Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the MuleSoft Certified Architect MCIA-Level-1 Questions and answers with ValidTests

Exam MCIA-Level-1 All Questions
Exam MCIA-Level-1 Premium Access

View all detail and faqs for the MCIA-Level-1 exam

Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions
Questions # 51:

An organization's security policies mandate complete control of the login credentials used to log in to Anypoint Platform. What feature of Anypoint Platform should be used to meet this requirement?

Options:

A.

Enterprise Security Module

B.

Client ID Secret

C.

Federated Identity Management

D.

Federated Client Management

Expert Solution
Questions # 52:

A Mule application uses the Database connector.

What condition can the Mule application automatically adjust to or recover from without needing to restart or redeploy the Mule application?

Options:

A.

One of the stored procedures being called by the Mule application has been renamed

B.

The database server was unavailable for four hours due to a major outage but is now fully operational again

C.

The credentials for accessing the database have been updated and the previous credentials are no longer valid

D.

The database server has been updated and hence the database driver library/JAR needs a minor version upgrade

Expert Solution
Questions # 53:

According to MuleSoft, which system integration term describes the method, format, and protocol used for communication between two system?

Options:

A.

Component

B.

interaction

C.

Message

D.

Interface

Expert Solution
Questions # 54:

According to MuleSoft, a synchronous invocation of a RESTful API using HTTP to get an individual customer record from a single system is an example of which system integration interaction pattern?

Options:

A.

Request-Reply

B.

Multicast

C.

Batch

D.

One-way

Expert Solution
Questions # 55:

In which order are the API Client, API Implementation, and API interface components called in a typical REST request?

Options:

A.

API Client > API implementation > API Interface

B.

API interface > API Client > API Implementation

C.

API Client > API Interface > API implementation

D.

API Implementation > API Interface > API Client

Expert Solution
Questions # 56:

A leading eCommerce giant will use MuleSoft APIs on Runtime Fabric (RTF) to process customer orders. Some customer-sensitive information, such as credit card information, is required in request payloads or is included in response payloads in some of the APIs. Other API requests and responses are not authorized to access some of this customer-sensitive information but have been implemented to validate and transform based on the structure and format of this customer-sensitive information (such as account IDs, phone numbers, and postal codes).

What approach configures an API gateway to hide sensitive data exchanged between API consumers and API implementations, but can convert tokenized fields back to their original value for other API requests or responses, without having to recode the API implementations?

Later, the project team requires all API specifications to be augmented with an additional non-functional requirement (NFR) to protect the backend services from a high rate of requests, according to defined service-level

agreements (SLAs). The NFR's SLAs are based on a new tiered subscription level "Gold", "Silver", or "Platinum" that must be tied to a new parameter that is being added to the Accounts object in their enterprise data model.

Following MuleSoft's recommended best practices, how should the project team now convey the necessary non-functional requirement to stakeholders?

Options:

A.

Create and deploy API proxies in API Manager for the NFR, change the baseurl in each

API specification to the corresponding API proxy implementation endpoint, and publish each modified API specification to Exchange

B.

Update each API specification with comments about the NFR's SLAs and publish each modified API specification to Exchange

C.

Update each API specification with a shared RAML fragment required to implement the NFR and publish the RAML fragment and each modified API specification to Exchange

D.

Create a shared RAML fragment required to implement the NFR, list each API implementation endpoint in the RAML fragment, and publish the RAML fragment to Exchange

Expert Solution
Questions # 57:

An organization is not meeting its growth and innovation objectives because IT cannot deliver projects last enough to keep up with the pace of change required by the business.

According to MuleSoft’s IT delivery and operating model, which step should the organization lake to solve this problem?

Options:

A.

Modify IT governance and security controls so that line of business developers can have direct access to the organization's systems of record

B.

Switch from a design-first to a code-first approach for IT development

C.

Adopt a new approach that decouples core IT projects from the innovation that happens within each line of business

D.

Hire more |T developers, architects, and project managers to increase IT delivery

Expert Solution
Questions # 58:

An XA transaction Is being configured that involves a JMS connector listening for Incoming JMS messages. What is the meaning of the timeout attribute of the XA transaction, and what happens after the timeout expires?

Options:

A.

The time that is allowed to pass between committing the transaction and the completion of the Mule flow After the timeout, flow processing triggers an error

B.

The time that Is allowed to pass between receiving JMS messages on the same JMS connection After the timeout, a new JMS connection Is established

C.

The time that Is allowed to pass without the transaction being ended explicitly After the timeout, the transaction Is forcefully rolled-back

D.

The time that Is allowed to pass for state JMS consumer threads to be destroyed After the timeout, a new JMS consumer thread is created

Expert Solution
Questions # 59:

A company is building an application network and has deployed four Mule APIs: one experience API, one process API, and two system APIs. The logs from all the APIs are aggregated in an external log aggregation tool. The company wants to trace messages that are exchanged between multiple API implementations. What is the most idiomatic (based on its intended use) identifier that should be used to implement Mule event tracing across the multiple API implementations?

Options:

A.

Mule event ID

B.

Mule correlation ID

C.

Client's IP address

D.

DataWeave UUID

Expert Solution
Questions # 60:

As a part of project , existing java implementation is being migrated to Mulesoft. Business is very tight on the budget and wish to complete the project in most economical way possible.

Canonical object model using java is already a part of existing implementation. Same object model is required by mule application for a business use case. What is the best way to achieve this?

Options:

A.

Make use of Java module

B.

Create similar model for Mule applications

C.

Create a custom application to read Java code and make it available for Mule application

D.

Use Anypoint exchange

Expert Solution
Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions