Highest Quality of MCIA-Level-1 practice exam materials and questions pool for MuleSoft certification for examinee, Real Success Guaranteed with Updated MCIA-Level-1 pdf dumps vce Materials. 100% PASS MuleSoft Certified Integration Architect - Level 1 exam Today!
MuleSoft MCIA-Level-1 Free Dumps Questions Online, Read and Test Now.
NEW QUESTION 1
What aspects of a CI/CD pipeline for Mule applications can be automated using MuleSoft-provided Maven plugins?
- A. Import from API designer, compile, package, unit test, deploy, publish to Anypoint Exchange
- B. Compile, package, unit test, validate unit test coverage, deploy
- C. Compile, package, unit test, deploy, integration test
- D. Compile, package, unit test, deploy, create associated API instances in API Manager
Answer: C
NEW QUESTION 2
A Mule application currently writes to two separate SQL Server database instances across the internet using a single XA transaction. It is proposed to split this one transaction into two separate non-XA transactions with no other changes to the Mule application.
What non-functional requirement can be expected to be negatively affected when implementing this change?
- A. Throughput
- B. Availability
- C. Response time
- D. Consistency
Answer: D
NEW QUESTION 3
Refer to the exhibit.
An organization deploys multiple Mule applications to the same customer -hosted Mule runtime.
Many of these Mule applications must expose an HTTPS endpoint on the same port using a serverside
certificate that rotates often.
What is the most effective way to package the HTTP Listener and package or store the server-side
certificate when deploying these Mule applications, so the disruption caused by certificate rotation is
minimized?
- A. Package the HTTPS Listener configuration in a Mule DOMAIN project, referencing it from all Muleapplications that need to expose an HTTPS endpoint Package the server-side certificate in ALL Mule APPLICATIONS that need to expose an HTTPS endpoint
- B. Package the HTTPS Listener configuration in a Mule DOMAIN project, referencing it from all Muleapplications that need to expose an HTTPS endpointStore the server-side certificate in a shared filesystem location in the Mule runtime's classpath,OUTSIDE the Mule DOMAIN or any Mule APPLICATION
- C. Package an HTTPS Listener configuration In all Mule APPLICATIONS that need to expose an HTTPSendpoint Package the server-side certificate in a NEW Mule DOMAIN project
- D. Package the HTTPS Listener configuration in a Mule DOMAIN project, referencing It from all Muleapplications that need to expose an HTTPS endpoint Package the server-side certificate in the SAME Mule DOMAIN project Go to Set
Answer: B
NEW QUESTION 4
What requires configuration of both a key store and a trust store for an HTTP Listener?
- A. Support for TLS mutual (two-way) authentication with HTTP clients
- B. Encryption of both HTTP request and HTTP response bodies for all HTTP clients
- C. Encryption of requests to both subdomains and API resource endpoints (https://api.customer.com/ and https://customer.com/api)
- D. Encryption of both HTTP request header and HTTP request body for all HTTP clients
Answer: A
NEW QUESTION 5
A team would like to create a project skeleton that developers can use as a starting point when creating API implementations with Anypoint Studio. This skeleton should help drive consistent use of best practices within the team.
What type of Anypoint Exchange artifact(s) should be added to Anypoint Exchange to publish the project skeleton?
- A. A RAML archetype and reusable trait definitions to be reused across API implementations
- B. A custom asset with the default API implementation
- C. An example of an API implementation following best practices
- D. A Mule application template with the key components and minimal integration logic
Answer: D
NEW QUESTION 6
A new Mule application under development must implement extensive data transformation logic. Some of the data transformation functionality is already available as external transformation services that are mature and widely used across the organization; the rest is highly specific to the new Mule application.
The organization follows a rigorous testing approach, where every service and application must be extensively acceptance tested before it is allowed to go into production.
What is the best way to implement the data transformation logic for this new Mule application while minimizing the overall testing effort?
- A. Implement and expose all transformation logic as mlaoservices using DataWeave, so it can be reused by any application component that needs it, including the new Mule application
- B. Implement transformation logic in the new Mute application using DataWeave, replicating the transformation logic of existing transformation services
- C. Extend the existing transformation services with new transformation logic and Invoke them from the new Mule application
- D. Implement transformation logic in the new Mute application using DataWeave, invoking existing transformation services when possible
Answer: D
NEW QUESTION 7
Mule applications need to be deployed to CloudHub so they can access on-premises database
systems. These systems store sensitive and hence tightly protected data, so are not accessible over
the internet.
What network architecture supports this requirement?
- A. An Anypoint VPC connected to the on-premises network using an IPsec tunnel or AWSDirectConnect, plus matching firewall rulesin the VPC and on-premises network
- B. Static IP addresses for the Mule applications deployed to the CloudHub Shared Worker Cloud, plusmatching firewall rules and IPwhitelisting in the on-premises network
- C. An Anypoint VPC with one Dedicated Load Balancer fronting each on-premises database system,plus matching IP whitelisting in the load balancer and firewall rules in the VPC and on-premisesnetwork
- D. Relocation of the database systems to a DMZ in the on-premises network, with Mule applicationsdeployed to the CloudHub Shared Worker Cloud connecting only to the DMZ
Answer: A
NEW QUESTION 8
An XA transaction Is being configured that involves a JMS connector listening for Incoming JMS
messages. What is the meaning of the timeout attribute of the XA transaction, and what happens
after the timeout expires?
- A. The time that is allowed to pass between committing the transaction and the completion of the Mule flow After the timeout, flow processing triggers an error
- B. The time that Is allowed to pass between receiving JMS messages on the same JMS connectionAfter the timeout, a new JMS connection Is established
- C. The time that Is allowed to pass without the transaction being ended explicitly After the timeout,the transaction Is forcefully rolled-back
- D. The time that Is allowed to pass for state JMS consumer threads to be destroyed After thetimeout, a new JMS consumer thread is created
Answer: C
NEW QUESTION 9
An organization uses a set of customer-hosted Mule runtimes that are managed using the Mulesoft-hosted control plane.
What is a condition that can be alerted on from Anypoint Runtime Manager without any custom components or custom coding?
- A. When an SSL certificate used by one of the deployed Mule applications is about to expire
- B. When a Mule runtime on a given customer-hosted server is experiencing high memory consumption during certain periods
- C. When a Mule runtime's customer-hosted server is about to run out of disk space
- D. When the Mule runtime license installed on a Mule runtime is about to expire
Answer: A
NEW QUESTION 10
A Mule application is being designed to do the following:
Step 1: Read a SalesOrder message from a JMS queue, where each SalesOrder consists of a header and a list of SalesOrderLineltems.
Step 2: Insert the SalesOrder header and each SalesOrderLineItem into different tables in an RDBMS.
Step 3: Insert the SalesOrder header and the sum of the prices of all its SalesOrderLineltems into a table in a different RDBMS.
No SalesOrder message can be lost and the consistency of all SalesOrder-related information in both RDBMSs must be ensured at all times.
What design choice (including choice of transactions) and order of steps addresses these requirements?
- A. * 1. Read the JMS message (NOT in an XA transaction)* 2. Perform EACH DB insert in a SEPARATE DB transaction* 3. Acknowledge the JMS message
- B. * 1. Read and acknowledge the JMS message (NOT in an XA transaction)* 2. In a NEW XA transaction, perform BOTH DB inserts
- C. * 1. Read the JMS message in an XA transaction* 2. In the SAME XA transaction, perform BOTH DB inserts but do NOT acknowledge the JMS message
- D. * 1. Read the JMS message (NOT in an XA transaction)* 2. Perform BOTH DB inserts in ONE DB transaction* 3. Acknowledge the JMS message
Answer: C
NEW QUESTION 11
An organization uses Mule runtimes which are managed by Anypoint Platform - Private Cloud Edition.
What MuleSoft component is responsible for feeding analytics data to non-MuleSoft analytics platforms?
- A. Anypoint Runtime Manager
- B. Anypoint Exchange
- C. Anypoint API Manager
- D. The Mule runtimes
Answer: A
NEW QUESTION 12
An organization is designing an integration solution to replicate financial transaction data from a legacy system into a data warehouse (DWH).
The DWH must contain a daily snapshot of financial transactions, to be delivered as a CSV file. Daily transaction volume exceeds tens of millions of records, with significant spikes in volume during popular shopping periods.
What is the most appropriate integration style for an integration solution that meets the organization's current requirements?
- A. API-led connectivity
- B. Batch-triggered ETL
- C. Event-driven architecture
- D. Microservice architecture
Answer: D
NEW QUESTION 13
Refer to the exhibit.
Anypoint Platform supports role-based access control (RBAC) to features of the platform. An organization has configured an external Identity Provider for identity management with Anypoint Platform.
What aspects of RBAC must ALWAYS be controlled from the Anypoint Platform control plane and CANNOT be controlled via the external Identity Provider?
- A. Controlling the business group within Anypoint Platform to which the user belongs
- B. Assigning Anypoint Platform permissions to a role
- C. Assigning Anypoint Platform role(s) to a user
- D. Removing a user's access to Anypoint Platform when they no longer work for the organization
Answer: B
NEW QUESTION 14
Refer to the exhibit.
One of the backend systems invoked by an API implementation enforces rate limits on the number of requests a particular client can make. Both the backend system and the API implementation are deployed to several non-production environments in addition to production.
Rate limiting of the backend system applies to all non-production environments. The production environment, however, does NOT have any rate limiting.
What is the most effective approach to conduct performance tests of the API implementation in a staging (non-production) environment?
- A. Use MUnit to simulate standard responses from the backend systemThen conduct performance tests to identify other bottlenecks in the system
- B. Create a mocking service that replicates the backend system's production performance characteristicsThen configure the API implementation to use the mocking service and conduct the performance tests
- C. Conduct scaled-down performance tests in the staging environment against the rate limited backend systemThen upscale performance results to full production scale
- D. Include logic within the API implementation that bypasses invocations of the backend system in a performance test situation, instead invoking local stubs that replicate typical backend system responsesThen conduct performance tests using this API implementation
Answer: C
NEW QUESTION 15
49 of A popular retailer is designing a public API for its numerous business partners. Each business partner will invoke the API at the URL 58. https://api.acme.com/partnefs/vl. The API implementation is estimated to require deployment to 5 CloudHub workers.
The retailer has obtained a public X.509 certificate for the name apl.acme.com, signed by a reputable CA, to be used as the server certificate.
Where and how should the X.509 certificate and Mule applications be used to configure load balancing among the 5 CloudHub workers, and what DNS entries should be configured in order for the retailer to support its numerous business partners?
- A. Add the X.509 certificate to the Mule application's deployable archive, then configure a CloudHub Dedicated Load Balancer (DLB) for each of the Mule application's CloudHub workersCreate a CNAME for api.acme.com pointing to the DLB's A record
- B. Add the X.509 certificate to the CloudHub Shared Load Balancer (SLB), not to the Mule application Create a CNAME for api.acme.com pointing to the SLB's A record
- C. Add the X.509 certificate to a CloudHub Dedicated Load Balancer (DLB), not to the Mule application Create a CNAME for api.acme.com pointing to the DLB's A record
- D. Add the x.509 certificate to the Mule application's deployable archive, then configure the CloudHub Shared Load Balancer (SLB) for each of the Mule application's CloudHub workersCreate a CNAME for api.acme.com pointing to the SLB's A record
Answer: C
NEW QUESTION 16
Refer to the exhibit.
An organization is designing a Mule application to receive data from one external business partner. The two companies currently have no shared IT infrastructure and do not want to establish one. Instead, all communication should be over the public internet (with no VPN).
What Anypoint Connector can be used in the organization's Mule application to securely receive data from this external business partner?
- A. File connector
- B. VM connector
- C. SFTP connector
- D. Object Store connector
Answer: C
NEW QUESTION 17
Refer to the exhibit.
A Mule application is deployed to a multi-node Mule runtime cluster. The Mule application uses the competing consumer pattern among its cluster replicas to receive JMS messages from a JMS queue. To process each received JMS message, the following steps are performed in a flow:
Step l: The JMS Correlation ID header is read from the received JMS message.
Step 2: The Mule application invokes an idempotent SOAP webservice over HTTPS, passing the JMS Correlation ID as one parameter in the SOAP request.
Step 3: The response from the SOAP webservice also returns the same JMS Correlation ID.
Step 4: The JMS Correlation ID received from the SOAP webservice is validated to be identical to the JMS Correlation ID received in Step 1.
Step 5: The Mule application creates a response JMS message, setting the JMS Correlation ID message header to the validated JMS Correlation ID and publishes that message to a response JMS queue.
Where should the Mule application store the JMS Correlation ID values received in Step 1 and Step 3 so that the validation in Step 4 can be performed, while also making the overall Mule application highly available, fault-tolerant, performant, and maintainable?
- A. Both Correlation ID values should be stored in a persistent object store
- B. Both Correlation ID values should be stored In a non-persistent object store
- C. The Correlation ID value in Step 1 should be stored in a persistent object storeThe Correlation ID value in step 3 should be stored as a Mule event vanable/attnbute
- D. Both Correlation ID values should be stored as Mule event vanabtes/attnbutes
Answer: C
NEW QUESTION 18
Refer to the exhibit.
A business process involves the receipt of a file from an external vendor over SFTP. The file needs to be parsed and its content processed, validated, and ultimately persisted to a database. The delivery mechanism is expected to change in the future as more vendors send similar files using other mechanisms such as file transfer or HTTP POST.
What is the most effective way to design for these requirements in order to minimize the impact of future change?
- A. Use a MuleSoft Scatter-Gather and a MuleSoft Batch Job to handle the different files coming from different sources
- B. Create a Process API to receive the file and process it using a MuleSoft Batch Job while delegating the data save process to a System API
- C. Create an API that receives the file and invokes a Process API with the data contained In the file, then have the Process API process the data using a MuleSoft Batch Job and other System APIs as needed
- D. Use a composite data source so files can be retrieved from various sources and delivered to a MuleSoft Batch Job for processing
Answer: C
NEW QUESTION 19
An API client is implemented as a Mule application that includes an HTTP Request operation using a
default configuration. The HTTP Request operation invokes an external API that follows standard
HTTP status code conventions, which causes the HTTP Request operation to return a 4xx status code.
What is a possible cause of this status code response?
- A. An error occurred inside the external API implementation when processing the HTTP request thatwas received from the outbound HTTP Request operation of the Mule application
- B. The external API reported that the API implementation has moved to a different external endpoint
- C. The HTTP response cannot be interpreted by the HTTP Request operation of the Mule applicationafter it was received from the external API
- D. The external API reported an error with the HTTP request that was received from the outboundHTTP Request operation of the Mule application
Answer: D
NEW QUESTION 20
Refer to the exhibit. A Mule application is being designed to expose a SOAP web service to its clients.
What language is typically used inside the web service's interface definition to define the data structures that the web service is expected to exchange with its clients?
- A. JSON Schema
- B. RAML
- C. WSDL
- D. XSD
Answer: C
NEW QUESTION 21
An organization has various integrations implemented as Mule applications. Some of these Mule applications are deployed to customhosted Mule runtimes (on-premises) while others execute in theMuleSoft-hosted runtime plane (CloudHub). To perform the Integra functionality, these Mule applications connect to various backend systems, with multiple applications typically needing to access the backend systems.
How can the organization most effectively avoid creating duplicates in each Mule application of the credentials required to access thebackend systems?
- A. Create a Mule domain project that maintains the credentials as Mule domain-shared resources Deploy the Mule applications to the Mule domain, so the credentials are available to the Mule applications
- B. Store the credentials in properties files in a shared folder within the organization's data center Have the Mule applications load properties files from this shared location at startup
- C. Segregate the credentials for each backend system into environment-specific properties files Package these properties files in each Mule application, from where they are loaded at startup
- D. Configure or create a credentials service that returns the credentials for each backend system, and that is accessible from customer-hosted and MuleSoft-hosted Mule runtimes Have the Mule applications toad the properties at startup by invoking that credentials service
Answer: D
NEW QUESTION 22
Mule application A receives a request Anypoint MQ message REQU with a payload containing a variable-length list of request objects. Application A uses the For Each scope to split the list into individual objects and sends each object as a message to an Anypoint MQ queue.
Service S listens on that queue, processes each message independently of all other messages, and sends a response message to a response queue.
Application A listens on that response queue and must in turn create and publish a response Anypoint MQ message RESP with a payload containing the list of responses sent by service S in the same order as the request objects originally sent in REQU.
Assume successful response messages are returned by service S for all request messages.
What is required so that application A can ensure that the length and order of the list of objects in RESP and REQU match, while at the same time maximizing message throughput?
- A. Perform all communication involving service S synchronously from within the For Each scope, so objects in RESP are in the exact same order as request objects in REQU
- B. Use a Scatter-Gather within the For Each scope to ensure response message orderConfigure the Scatter-Gather with a persistent object store
- C. Keep track of the list length and all object indices in REQU, both in the For Each scope and in all communication involving servic
- D. Use persistent storage when creating RESP
- E. Use an Async scope within the For Each scope and collect response messages in a second For Each scope in the order in which they arrive, then send RESP using this list of responses
Answer: B
NEW QUESTION 23
What Anypoint Connectors support transactions?
- A. Database, JMS, VM
- B. Database, 3MS, HTTP
- C. Database, JMS, VM, SFTP
- D. Database, VM, File
Answer: A
NEW QUESTION 24
An integration Mule application consumes and processes a list of rows from a CSV file. Each row must be read from the CSV file, validated, and the row data sent to a JMS queue, in the exact order as in the CSV file.
If any processing step for a row fails, then a log entry must be written for that row, but processing of other rows must not be affected.
What combination of Mule components is most idiomatic (used according to their intended purpose) when implementing the above requirements?
- A. Scatter-Gather componentOn Error Continue scope
- B. VM connectorFirst Successful scopeOn Error Propagate scope
- C. Async scopeOn Error Propagate scope
- D. For Each scopeOn Error Continue scope
Answer: D
NEW QUESTION 25
......
Recommend!! Get the Full MCIA-Level-1 dumps in VCE and PDF From prep-labs.com, Welcome to Download: https://www.prep-labs.com/dumps/MCIA-Level-1/ (New 58 Q&As Version)