Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

MuleSoft-Platform-Architect-I PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

MuleSoft-Platform-Architect-I PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Salesforce Certified MuleSoft Platform Architect (Mule-Arch-201)
  • Last Update: Oct 14, 2025
  • Questions and Answers: 152
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

MuleSoft-Platform-Architect-I Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

MuleSoft-Platform-Architect-I Practice Exam Questions with Answers Salesforce Certified MuleSoft Platform Architect (Mule-Arch-201) Certification

Question # 6

An organization has implemented a Customer Address API to retrieve customer address information. This API has been deployed to multiple environments and has been configured to enforce client IDs everywhere.

A developer is writing a client application to allow a user to update their address. The developer has found the Customer Address API in Anypoint Exchange and wants to use it in their client application.

What step of gaining access to the API can be performed automatically by Anypoint Platform?

A.

Approve the client application request for the chosen SLA tier

B.

Request access to the appropriate API Instances deployed to multiple environments using the client application's credentials

C.

Modify the client application to call the API using the client application's credentials

D.

Create a new application in Anypoint Exchange for requesting access to the API

Full Access
Question # 7

A European company has customers all across Europe, and the IT department is migrating from an older platform to MuleSoft. The main requirements are that the

new platform should allow redeployments with zero downtime and deployment of applications to multiple runtime versions, provide security and speed, and utilize Anypoint MQ

as the message service.

Which runtime plane should the company select based on the requirements without additional network configuration?

A.

Runtime Fabric on VMs / Bare Metal for the runtime plane

B.

Customer-hosted runtime plane

C.

MuleSoft-hosted runtime plane (CloudHub)

D.

Anypoint Runtime Fabric on Self-Managed Kubernetes for the runtime plane

Full Access
Question # 8

An operations team is analyzing the effort needed to set up monitoring of their application network. They are looking at which API invocation metrics can be used to identify and predict trouble without having to write custom scripts or install additional analytics software or tools.

Which type of metrics can satisfy this goal of directly identifying and predicting failures?

A.

The number and types of API policy violations per day

B.

The effectiveness of the application network based on the level of reuse

C.

The number and types of past API invocations across the application network

D.

The ROI from each APT invocation

Full Access
Question # 9

A retail company is using an Order API to accept new orders. The Order API uses a JMS queue to submit orders to a backend order management service. The normal load for orders is being handled using two (2) CloudHub workers, each configured with 0.2 vCore. The CPU load of each CloudHub worker normally runs well below 70%. However, several times during the year the Order API gets four times (4x) the average number of orders. This causes the CloudHub worker CPU load to exceed 90% and the order submission time to exceed 30 seconds. The cause, however, is NOT the backend order management service, which still responds fast enough to meet the response SLA for the Order API. What is the MOST resource-efficient way to configure the Mule application's CloudHub deployment to help the company cope with this performance challenge?

A.

Permanently increase the size of each of the two (2) CloudHub workers by at least four times (4x) to one (1) vCore

B.

Use a vertical CloudHub autoscaling policy that triggers on CPU utilization greater than 70%

C.

Permanently increase the number of CloudHub workers by four times (4x) to eight (8) CloudHub workers

D.

Use a horizontal CloudHub autoscaling policy that triggers on CPU utilization greater than 70%

Full Access
Question # 10

A retail company with thousands of stores has an API to receive data about purchases and insert it into a single database. Each individual store sends a batch of purchase data to the API about every 30 minutes. The API implementation uses a database bulk insert command to submit all the purchase data to a database using a custom JDBC driver provided by a data analytics solution provider. The API implementation is deployed to a single CloudHub worker. The JDBC driver processes the data into a set of several temporary disk files on the CloudHub worker, and then the data is sent to an analytics engine using a proprietary protocol. This process usually takes less than a few minutes. Sometimes a request fails. In this case, the logs show a message from the JDBC driver indicating an out-of-file-space message. When the request is resubmitted, it is successful. What is the best way to try to resolve this throughput issue?

A.

se a CloudHub autoscaling policy to add CloudHub workers

B.

Use a CloudHub autoscaling policy to increase the size of the CloudHub worker

C.

Increase the size of the CloudHub worker(s)

D.

Increase the number of CloudHub workers

Full Access
Question # 11

A System API is designed to retrieve data from a backend system that has scalability challenges. What API policy can best safeguard the backend system?

A.

IPwhitelist

B.

SLA-based rate limiting

C.

Auth 2 token enforcement

D.

Client ID enforcement

Full Access
Question # 12

When designing an upstream API and its implementation, the development team has been advised to NOT set timeouts when invoking a downstream API, because that downstream API has no SLA that can be relied upon. This is the only downstream API dependency of that upstream API.

Assume the downstream API runs uninterrupted without crashing. What is the impact of this advice?

A.

An SLA for the upstream API CANNOT be provided

B.

The invocation of the downstream API will run to completion without timing out

C.

A default timeout of 500 ms will automatically be applied by the Mule runtime in which the upstream API implementation executes

D.

A toad-dependent timeout of less than 1000 ms will be applied by the Mule runtime in which the downstream API implementation executes

Full Access
Question # 13

What API policy would be LEAST LIKELY used when designing an Experience API that is intended to work with a consumer mobile phone or tablet application?

A.

OAuth 2.0 access token enforcement

B.

Client ID enforcement

C.

JSON threat protection

D.

IPwhitellst

Full Access
Question # 14

A team is planning to enhance an Experience API specification, and they are following API-led connectivity design principles.

What is their motivation for enhancing the API?

A.

The primary API consumer wants certain kinds of endpoints changed from the Center for Enablement standard to the consumer system standard

B.

The underlying System API is updated to provide more detailed data for several heavily used resources

C.

An IP Allowlist policy is being added to the API instances in the Development and Staging environments

D.

A Canonical Data Model is being adopted that impacts several types of data included in the API

Full Access
Question # 15

An application updates an inventory running only one process at any given time to keep the inventory consistent. This process takes 200 milliseconds (.2 seconds) to

execute; therefore, the scalability threshold of the application is five requests per second.

What is the impact on the application if horizontal scaling is applied, thereby increasing the number of Mule workers?

A.

The application scalability threshold is five requests per second regardless of the horizontal scaling

B.

The total process execution time is now 100 milliseconds (.1 seconds)

C.

The application scalability threshold is now 10 requests per second

D.

Horizontal scaling cannot be applied to an already-running application

Full Access
Question # 16

An organization makes a strategic decision to move towards an IT operating model that emphasizes consumption of reusable IT assets using modern APIs (as defined by MuleSoft).

What best describes each modern API in relation to this new IT operating model?

A.

Each modern API has its own software development lifecycle, which reduces the need for documentation and automation

B.

Each modem API must be treated like a product and designed for a particular target audience (for instance, mobile app developers)

C.

Each modern API must be easy to consume, so should avoid complex authentication mechanisms such as SAML or JWT D

D.

Each modern API must be REST and HTTP based

Full Access
Question # 17

What best describes the Fully Qualified Domain Names (FQDNs), also known as DNS entries, created when a Mule application is deployed to the CloudHub Shared Worker Cloud?

A.

A fixed number of FQDNs are created, IRRESPECTIVE of the environment and VPC design

B.

The FQDNs are determined by the application name chosen, IRRESPECTIVE of the region

C.

The FQDNs are determined by the application name, but can be modified by an administrator after deployment

D.

The FQDNs are determined by both the application name and the Anypoint Platform organization

Full Access
Question # 18

Refer to the exhibit.

MuleSoft-Platform-Architect-I question answer

A developer is building a client application to invoke an API deployed to the STAGING environment that is governed by a client ID enforcement policy.

What is required to successfully invoke the API?

A.

The client ID and secret for the Anypoint Platform account owning the API in the STAGING environment

B.

The client ID and secret for the Anypoint Platform account's STAGING environment

C.

The client ID and secret obtained from Anypoint Exchange for the API instance in the STAGING environment

D.

A valid OAuth token obtained from Anypoint Platform and its associated client ID and secret

Full Access
Question # 19

When should idempotency be taken into account?

A.

When making requests to update currently locked entities

B.

When storing the results of s previous request for use in response to subsequent requests

C.

When sending concurrent update requests for the same entity

D.

When preventing duplicate processing from multiple sent requests

Full Access
Question # 20

Which three tools automate the deployment of Mule applications?

Choose 3 answers

A.

Runtime Manager

B.

Anypoint Platform CLI

C.

Platform APIs

D.

Anypoint Studio

E.

Mule Mayen plugin

F.

API Community Manager

Full Access
Question # 21

Which APIs can be used with DataGraph to create a unified schema?

MuleSoft-Platform-Architect-I question answer

A.

APIs 1, 3, 5

B.

APIs 2, 4 ,6

C.

APIs 1, 2, s5, 6

D.

APIs 1, 2, 3, 4

Full Access
Question # 22

An API implementation is being designed that must invoke an Order API, which is known to repeatedly experience downtime.

For this reason, a fallback API is to be called when the Order API is unavailable.

What approach to designing the invocation of the fallback API provides the best resilience?

A.

Search Anypoint Exchange for a suitable existing fallback API, and then implement invocations to this fallback API in addition to the Order API

B.

Create a separate entry for the Order API in API Manager, and then invoke this API as a fallback API if the primary Order API is unavailable

C.

Redirect client requests through an HTTP 307 Temporary Redirect status code to the fallback API whenever the Order API is unavailable

D.

Set an option in the HTTP Requester component that invokes the Order API to instead invoke a fallback API whenever an HTTP 4xx or 5xx response status code is returned from the Order API

Full Access
Question # 23

How are an API implementation, API client, and API consumer combined to invoke and process an API?

A.

The API consumer creates an API implementation, which receives API invocations from an API such that they are processed for an API client

B.

The API client creates an API consumer, which receives API invocations from an API such that they are processed for an API implementation

C.

The ApI consumer creates an API client, which sends API invocations to an API such that they are processed by an API implementation

D.

The ApI client creates an API consumer, which sends API invocations to an API such that they are processed by an API implementation

Full Access
Question # 24

An Anypoint Platform organization has been configured with an external identity provider (IdP) for identity management and client management. What credentials or token must be provided to Anypoint CLI to execute commands against the Anypoint Platform APIs?

A.

The credentials provided by the IdP for identity management

B.

The credentials provided by the IdP for client management

C.

An OAuth 2.0 token generated using the credentials provided by the IdP for client management

D.

An OAuth 2.0 token generated using the credentials provided by the IdP for identity management

Full Access
Question # 25

Refer to the exhibit. An organization is running a Mule standalone runtime and has configured Active Directory as the Anypoint Platform external Identity Provider. The organization does not have budget for other system components.

What policy should be applied to all instances of APIs in the organization to most effecuvelyKestrict access to a specific group of internal users?

A.

Apply a basic authentication - LDAP policy; the internal Active Directory will be configured as the LDAP source for authenticating users

B.

Apply a client ID enforcement policy; the specific group of users will configure their client applications to use their specific client credentials

C.

Apply an IP whitelist policy; only the specific users' workstations will be in the whitelist

D.

Apply an OAuth 2.0 access token enforcement policy; the internal Active Directory will be configured as the OAuth server

Full Access
Question # 26

A company wants to move its Mule API implementations into production as quickly as possible. To protect access to all Mule application data and metadata, the company requires that all Mule applications be deployed to the company's customer-hosted infrastructure within the corporate firewall. What combination of runtime plane and control plane options meets these project lifecycle goals?

A.

Manually provisioned customer-hosted runtime plane and customer-hosted control plane

B.

MuleSoft-hosted runtime plane and customer-hosted control plane

C.

Manually provisioned customer-hosted runtime plane and MuleSoft-hosted control plane

D.

iPaaS provisioned customer-hosted runtime plane and MuleSoft-hosted control plane

Full Access
Question # 27

A developer from the Central IT team has created an initial version of the RAML definition in Design Center for an OAuth 2.0-protected System API and published it

to Exchange. Another developer from LoB IT discovered the System API in Exchange and would like to leverage it in the Process API.

What is the MuleSoft-recommended approach for Process API to invoke the System API?

A.

The Process API needs to import an CAuth 2.0 module from Exchange first and update it with OAuth 2.0 credentials before the System API can be invoked

B.

The Process API uses property YAML files to store the System API URLs and uses the HTTP Request Connector to invoke the Systerm API

C.

The Process APL uses the REST Connect Connector autogenerated in Exchange for the System API

D.

The Process API manually updates the Process API POM file to include the System API as a dependency

Full Access
Question # 28

What Mule application can have API policies applied by

Anypoint Platform to the endpoint exposed by that Mule application?

A) A Mule application that accepts requests over HTTP/1.x

MuleSoft-Platform-Architect-I question answer

B) A Mule application that accepts JSON requests over TCP but is NOT required to provide a response

C) A Mute application that accepts JSON requests over WebSocket

D) A Mule application that accepts gRPC requests over HTTP/2

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 29

A manufacturing company has deployed an API implementation to CloudHub and has not configured it to be automatically restarted by CloudHub when the worker is

not responding.

Which statement is true when no API Client invokes that API implementation?

A.

No alert on the API invocations and APT implementation can be raised

B.

Alerts on the APT invocation and API implementation can be raised

C.

No alert on the API invocations is raised but alerts on the API implementation can be raised

D.

Alerts on the API invocations are raised but no alerts on the API implementation can be raised

Full Access
Question # 30

What is true about where an API policy is defined in Anypoint Platform and how it is then applied to API instances?

A.

The API policy Is defined In Runtime Manager as part of the API deployment to a Mule runtime, and then ONLY applied to the specific API Instance

B.

The API policy Is defined In API Manager for a specific API Instance, and then ONLY applied to the specific API instance

C.

The API policy Is defined in API Manager and then automatically applied to ALL API instances

D.

The API policy is defined in API Manager, and then applied to ALL API instances in the specified environment

Full Access
Question # 31

A large company wants to implement IT infrastructure in its own data center, based on the corporate IT policy requirements that data and metadata reside locally.

Which combination of Mule control plane and Mule runtime plane(s) meets the requirements?

A.

Anypoint Platform Private Cloud Edition for the control plane and the MuleSoft-hosted runtime plane

B.

The MuleSoft-hosted control plane and Anypoint Runtime Fabric for the runtime plane

C.

The MuleSoft-hosted control plane and customer-hosted Mule runtimes for the runtime plane

D.

Anypoint Platform Private Cloud Edition for the control plane and customer-hosted Mule runtimes for the runtime plane

Full Access
Question # 32

A company is using an on-prem cluster in the data center as a runtime plane and MuleSoft-hosted control plane.

How can the company monitor the detailed performance metrics on the Mule applications deployed to the cluster from the control plane?

A.

The settings of the Monitoring section in the control plane must be updated to enable detailed logging on the metrics to be captured

B.

Monitoring Agent must be installed on each node in the cluster

C.

Due to the potential performance impact on the runtime nodes, the Monitoring agent should be installed on a separate server

D.

There is no action needed as the on-prem runtime automatically sends the performance data to the control plane

Full Access
Question # 33

What API policy would LEAST likely be applied to a Process API?

A.

Custom circuit breaker

B.

Client ID enforcement

C.

Rate limiting

D.

JSON threat protection

Full Access
Question # 34

Several times a week, an API implementation shows several thousand requests per minute in an Anypoint Monitoring dashboard, Between these bursts, the

dashboard shows between two and five requests per minute. The API implementation is running on Anypoint Runtime Fabric with two non-clustered replicas, reserved vCPU 1.0

and vCPU Limit 2.0.

An API consumer has complained about slow response time, and the dashboard shows the 99 percentile is greater than 120 seconds at the time of the complaint. It also shows

greater than 90% CPU usage during these time periods.

In manual tests in the QA environment, the API consumer has consistently reproduced the slow response time and high CPU usage, and there were no other API requests at

this time. In a brainstorming session, the engineering team has created several proposals to reduce the response time for requests.

Which proposal should be pursued first?

A.

Increase the vCPU resources of the API implementation

B.

Modify the API client to split the problematic request into smaller, less-demanding requests

C.

Increase the number of replicas of the API implementation

D.

Throttle the APT client to reduce the number of requests per minute

Full Access
Question # 35

4 Production environment is running on a dedicated Virtual Private Cloud (VPC) on CloudHub 1,0, and the security team guidelines clearly state no traffic on HTTP.

Which two options support these security guidelines?

Choose 2 answers

A.

Configure the HTTPS protocol in HTTP listener in the Mule application

B.

Create a custom policy to apply to outgoing and incoming HTTP requests to control access to a configured API endpoint

C.

Remove the entry from the VPC firewall rule

MuleSoft-Platform-Architect-I question answer

D.

Configure the IP Blocklist policy to control access to a configured API endpoint from either a single IP address or a range of IP addresses.

E.

Add the entry in the VPC firewall rule.

MuleSoft-Platform-Architect-I question answer

Full Access
Question # 36

What is most likely NOT a characteristic of an integration test for a REST API implementation?

A.

The test needs all source and/or target systems configured and accessible

B.

The test runs immediately after the Mule application has been compiled and packaged

C.

The test is triggered by an external HTTP request

D.

The test prepares a known request payload and validates the response payload

Full Access
Question # 37

A customer has an ELA contract with MuleSoft. An API deployed to CloudHub is consistently experiencing performance issues. Based on the root cause analysis, it is

determined that autoscaling needs to be applied.

How can this be achieved?

A.

Configure a policy so that when the number of HTTP requests reaches a certain threshold the number of workers/replicas increases (horizontal scaling)

B.

Configure two separate policies: When CPU and memory reach certain threshold, increase the worker/replica type (vertical sealing) and the number of workers/replicas (horizontal sealing)

C.

Configure a policy based on CPU usage so that CloudHub auto-adjusts the number of workers/replicas (horizontal scaling)

D.

Configure a policy so that when the response time reaches a certain threshold the worker/replica type increases (vertical scaling)

Full Access
Question # 38

An organization requires several APIs to be secured with OAuth 2.0, and PingFederate has been identified as the identity provider for API client authorization, The

PingFederate Client Provider is configured in access management, and the PingFederate OAuth 2.0 Token Enforcement policy is configured for the API instances required by the

organization. The API instances reside in two business groups (Group A and Group B) within the Master Organization (Master Org).

What should be done to allow API consumers to access the API instances?

A.

The API administrator should configure the correct client discovery URL in both child business groups, and the API consumer should request access to the API in Ping Identity

B.

The API administrator should grant access to the API consumers by creating contracts in the relevant API instances in API Manager

C.

The APL consumer should create a client application and request access to the APT in Anypoint Exchange, and the API administrator should approve the request

D.

The APT consumer should create a client application and request access to the API in Ping Identity, and the organization's Ping Identity workflow will grant access

Full Access
Question # 39

In an organization, the InfoSec team is investigating Anypoint Platform related data traffic.

From where does most of the data available to Anypoint Platform for monitoring and alerting originate?

A.

From the Mule runtime or the API implementation, depending on the deployment model

B.

From various components of Anypoint Platform, such as the Shared Load Balancer, VPC, and Mule runtimes

C.

From the Mule runtime or the API Manager, depending on the type of data

D.

From the Mule runtime irrespective of the deployment model

Full Access
Question # 40

A Mule application implements an API. The Mule application has an HTTP Listener whose connector configuration sets the HTTPS protocol and hard-codes the port

value. The Mule application is deployed to an Anypoint VPC and uses the CloudHub 1.0 Shared Load Balancer (SLB) for all incoming traffic.

Which port number must be assigned to the HTTP Listener's connector configuration so that the Mule application properly receives HTTPS API invocations routed through the

SLB?

A.

8082

B.

8092

C.

80

D.

443

Full Access
Question # 41

The application network is recomposable: it is built for change because it "bends but does not break"

A.

TRUE

B.

FALSE

Full Access
Question # 42

What is a best practice when building System APIs?

A.

Document the API using an easily consumable asset like a RAML definition

B.

Model all API resources and methods to closely mimic the operations of the backend system

C.

Build an Enterprise Data Model (Canonical Data Model) for each backend system and apply it to System APIs

D.

Expose to API clients all technical details of the API implementation's interaction wifch the backend system

Full Access
Question # 43

Say, there is a legacy CRM system called CRM-Z which is offering below functions:

1. Customer creation

2. Amend details of an existing customer

3. Retrieve details of a customer

4. Suspend a customer

A.

Implement a system API named customerManagement which has all the functionalities wrapped in it as various operations/resources

B.

Implement different system APIs named createCustomer, amendCustomer, retrieveCustomer and suspendCustomer as they are modular and has seperation of concerns

C.

Implement different system APIs named createCustomerInCRMZ, amendCustomerInCRMZ, retrieveCustomerFromCRMZ and suspendCustomerInCRMZ as they are modular and has seperation of concerns

Full Access
Question # 44

Which of the following best fits the definition of API-led connectivity?

A.

API-led connectivity is not just an architecture or technology but also a way to organize people and processes for efficient IT delivery in the organization

B.

API-led connectivity is a 3-layered architecture covering Experience, Process and System layers

C.

API-led connectivity is a technology which enabled us to implement Experience, Process and System layer based APIs

Full Access
Question # 45

Which scenario is suited for MUnit tests instead of integration tests?

A.

For read-only interactions to any dependencies (such as other web APIs)

B.

When testing does not require knowledge of implementation details

C.

When no mocking is permissible

D.

For tests that are implemented using SoapUI

Full Access