New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Salesforce MuleSoft-Integration-Architect-I Based on Real Exam Environment

Salesforce Certified MuleSoft Platform Integration Architect (Mule-Arch-202) Questions and Answers

Question 33

A leading eCommerce giant will use MuleSoft APIs on Runtime Fabric (RTF) to process customer orders. Some customer-sensitive information, such as credit card information, is required in request payloads or is included in response payloads in some of the APIs. Other API requests and responses are not authorized to access some of this customer-sensitive information but have been implemented to validate and transform based on the structure and format of this customer-sensitive information (such as account IDs, phone numbers, and postal codes).

What approach configures an API gateway to hide sensitive data exchanged between API consumers and API implementations, but can convert tokenized fields back to their original value for other API requests or responses, without having to recode the API implementations?

Later, the project team requires all API specifications to be augmented with an additional non-functional requirement (NFR) to protect the backend services from a high rate of requests, according to defined service-level

agreements (SLAs). The NFR's SLAs are based on a new tiered subscription level "Gold", "Silver", or "Platinum" that must be tied to a new parameter that is being added to the Accounts object in their enterprise data model.

Following MuleSoft's recommended best practices, how should the project team now convey the necessary non-functional requirement to stakeholders?

Options:

A.

Create and deploy API proxies in API Manager for the NFR, change the baseurl in eachAPI specification to the corresponding API proxy implementation endpoint, and publish each modified API specification to Exchange

B.

Update each API specification with comments about the NFR's SLAs and publish each modified API specification to Exchange

C.

Update each API specification with a shared RAML fragment required to implement the NFR and publish the RAML fragment and each modified API specification to Exchange

D.

Create a shared RAML fragment required to implement the NFR, list each API implementation endpoint in the RAML fragment, and publish the RAML fragment to Exchange

Question 34

An organization currently uses a multi-node Mule runtime deployment model within their datacenter, so each Mule runtime hosts several Mule applications. The organization is planning to transition to a deployment model based on Docker containers in a Kubernetes cluster. The organization has already created a standard Docker image containing a Mule runtime and all required dependencies (including a JVM), but excluding the Mule application itself.

What is an expected outcome of this transition to container-based Mule application deployments?

Options:

A.

Required redesign of Mule applications to follow microservice architecture principles

B.

Required migration to the Docker and Kubernetes-based Anypoint Platform - Private Cloud Edition

C.

Required change to the URL endpoints used by clients to send requests to the Mule applications

D.

Guaranteed consistency of execution environments across all deployments of a Mule application

Question 35

According to MuleSoft, a synchronous invocation of a RESTful API using HTTP to get an individual customer record from a single system is an example of which system integration interaction pattern?

Options:

A.

Request-Reply

B.

Multicast

C.

Batch

D.

One-way

Question 36

An organization is evaluating using the CloudHub shared Load Balancer (SLB) vs creating a CloudHub dedicated load balancer (DLB). They are evaluating how this choice affects the various types of certificates used by CloudHub deplpoyed Mule applications, including MuleSoft-provided, customer-provided, or Mule application-provided certificates.

What type of restrictions exist on the types of certificates that can be exposed by the CloudHub Shared Load Balancer (SLB) to external web clients over the public internet?

Options:

A.

Only MuleSoft-provided certificates are exposed.

B.

Only customer-provided wildcard certificates are exposed.

C.

Only customer-provided self-signed certificates are exposed.

D.

Only underlying Mule application certificates are exposed (pass-through)