New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Salesforce MuleSoft MuleSoft-Integration-Architect-I Updated Exam

Salesforce Certified MuleSoft Platform Integration Architect (Mule-Arch-202) Questions and Answers

Question 29

Refer to the exhibit.

An organization uses a 2-node Mute runtime cluster to host one stateless API implementation. The API is accessed over HTTPS through a load balancer that uses round-robin for load distribution.

Two additional nodes have been added to the cluster and the load balancer has been configured to recognize the new nodes with no other change to the load balancer.

What average performance change is guaranteed to happen, assuming all cluster nodes are fully operational?

Options:

A.

50% reduction in the response time of the API

B.

100% increase in the throughput of the API

C.

50% reduction In the JVM heap memory consumed by each node

D.

50% reduction In the number of requests being received by each node

Question 30

A retail company is implementing a MuleSoft API to get inventory details from two vendors by Invoking each vendor's online applications. Due to network issues, the invocations to the vendor applications are timing out intermittently, but the requests are successful after re-invoking each

vendor application.

What is the most performant way of implementing the API to invoke each vendor application and to retry invocations that generate timeout errors?

Options:

A.

Use a For-Each scope to invoke the two vendor applications in series, one after the other.Place the For-Each scope inside an Until-Successful scope to retry requests that raise timeout errors.

B.

Use a Choice scope to Invoke each vendor application on a separate route.Place the Choice scope inside an Until-Successful scope to retry requests that raisetimeout errors.

C.

Use a Scatter-Gather scope to invoke each vendor application on a separate route.Use an Until-Successful scope in each route to retry requests that raise timeout errors.

D.

Use a Round-Robin scope to invoke each vendor application on a separate route.Use a Try-Catch scope in each route to retry requests that raise timeout errors.

Question 31

Refer to the exhibit.

A Mule application is deployed to a cluster of two customer-hosted Mute runtimes. The Mute application has a flow that polls a database and another flow with an HTTP Listener.

HTTP clients send HTTP requests directly to individual cluster nodes.

What happens to database polling and HTTP request handling in the time after the primary (master) node of the cluster has railed, but before that node is restarted?

Options:

A.

Database polling continues Only HTTP requests sent to the remaining node continue to be accepted

B.

Database polling stops All HTTP requests continue to be accepted

C.

Database polling continues All HTTP requests continue to be accepted, but requests to the failed node Incur increased latency

D.

Database polling stops All HTTP requests are rejected

Question 32

An organization has several APIs that accept JSON data over HTTP POST. The APIs are all publicly available and are associated with several mobile applications and web applications. The organization does NOT want to use any authentication or compliance policies for these APIs, but at the same time, is worried that some bad actor could send payloads that could somehow compromise the applications or servers running the API implementations. What out-of-the-box Anypoint Platform policy can address exposure to this threat?

Options:

A.

Apply a Header injection and removal policy that detects the malicious data before it is used

B.

Apply an IP blacklist policy to all APIs; the blacklist will Include all bad actors

C.

Shut out bad actors by using HTTPS mutual authentication for all API invocations

D.

Apply a JSON threat protection policy to all APIs to detect potential threat vectors