Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Salesforce Certified MuleSoft Platform Architect (Mule-Arch-201)

Last Update 20 hours ago Total Questions : 152

The Salesforce Certified MuleSoft Platform Architect (Mule-Arch-201) content is now fully updated, with all current exam questions added 20 hours ago. Deciding to include MuleSoft-Platform-Architect-I practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our MuleSoft-Platform-Architect-I exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these MuleSoft-Platform-Architect-I sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Salesforce Certified MuleSoft Platform Architect (Mule-Arch-201) practice test comfortably within the allotted time.

Question # 4

Version 3.0.1 of a REST API implementation represents time values in PST time using ISO 8601 hh:mm:ss format. The API implementation needs to be changed to instead represent time values in CEST time using ISO 8601 hh:mm:ss format. When following the semver.org semantic versioning specification, what version should be assigned to the updated API implementation?

A.

3.0.2

B.

4.0.0

C.

3.1.0

D.

3.0.1

Question # 5

A system API is deployed to a primary environment as well as to a disaster recovery (DR) environment, with different DNS names in each environment. A process API is a client to the system API and is being rate limited by the system API, with different limits in each of the environments. The system API's DR environment provides only 20% of the rate limiting offered by the primary environment. What is the best API fault-tolerant invocation strategy to reduce overall errors in the process API, given these conditions and constraints?

A.

Invoke the system API deployed to the primary environment; add timeout and retry logic to the process API to avoid intermittent failures; if it still fails, invoke the system API deployed to the DR environment

B.

Invoke the system API deployed to the primary environment; add retry logic to the process API to handle intermittent failures by invoking the system API deployed to the DR environment

C.

In parallel, invoke the system API deployed to the primary environment and the system API deployed to the DR environment; add timeout and retry logic to the process API to avoid intermittent failures; add logic to the process API to combine the results

D.

Invoke the system API deployed to the primary environment; add timeout and retry logic to the process API to avoid intermittent failures; if it still fails, invoke a copy of the process API deployed to the DR environment

Question # 6

Traffic is routed through an API proxy to an API implementation. The API proxy is managed by API Manager and the API implementation is deployed to a CloudHub VPC using Runtime Manager. API policies have been applied to this API. In this deployment scenario, at what point are the API policies enforced on incoming API client requests?

A.

At the API proxy

B.

At the API implementation

C.

At both the API proxy and the API implementation

D.

At a MuleSoft-hosted load balancer

Question # 7

An organization has built an application network following the API-led connectivity approach recommended by MuleSoft. To protect the application network against

attacks from malicious external API clients, the organization plans to apply JSON Threat Protection policies.

To which API-led connectivity layer should the JSON Threat Protection policies most commonly be applied?

A.

All layers

B.

System layer

C.

Process layer

D.

Experience layer

Question # 8

An IT Security Compliance Auditor is assessing which nonfunctional requirements (NFRs) are already being implemented to meet security measures.

* The Web API has Rate-Limiting SLA

* Basic Authentication - LDAP

* JSON Threat Protection

* TP Allowlist policies applied

Which two NFRs-are enforced?

A.

The API invocations are coming from a known subnet range

B.

Username/password supported to validate login credentials

C.

Sensitive data is masked to prevent compromising critical information

D.

The API is protected against XML invocation attacks

E.

Performance expectations are to be allowed up to 1,000 requests per second

Question # 9

The implementation of a Process API must change.

What is a valid approach that minimizes the impact of this change on API clients?

A.

Update the RAML definition of the current Process API and notify API client developers by sending them links to the updated RAML definition

B.

Postpone changes until API consumers acknowledge they are ready to migrate to a new Process API or API version

C.

Implement required changes to the Process API implementation so that whenever possible, the Process API's RAML definition remains unchanged

D.

Implement the Process API changes in a new API implementation, and have the old API implementation return an HTTP status code 301 - Moved Permanently to inform API clients they should be calling the new API implementation

Question # 10

A Mule 4 API has been deployed to CloudHub and a Basic Authentication - Simple policy has been applied to all API methods and resources. However, the API is still accessible

by clients without using authentication.

How is this possible?

A.

The APE Router component is pointing to the incorrect Exchange version of the APT

B.

The Autodiscovery element is not present, in the deployed Mule application

C.

No… for client applications have been created of this API

D.

One of the application’s CloudHub workers restarted

Go to page: