Summer Sale Coupon - 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sbfdisc

MCIA-Level-1 PDF

$44

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

MCIA-Level-1 PDF + Testing Engine

$70.4

$175.99

3 Months Free Update

  • Exam Name: MuleSoft Certified Integration Architect - Level 1
  • Last Update: Apr 17, 2024
  • Questions and Answers: 244
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

MCIA-Level-1 Engine

$52.8

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

MCIA-Level-1 Practice Exam Questions with Answers MuleSoft Certified Integration Architect - Level 1 Certification

Question # 6

Refer to the exhibit.

MCIA-Level-1 question answer

A Mule 4 application has a parent flow that breaks up a JSON array payload into 200 separate items, then sends each item one at a time inside an Async scope to a VM queue.

A second flow to process orders has a VM Listener on the same VM queue. The rest of this flow processes each received item by writing the item to a database.

This Mule application is deployed to four CloudHub workers with persistent queues enabled.

What message processing guarantees are provided by the VM queue and the CloudHub workers, and how are VM messages routed among the CloudHub workers for each invocation of the parent flow under normal operating conditions where all the CloudHub workers remain online?

A.

EACH item VM message is processed AT MOST ONCE by ONE CloudHub worker, with workers chosen in a deterministic round-robin fashion Each of the four CloudHub workers can be expected to process 1/4 of the Item VM messages (about 50 items)

B.

EACH item VM message is processed AT LEAST ONCE by ONE ARBITRARY CloudHub worker Each of the four CloudHub workers can be expected to process some item VM messages

C.

ALL Item VM messages are processed AT LEAST ONCE by the SAME CloudHub worker where the parent flow was invoked

This one CloudHub worker processes ALL 200 item VM messages

D.

ALL item VM messages are processed AT MOST ONCE by ONE ARBITRARY CloudHub worker

This one CloudHub worker processes ALL 200 item VM messages

Full Access
Question # 7

What is true about automating interactions with Anypoint Platform using tools such as Anypoint Platform REST API's, Anypoint CLI or the Mule Maven plugin?

A.

By default, the Anypoint CLI and Mule Maven plugin are not included in the Mule runtime

B.

Access to Anypoint Platform API;s and Anypoint CLI can be controlled separately thruough the roles and permissions in Anypoint platform, so that specific users can get access to Anypoint CLI while others get access to the platform API's

C.

Anypoint Platform API's can only automate interactions with CloudHub while the Mule maven plugin is required for deployment to customer hosted Mule runtimes

D.

API policies can be applied to the Anypoint platform API's so that only certain LOS's has access to specific functions

Full Access
Question # 8

A mule application is deployed to a Single Cloudhub worker and the public URL appears in Runtime Manager as the APP URL.

Requests are sent by external web clients over the public internet to the mule application App url. Each of these requests routed to the HTTPS Listener event source of the running Mule application.

Later, the DevOps team edits some properties of this running Mule application in Runtime Manager.

Immediately after the new property values are applied in runtime manager, how is the current Mule application deployment affected and how will future web client requests to the Mule application be handled?

A.

Cloudhub will redeploy the Mule application to the OLD Cloudhub worker

New web client requests will RETURN AN ERROR until the Mule application is redeployed to the OLD Cloudhub worker

B.

CloudHub will redeploy the Mule application to a NEW Cloudhub worker

New web client requests will RETURN AN ERROR until the NEW Cloudhub worker is available

C.

Cloudhub will redeploy the Mule application to a NEW Cloudhub worker

New web client requests are ROUTED to the OLD Cloudhub worker until the NEW Cloudhub worker is available.

D.

Cloudhub will redeploy the mule application to the OLD Cloudhub worker

New web client requests are ROUTED to the OLD Cloudhub worker BOTH before and after the Mule application is redeployed.

Full Access
Question # 9

A REST API is being designed to implement a Mule application.

What standard interface definition language can be used to define REST APIs?

A.

Web Service Definition Language(WSDL)

B.

OpenAPI Specification (OAS)

C.

YAML

D.

AsyncAPI Specification

Full Access
Question # 10

A Mule application is synchronizing customer data between two different database systems.

What is the main benefit of using eXtended Architecture (XA) transactions over local transactions to synchronize these two different database systems?

A.

An XA transaction synchronizes the database systems with the least amount of Mule configuration or coding

B.

An XA transaction handles the largest number of requests in the shortest time

C.

An XA transaction automatically rolls back operations against both database systems if any operation falls

D.

An XA transaction writes to both database systems as fast as possible

Full Access
Question # 11

An organization has several APIs that accept JSON data over HTTP POST. The APIs are all publicly available and are associated with several mobile applications and web applications. The organization does NOT want to use any authentication or compliance policies for these APIs, but at the same time, is worried that some bad actor could send payloads that could somehow compromise the applications or servers running the API implementations. What out-of-the-box Anypoint Platform policy can address exposure to this threat?

A.

Apply a Header injection and removal policy that detects the malicious data before it is used

B.

Apply an IP blacklist policy to all APIs; the blacklist will Include all bad actors

C.

Shut out bad actors by using HTTPS mutual authentication for all API invocations

D.

Apply a JSON threat protection policy to all APIs to detect potential threat vectors

Full Access
Question # 12

A Mule application is running on a customer-hosted Mule runtime in an organization's network. The Mule application acts as a producer of asynchronous Mule events. Each Mule event must be broadcast to all interested external consumers outside the Mule application. The Mule events should be published in a way that is guaranteed in normal situations and also minimizes duplicate delivery in less frequent failure scenarios.

The organizational firewall is configured to only allow outbound traffic on ports 80 and 443. Some external event consumers are within the organizational network, while others are located outside the firewall.

What Anypoint Platform service is most idiomatic (used for its intended purpose) for publishing these Mule events to all external consumers while addressing the desired reliability goals?

A.

CloudHub VM queues

B.

Anypoint MQ

C.

Anypoint Exchange

D.

CloudHub Shared Load Balancer

Full Access
Question # 13

A leading bank implementing new mule API.

The purpose of API to fetch the customer account balances from the backend application and display them on the online platform the online banking platform. The online banking platform will send an array of accounts to Mule API get the account balances.

As a part of the processing the Mule API needs to insert the data into the database for auditing purposes and this process should not have any performance related implications on the account balance retrieval flow

How should this requirement be implemented to achieve better throughput?

A.

Implement the Async scope fetch the data from the backend application and to insert records in the Audit database

B.

Implement a for each scope to fetch the data from the back-end application and to insert records into the Audit database

C.

Implement a try-catch scope to fetch the data from the back-end application and use the Async scope to insert records into the Audit database

D.

Implement parallel for each scope to fetch the data from the backend application and use Async scope to insert the records into the Audit database

Full Access
Question # 14

A project team is working on an API implementation using the RAML definition as a starting point. The team has updated the definition to include new operations and has published a new version to exchange. Meanwhile another team is working on a mule application consuming the same API implementation.

During the development what has to be performed by the mule application team to take advantage of the newly added operations?

A.

Scaffold the client application with the new definition

B.

Scaffold API implementation application with the new definition

C.

Update the REST connector from exchange in the client application

D.

Update the API connector in the API implementation and publish to exchange

Full Access
Question # 15

What operation can be performed through a JMX agent enabled in a Mule application?

A.

View object store entries

B.

Replay an unsuccessful message

C.

Set a particular tog4J2 log level to TRACE

D.

Deploy a Mule application

Full Access
Question # 16

A Mule application currently writes to two separate SQL Server database instances across the internet using a single XA transaction. It is 58. proposed to split this one transaction into two separate non-XA transactions with no other changes to the Mule application.

What non-functional requirement can be expected to be negatively affected when implementing this change?

A.

Throughput

B.

Consistency

C.

Response time

D.

Availability

Full Access
Question # 17

An organization is designing an integration Mule application to process orders by submitting them to a back-end system for offline processing. Each order will be received by the Mule application through an HTTPS POST and must be acknowledged immediately. Once acknowledged, the order will be submitted to a back-end system. Orders that cannot be successfully submitted due to rejections from the back-end system will need to be processed manually (outside the back-end system).

The Mule application will be deployed to a customer-hosted runtime and is able to use an existing ActiveMQ broker if needed. The ActiveMQ broker is located inside the organization’s firewall. The back-end system has a track record of unreliability due to both minor network connectivity issues and longer outages.

What idiomatic (used for their intended purposes) combination of Mule application components and ActiveMQ queues are required to ensure automatic submission of orders to the back-end system while supporting but minimizing manual order processing?

A.

An Until Successful scope to call the back-end system

One or more ActiveMQ long-retry queues

One or more ActiveMQ dead-letter queues for manual processing

B.

One or more On Error scopes to assist calling the back-end system

An Until Successful scope containing VM components for long retries

A persistent dead-letter VM queue configured in CloudHub

C.

One or more On Error scopes to assist calling the back-end system

One or more ActiveMQ long-retry queues

A persistent dead-letter object store configured in the CloudHub Object Store service

D.

A Batch Job scope to call the back-end system

An Until Successful scope containing Object Store components for long retries

A dead-letter object store configured in the Mule application

Full Access
Question # 18

A developer needs to discover which API specifications have been created within the organization before starting a new project.

Which Anypoint Platform component can the developer use to find and try out the currently released API specifications?

A.

Anypoint Exchange

B.

Runtime Manager

C.

API Manager

D.

Object Store

Full Access
Question # 19

A company is planning to migrate its deployment environment from on-premises cluster to a Runtime Fabric (RTF) cluster. It also has a requirement to enable Mule applications deployed to a Mule runtime instance to store and share data across application replicas and restarts.

How can these requirements be met?

A.

Anypoint object store V2 to share data between replicas in the RTF cluster

B.

Install the object store pod on one of the cluster nodes

C.

Configure Persistence Gateway in any of the servers using Mule Object Store

D.

Configure Persistent Gateway at the RTF

Full Access
Question # 20

An organization has strict unit test requirement that mandate every mule application must have an MUnit test suit with a test case defined for each flow and a minimum test coverage of 80%.

A developer is building Munit test suit for a newly developed mule application that sends API request to an external rest API.

What is the effective approach for successfully executing the Munit tests of this new application while still achieving the required test coverage for the Munit tests?

A.

Invoke the external endpoint of the rest API from the mule floors

B.

Mark the rest API invocations in the Munits and then call the mocking service flow that simulates standard responses from the REST API

C.

Mock the rest API invocation in the Munits and return a mock response for those invocations

D.

Create a mocking service flow to simulate standard responses from the rest API and then configure the mule flows to call the marking service flow

Full Access
Question # 21

What requires configuration of both a key store and a trust store for an HTTP Listener?

A.

Support for TLS mutual (two-way) authentication with HTTP clients

B.

Encryption of requests to both subdomains and API resource endpoints fhttPs://aDi.customer.com/ and https://customer.com/api)

C.

Encryption of both HTTP request and HTTP response bodies for all HTTP clients

D.

Encryption of both HTTP request header and HTTP request body for all HTTP clients

Full Access
Question # 22

Which Mulesoft feature helps users to delegate their access without sharing sensitive credentials or giving full control of accounts to 3rd parties?

A.

Secure Scheme

B.

client id enforcement policy

C.

Connected apps

D.

Certificates

Full Access
Question # 23

An Organization has previously provisioned its own AWS VPC hosting various servers. The organization now needs to use Cloudhub to host a Mule application that will implement a REST API once deployed to Cloudhub, this Mule application must be able to communicate securely with the customer-provisioned AWS VPC resources within the same region, without being interceptable on the public internet.

What Anypoint Platform features should be used to meet these network communication requirements between Cloudhub and the existing customer-provisioned AWS VPC?

A.

Add a Mulesoft hosted Anypoint VPC configured and with VPC Peering to the AWS VPC

B.

Configure an external identity provider (IDP) in Anypoint Platform with certificates from the customer provisioned AWS VPC

C.

Add a default API Whitelisting policy to API Manager to automatically whitelist the customer provisioned AWS VPC IP ranges needed by the Mule applicaton

D.

Use VM queues in the Mule application to allow any non-mule assets within the customer provisioned AWS VPC to subscribed to and receive messages

Full Access
Question # 24

An API has been unit tested and is ready for integration testing. The API is governed by a Client ID Enforcement policy in all environments.

What must the testing team do before they can start integration testing the API in the Staging environment?

A.

They must access the API portal and create an API notebook using the Client ID and Client Secret supplied by the API portal in the Staging environment

B.

They must request access to the API instance in the Staging environment and obtain a Client ID and Client Secret to be used for testing the API

C.

They must be assigned as an API version owner of the API in the Staging environment

D.

They must request access to the Staging environment and obtain the Client ID and Client Secret for that environment to be used for testing the API

Full Access
Question # 25

An organization is designing the following two Mule applications that must share data via a common persistent object store instance:

- Mule application P will be deployed within their on-premises datacenter.

- Mule application C will run on CloudHub in an Anypoint VPC.

The object store implementation used by CloudHub is the Anypoint Object Store v2 (OSv2).

what type of object store(s) should be used, and what design gives both Mule applications access to the same object store instance?

A.

Application P uses the Object Store connector to access a persistent object store Application C accesses this persistent object store via the Object Store REST API through an IPsec tunnel

B.

Application C and P both use the Object Store connector to access the Anypoint Object Store v2

C.

Application C uses the Object Store connector to access a persistent object Application P accesses the persistent object store via the Object Store REST API

D.

Application C and P both use the Object Store connector to access a persistent object store

Full Access
Question # 26

In one of the critical payment related mule application, transaction is being used . As an enhancement to implementation , scatter gather route is introduced which is also the part of transaction group. Scatter gather route has 4 routes.

What will be the behavior of the Mule application in case of error occurs in 4th route of the scatter-gather router and transaction needs to be rolled back?

A.

Only errored route will be rolled back

B.

All routes will be rolled back

C.

Scatter Gather router cannot be part of transaction

Full Access
Question # 27

An integration Mule application is deployed to a customer-hosted multi-node Mule 4 runtime duster. The Mule application uses a Listener operation of a JMS connector to receive incoming messages from a JMS queue.

How are the messages consumed by the Mule application?

A.

Depending on the JMS provider's configuration, either all messages are consumed by ONLY the primary cluster node or else ALL messages are consumed by ALL cluster nodes

B.

Regardless of the Listener operation configuration, all messages are consumed by ALL cluster nodes

C.

Depending on the Listener operation configuration, either all messages are consumed by ONLY the primary cluster node or else EACH message is consumed by ANY ONE cluster node

D.

Regardless of the Listener operation configuration, all messages are consumed by ONLY the primary cluster node

Full Access
Question # 28

An organization is evaluating using the CloudHub shared Load Balancer (SLB) vs creating a CloudHub dedicated load balancer (DLB). They are evaluating how this choice affects the various types of certificates used by CloudHub deplpoyed Mule applications, including MuleSoft-provided, customer-provided, or Mule application-provided certificates.

What type of restrictions exist on the types of certificates that can be exposed by the CloudHub Shared Load Balancer (SLB) to external web clients over the public internet?

A.

Only MuleSoft-provided certificates are exposed.

B.

Only customer-provided wildcard certificates are exposed.

C.

Only customer-provided self-signed certificates are exposed.

D.

Only underlying Mule application certificates are exposed (pass-through)

Full Access
Question # 29

An organization is designing an integration solution to replicate financial transaction data from a legacy system into a data warehouse (DWH).

The DWH must contain a daily snapshot of financial transactions, to be delivered as a CSV file. Daily transaction volume exceeds tens of millions of records, with significant spikes in volume during popular shopping periods.

What is the most appropriate integration style for an integration solution that meets the organization's current requirements?

A.

Event-driven architecture

B.

Microservice architecture

C.

API-led connectivity

D.

Batch-triggered ETL

Full Access
Question # 30

A platform architect includes both an API gateway and a service mesh in the architect of a distributed application for communication management.

Which type of communication management does a service mesh typically perform in this architecture?

A.

Between application services and the firewall

B.

Between the application and external API clients

C.

Between services within the application

D.

Between the application and external API implementations.

Full Access
Question # 31

As part of a growth strategy, a supplier signs a trading agreement with a large customer. The customer sends purchase orders to the supplier according to the ANSI X12 EDI standard, and the supplier creates the orders in its ERP system using the information in the EDI document.

The agreement also requires that the supplier provide a new RESTful API to process request from the customer for current product inventory level from the supplier’ s ERP system.

Which two fundamental integration use cases does the supplier need to deliver to provide an end-to-end solution for this business scenario? (Choose two.)

A.

Synchronized data transfer

B.

Sharing data with external partners

C.

User interface integration

D.

Streaming data ingestion

E.

Data mashups

Full Access
Question # 32

In which order are the API Client, API Implementation, and API interface components called in a typical REST request?

A.

API Client > API implementation > API Interface

B.

API interface > API Client > API Implementation

C.

API Client > API Interface > API implementation

D.

API Implementation > API Interface > API Client

Full Access
Question # 33

Cloud Hub is an example of which cloud computing service model?

A.

Platform as a Service (PaaS)

B.

Software as a Service (SaaS)

C.

Monitoring as a Service (MaaS)

D.

Infrastructure as a Service (laaS)

Full Access
Question # 34

According to MuleSoft, a synchronous invocation of a RESTful API using HTTP to get an individual customer record from a single system is an example of which system integration interaction pattern?

A.

Request-Reply

B.

Multicast

C.

Batch

D.

One-way

Full Access
Question # 35

What is required before an API implemented using the components of Anypoint Platform can be managed and governed (by applying API policies) on Anypoint Platform?

A.

The API must be published to Anypoint Exchange and a corresponding API instance ID must be obtained from API Manager to be used in the API implementation

B.

The API implementation source code must be committed to a source control management system (such as GitHub)

C.

A RAML definition of the API must be created in API designer so it can then be published to Anypoint Exchange

D.

The API must be shared with the potential developers through an API portal so API consumers can interact with the API

Full Access
Question # 36

As a part of project requirement, Java Invoke static connector in a mule 4 application needs to invoke a static method in a dependency jar file. What are two ways to add the dependency to be visible by the connectors class loader?

(Choose two answers)

A.

In the Java Invoke static connector configuration, configure a path and name of the dependency jar file

B.

Add the dependency jar file to the java classpath by setting the JVM parameters

C.

Use Maven command to include the dependency jar file when packaging the application

D.

Configure the dependency as a shared library in the project POM

E.

Update mule-artefact.json to export the Java package

Full Access