging to each individual checkout Instance is required. This is to be done through a common correlation ID, so that all log entries written by the web store backend, Experience API implementation, and Process API implementation include the same correlation ID for all requests and responses belonging to the same checkout instance.

What is the most efficient way (using the least amount of custom coding or configuration) for the web store backend and the implementations of the Experience API and Process API to participate in end-to-end correlation of the API invocations for each checkout instance?

A)

The web store backend, being a Java EE application, automatically makes use of the thread-local correlation ID generated by the Java EE application server and automatically transmits that to the Experience API using HTTP-standard headers

No special code or configuration is included in the web store backend, Experience API, and Process API implementations to generate and manage the correlation ID

B)

The web store backend generates a new correlation ID value at the start of checkout and sets it on the X-CORRELATlON-lt HTTP request header In each API invocation belonging to that checkout

No special code or configuration is included in the Experience API and Process API implementations to generate and manage the correlation ID

C)

The Experience API implementation generates a correlation ID for each incoming HTTP request and passes it to the web store backend in the HTTP response, which includes it in all subsequent API invocations to the Experience API.

The Experience API implementation must be coded to also propagate the correlation ID to the Process API in a suitable HTTP request header

D)

The web store backend sends a correlation ID value in the HTTP request body In the way required by the Experience API

The Experience API and Process API implementations must be coded to receive the custom correlation ID In the HTTP requests and propagate It in suitable HTTP request headers

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 12

A Mule application name Pub uses a persistence object store. The Pub Mule application is deployed to Cloudhub and it configured to use Object Store v2.

Another Mule application name sub is being developed to retrieve values from the Pub Mule application persistence object Store and will also be deployed to cloudhub.

What is the most direct way for the Sub Mule application to retrieve values from the Pub Mule application persistence object store with the least latency?

A.

Use an object store connector configured to access the Pub Mule application persistence object store

B.

Use a VM connector configured to directly access the persistence queue of the Pub Mule application persistence object store.

C.

Use an Anypoint MQ connector configured to directly access the Pub Mule application persistence object store

D.

Use the Object store v2 REST API configured to access the Pub Mule application persistence object store.

Full Access
Question # 13

An organization is designing multiple new applications to run on CloudHub in a single Anypoint VPC and that must share data using a common persistent Anypoint object store V2 (OSv2).

Which design gives these mule applications access to the same object store instance?

A.

AVM connector configured to directly access the persistence queue of the persistent object store

B.

An Anypoint MQ connector configured to directly access the persistent object store

C.

Object store V2 can be shared across cloudhub applications with the configured osv2 connector

D.

The object store V2 rest API configured to access the persistent object store

Full Access
Question # 14

An integration team uses Anypoint Platform and follows MuleSoft's recommended approach to full lifecycle API development.

Which step should the team's API designer take before the API developers implement the AP! Specification?

A.

Generate test cases using MUnit so the API developers can observe the results of running the API

B.

Use the scaffolding capability of Anypoint Studio to create an API portal based on the API specification

C.

Publish the API specification to Exchange and solicit feedback from the API's consumers

D.

Use API Manager to version the API specification

Full Access
Question # 15

A Mule application is being designed for deployment to a single CloudHub worker. The Mule application will have a flow that connects to a SaaS system to perform some operations each time the flow is invoked.

The SaaS system connector has operations that can be configured to request a short-lived token (fifteen minutes) that can be reused for subsequent connections within the fifteen minute time window. After the token expires, a new token must be requested and stored.

What is the most performant and idiomatic (used for its intended purpose) Anypoint Platform component or service to use to support persisting and reusing tokens in the Mule application to help speed up reconnecting the Mule application to the SaaS application?

A.

Nonpersistent object store

B.

Persistent object store

C.

Variable

D.

Database

Full Access
Question # 16

What limits if a particular Anypoint Platform user can discover an asset in Anypoint Exchange?

A.

Design Center and RAML were both used to create the asset

B.

The existence of a public Anypoint Exchange portal to which the asset has been published

C.

The type of the asset in Anypoint Exchange

D.

The business groups to which the user belongs

Full Access
Question # 17

Refer to the exhibit.

The HTTP Listener and the Logger are being handled from which thread pools respectively?

A.

CPU_INTENSIVE and Dedicated Selector pool

B.

UBER and NONBLOCKING

C.

Shared Selector Pool and CPU LITE

D.

BLOCKING _IO and UBER

Full Access
Question # 18

Mule application is deployed to Customer Hosted Runtime. Asynchronous logging was implemented to improved throughput of the system. But it was observed over the period of time that few of the important exception log messages which were used to rollback transactions are not working as expected causing huge loss to the Organization. Organization wants to avoid these losses. Application also has constraints due to which they cant compromise on throughput much. What is the possible option in this case?

A.

Logging needs to be changed from asynchronous to synchronous

B.

External log appender needs to be used in this case

C.

Persistent memory storage should be used in such scenarios

D.

Mixed configuration of asynchronous or synchronous loggers should be used to log exceptions via synchronous way

Full Access
Question # 19

An organization's security requirements mandate centralized control at all times over authentication and authorization of external applications when invoking web APIs managed on Anypoint Platform.

What Anypoint Platform feature is most idiomatic (used for its intended purpose), straightforward, and maintainable to use to meet this requirement?

A.

Client management configured in access management

B.

Identity management configured in access management

C.

Enterprise Security module coded in Mule applications

D.

External access configured in API Manager

Full Access
Question # 20

An insurance company is implementing a MuleSoft API to get inventory details from the two vendors. Due to network issues, the invocations to vendor applications are getting timed-out intermittently. But the transactions are successful upon reprocessing

What is the most performant way of implementing this requirement?

A.

Implement a scatter-gather scope to invoke the two vendor

applications on two different route

Use the Until-Successful scope to implement the retry mechanism

for timeout errors on each route

B.

Implement a Choice scope to invoke the two vendor applications on two different route

Use the try-catch scope to implement the retry mechanism for timeout errors on each route

C.

Implement a For-Each scope to invoke the two vendor applications

Use until successful scope to implement the retry mechanism for the timeout errors

D.

Implement Round-Robin scope to invoke the two vendor applications on two different routes

Use the Try-Catch scope to implement retry mechanism for timeout errors on each route

Full Access
Question # 21

A REST API is being designed to implement a Mule application.

What standard interface definition language can be used to define REST APIs?

A.

Web Service Definition Language(WSDL)

B.

OpenAPI Specification (OAS)

C.

YAML

D.

AsyncAPI Specification

Full Access
Question # 22

Which type of communication is managed by a service mesh in a microservices architecture?

A.

Communication between microservices runtime administrators

B.

Communication between microservices developers

C.

Communication between microservices

D.

Communication between trading partner services

Full Access
Question # 23

A team would like to create a project skeleton that developers can use as a starting point when creating API Implementations with Anypoint Studio. This skeleton should help drive consistent use of best practices within the team.

What type of Anypoint Exchange artifact(s) should be added to Anypoint Exchange to publish the project skeleton?

A.

A custom asset with the default API implementation

B.

A RAML archetype and reusable trait definitions to be reused across API implementations

C.

An example of an API implementation following best practices

D.

a Mule application template with the key components and minimal integration logic

Full Access
Question # 24

Refer to the exhibit.

An organization deploys multiple Mule applications to the same customer -hosted Mule runtime. Many of these Mule applications must expose an HTTPS endpoint on the same port using a server-side certificate that rotates often.

What is the most effective way to package the HTTP Listener and package or store the server-side certificate when deploying these Mule applications, so the disruption caused by certificate rotation is minimized?

A.

Package the HTTPS Listener configuration in a Mule DOMAIN project, referencing it from all Mule applications that need to expose an HTTPS endpoint Package the server-side certificate in ALL Mule APPLICATIONS that need to expose an HTTPS endpoint

B.

Package the HTTPS Listener configuration in a Mule DOMAIN project, referencing it from all Mule applications that need to expose an HTTPS endpoint. Store the server-side certificate in a shared filesystem location in the Mule runtime's classpath, OUTSIDE the Mule DOMAIN or any Mule APPLICATION

C.

Package an HTTPS Listener configuration In all Mule APPLICATIONS that need to expose an HTTPS endpoint Package the server-side certificate in a NEW Mule DOMAIN project

D.

Package the HTTPS Listener configuration in a Mule DOMAIN project, referencing It from all Mule applications that need to expose an HTTPS endpoint. Package the server-side certificate in the SAME Mule DOMAIN project Go to Set

Full Access
Question # 25

What is an advantage of using OAuth 2.0 client credentials and access tokens over only API keys for API authentication?

A.

If the access token is compromised, the client credentials do not to be reissued.

B.

If the access token is compromised, I can be exchanged for an API key.

C.

If the client ID is compromised, it can be exchanged for an API key

D.

If the client secret is compromised, the client credentials do not have to be reissued.

Full Access
Question # 26

According to MuleSoft, which deployment characteristic applies to a microservices application architecture?

A.

Services exist as independent deployment artifacts and can be scaled -independently of other services

B.

All services of an application can be deployed together as single Java WAR file

C.

A deployment to enhance one capability requires a redeployment of all capabilities

D.

Core business capabilities are encapsulated in a single, deployable application

Full Access
Question # 27

A project team is working on an API implementation using the RAML definition as a starting point. The team has updated the definition to include new operations and has published a new version to exchange. Meanwhile another team is working on a mule application consuming the same API implementation.

During the development what has to be performed by the mule application team to take advantage of the newly added operations?

A.

Scaffold the client application with the new definition

B.

Scaffold API implementation application with the new definition

C.

Update the REST connector from exchange in the client application

D.

Update the API connector in the API implementation and publish to exchange

Full Access
Question # 28

Refer to the exhibit.

A business process involves two APIs that interact with each other asynchronously over HTTP. Each API is implemented as a Mule application. API 1 receives the initial HTTP request and invokes API 2 (in a fire and forget fashion) while API 2, upon completion of the processing, calls back into API l to notify about completion of the asynchronous process.

Each API Is deployed to multiple redundant Mule runtimes and a separate load balancer, and is deployed to a separate network zone.

In the network architecture, how must the firewall rules be configured to enable the above Interaction between API 1 and API 2?

A.

To authorize the certificate to be used both APIs

B.

To enable communication from each API’s Mule Runtimes and Network zone to the load balancer of the other API

C.

To open direct two-way communication between the Mule Runtimes of both API’s

D.

To allow communication between load balancers used by each API

Full Access
Question # 29

Which of the below requirements prevent the usage of Anypoint MQ in a company's network? (Choose two answers)

A.

single message payload can be up to 15 MB

B.

payloads must be encrypted

C.

the message broker must be hosted on premises

D.

support for point-to-point messaging

E.

ability for a third party outside the company's network to consume events from the queue

Full Access
Question # 30

An IT integration delivery team begins a project by gathering all of the requirements, and proceeds to execute the remaining project activities as sequential, non-repeating phases.

Which IT project delivery methodology is this team following?

A.

Kanban

B.

Scrum

C.

Waterfall

D.

Agile

Full Access
Question # 31

A team has completed the build and test activities for a Mule application that implements a System API for its application network.

Which Anypoint Platform component should the team now use to both deploy and monitor the System AP\ implementation?

A.

API Manager

B.

Design Center

C.

Anypoint Exchange

D.

Runtime Manager

Full Access
Question # 32

A manufacturing company is planning to deploy Mule applications to its own Azure Kubernetes Service infrastructure.

The organization wants to make the Mule applications more available and robust by deploying each Mule application to an isolated Mule runtime in a Docker container while managing all the Mule applications from the MuleSoft-hosted control plane.

What is the most idiomatic (used for its intended purpose) choice of runtime plane to meet these organizational requirements?

A.

Anypoint Platform Private Cloud Edition

B.

Anypoint Runtime Fabric

C.

CloudHub

D.

Anypoint Service Mesh

Full Access
Question # 33

According to MuleSoft, which system integration term describes the method, format, and protocol used for communication between two system?

A.

Component

B.

interaction

C.

Message

D.

Interface

Full Access
Question # 34

What best describes the Fully Qualified Domain Names (FQDNs), also known as DNS entries, created when a Mule application is deployed to the CloudHub Shared Worker Cloud?

A.

A fixed number of FQDNs are created, IRRESPECTIVE of the environment and VPC design

B.

The FQDNs are determined by the application name chosen, IRRESPECTIVE of the region

C.

The FQDNs are determined by the application name, but can be modified by an administrator after deployment

D.

The FQDNs are determined by both the application name and the region

Full Access
Question # 36

An organization has an HTTPS-enabled Mule application named Orders API that receives requests from another Mule application named Process Orders.

The communication between these two Mule applications must be secured by TLS mutual authentication (two-way TLS).

At a minimum, what must be stored in each truststore and keystore of these two Mule applications to properly support two-way TLS between the two Mule applications while properly protecting each Mule application's keys?

A.

Orders API truststore: The Orders API public key

Process Orders keystore: The Process Orders private key and public key

B.

Orders API truststore: The Orders API private key and public key

Process Orders keystore: The Process Orders private key public key

C.

Orders API truststore: The Process Orders public key

Orders API keystore: The Orders API private key and public key

Process Orders truststore: The Orders API public key

Process Orders keystore: The Process Orders private key and public key

D.

Orders API truststore: The Process Orders public key

Orders API keystore: The Orders API private key

Process Orders truststore: The Orders API public key

Process Orders keystore: The Process Orders private key

Full Access