110 likes | 111 Vues
Free MuleSoft MCIA-Level 1 Questions and Answers have been designed to match the pattern of real exams. It can boost your confidence and make it easier to get through the real exams.
E N D
MCIA-Level 1 Free Questions MCIA-Level 1 Free Questions MuleSoft Certified Integration Architect MuleSoft Certified Integration Architect - Level 1 - Level 1 https://www.passquestion.com/ https://www.passquestion.com/MCIA-Level-1 MCIA-Level-1.html .html
Question 1 Question 1 What operation can be performed through a JMX agent enabled in a Mule application? What operation can be performed through a JMX agent enabled in a Mule application? A. View object store entries A. View object store entries B. Replay an unsuccessful message B. Replay an unsuccessful message C. Set a particular tog4J2 log level to TRACE C. Set a particular tog4J2 log level to TRACE D. Deploy a Mule application D. Deploy a Mule application Answer: C Answer: C
Question 2 Question 2 An organization is evaluating using the CloudHub shared Load Balancer (SLB) vs creating a An organization is evaluating using the CloudHub shared Load Balancer (SLB) vs creating a CloudHub dedicated load balancer (DLB). They are evaluating how this choice affects the various CloudHub dedicated load balancer (DLB). They are evaluating how this choice affects the various types of certificates used by CloudHub deplpoyed Mule applications, including MuleSoft-provided, types of certificates used by CloudHub deplpoyed Mule applications, including MuleSoft-provided, customer-provided, or Mule application-provided certificates. customer-provided, or Mule application-provided certificates. What type of restrictions exist on the types of certificates that can be exposed by the CloudHub What type of restrictions exist on the types of certificates that can be exposed by the CloudHub Shared Load Balancer (SLB) to external web clients over the public internet? Shared Load Balancer (SLB) to external web clients over the public internet? A. Only MuleSoft-provided certificates are exposed. A. Only MuleSoft-provided certificates are exposed. B. Only customer-provided wildcard certificates are exposed. B. Only customer-provided wildcard certificates are exposed. C. Only customer-provided self-signed certificates are exposed. C. Only customer-provided self-signed certificates are exposed. D. Only underlying Mule application certificates are exposed (pass-through) D. Only underlying Mule application certificates are exposed (pass-through) Answer: A Answer: A
Question 3 Question 3 An organization's governance process requires project teams to get formal approval from all key An organization's governance process requires project teams to get formal approval from all key stakeholders for all new Integration design specifications. An integration Mule application Is being stakeholders for all new Integration design specifications. An integration Mule application Is being designed that interacts with various backend systems. The Mule application will be created using designed that interacts with various backend systems. The Mule application will be created using Anypoint Design Center or Anypoint Studio and will then be deployed to a customer-hosted runtime. Anypoint Design Center or Anypoint Studio and will then be deployed to a customer-hosted runtime. What key elements should be included in the integration design specification when requesting What key elements should be included in the integration design specification when requesting approval for this Mule application? approval for this Mule application? A. SLAs and non-functional requirements to access the backend systems A. SLAs and non-functional requirements to access the backend systems B. Snapshots of the Mule application's flows, including their error handling B. Snapshots of the Mule application's flows, including their error handling C. A list of current and future consumers of the Mule application and their contact details C. A list of current and future consumers of the Mule application and their contact details D. The credentials to access the backend systems and contact details for the administrator of each D. The credentials to access the backend systems and contact details for the administrator of each system system Answer: A Answer: A
Question 4 Question 4 What Is a recommended practice when designing an integration Mule 4 application that reads a large What Is a recommended practice when designing an integration Mule 4 application that reads a large XML payload as a stream? XML payload as a stream? A. The payload should be dealt with as a repeatable XML stream, which must only be traversed A. The payload should be dealt with as a repeatable XML stream, which must only be traversed (iterated-over) once and CANNOT be accessed randomly from DataWeave expressions and scripts (iterated-over) once and CANNOT be accessed randomly from DataWeave expressions and scripts B. The payload should be dealt with as an XML stream, without converting it to a single Java object B. The payload should be dealt with as an XML stream, without converting it to a single Java object (POJO) (POJO) C. The payload size should NOT exceed the maximum available heap memory of the Mute runtime C. The payload size should NOT exceed the maximum available heap memory of the Mute runtime on which the Mule application executes on which the Mule application executes D. The payload must be cached using a Cache scope If It Is to be sent to multiple backend systems D. The payload must be cached using a Cache scope If It Is to be sent to multiple backend systems Answer: C Answer: C
Question 5 Question 5 An organization's security policies mandate complete control of the login credentials used to log in to An organization's security policies mandate complete control of the login credentials used to log in to Anypoint Platform. Anypoint Platform. What feature of Anypoint Platform should be used to meet this requirement? What feature of Anypoint Platform should be used to meet this requirement? A. Enterprise Security Module A. Enterprise Security Module B. Client ID Secret B. Client ID Secret C. Federated Identity Management C. Federated Identity Management D. Federated Client Management D. Federated Client Management Answer: C Answer: C
Question 6 Question 6 An organization is designing an integration solution to replicate financial transaction data from a An organization is designing an integration solution to replicate financial transaction data from a legacy system into a data warehouse (DWH). legacy system into a data warehouse (DWH). The DWH must contain a daily snapshot of financial transactions, to be delivered as a CSV file. Daily The DWH must contain a daily snapshot of financial transactions, to be delivered as a CSV file. Daily transaction volume exceeds tens of millions of records, with significant spikes in volume during transaction volume exceeds tens of millions of records, with significant spikes in volume during popular shopping periods. popular shopping periods. What is the most appropriate integration style for an integration solution that meets the What is the most appropriate integration style for an integration solution that meets the organization's current requirements? organization's current requirements? A. Event-driven architecture A. Event-driven architecture B. Microservice architecture B. Microservice architecture C. API-led connectivity C. API-led connectivity D. Batch-triggered ETL D. Batch-triggered ETL Answer: D Answer: D
Question 7 Question 7 What metrics about API invocations are available for visualization in custom charts using Anypoint Analytics? What metrics about API invocations are available for visualization in custom charts using Anypoint Analytics? A. Request size, request HTTP verbs, response time A. Request size, request HTTP verbs, response time B. Request size, number of requests, JDBC Select operation result set size B. Request size, number of requests, JDBC Select operation result set size C. Request size, number of requests, response size, response time C. Request size, number of requests, response size, response time D. Request size, number of requests, JDBC Select operation response time D. Request size, number of requests, JDBC Select operation response time Answer: C Answer: C
Question 8 Question 8 Mule applications need to be deployed to CloudHub so they can access on-premises database systems. Mule applications need to be deployed to CloudHub so they can access on-premises database systems. These systems store sensitive and hence tightly protected data, so are not accessible over the internet. These systems store sensitive and hence tightly protected data, so are not accessible over the internet. What network architecture supports this requirement? What network architecture supports this requirement? A. An Anypoint VPC connected to the on-premises network using an IPsec tunnel or AWS A. An Anypoint VPC connected to the on-premises network using an IPsec tunnel or AWS DirectConnect, plus matching firewall rules in the VPC and on-premises network DirectConnect, plus matching firewall rules in the VPC and on-premises network B. Static IP addresses for the Mule applications deployed to the CloudHub Shared Worker B. Static IP addresses for the Mule applications deployed to the CloudHub Shared Worker Cloud, plus matching firewall rules and IP Cloud, plus matching firewall rules and IP whitelisting in the on-premises network whitelisting in the on-premises network C. An Anypoint VPC with one Dedicated Load Balancer fronting each on-premises database system, C. An Anypoint VPC with one Dedicated Load Balancer fronting each on-premises database system, plus matching IP whitelisting in the load balancer and firewall rules in the VPC and on-premises plus matching IP whitelisting in the load balancer and firewall rules in the VPC and on-premises network network D. Relocation of the database systems to a DMZ in the on-premises network, with Mule applications D. Relocation of the database systems to a DMZ in the on-premises network, with Mule applications deployed to the CloudHub Shared Worker Cloud connecting only to the DMZ deployed to the CloudHub Shared Worker Cloud connecting only to the DMZ Answer: A Answer: A
Question 9 Question 9 A Mule application name Pub uses a persistence object store. The Pub Mule application is deployed A Mule application name Pub uses a persistence object store. The Pub Mule application is deployed to Cloudhub and it configured to use Object Store v2. to Cloudhub and it configured to use Object Store v2. Another Mule application name sub is being developed to retrieve values from the Pub Mule Another Mule application name sub is being developed to retrieve values from the Pub Mule application persistence object Store and will also be deployed to cloudhub. application persistence object Store and will also be deployed to cloudhub. What is the most direct way for the Sub Mule application to retrieve values from the Pub Mule What is the most direct way for the Sub Mule application to retrieve values from the Pub Mule application persistence object store with the least latency? application persistence object store with the least latency? A. Use an object store connector configured to access the Pub Mule application persistence object A. Use an object store connector configured to access the Pub Mule application persistence object store store B. Use a VM connector configured to directly access the persistence queue of the Pub Mule B. Use a VM connector configured to directly access the persistence queue of the Pub Mule application persistence object store. application persistence object store. C. Use an Anypoint MQ connector configured to directly access the Pub Mule application persistence C. Use an Anypoint MQ connector configured to directly access the Pub Mule application persistence object store object store D. Use the Object store v2 REST API configured to access the Pub Mule application persistence D. Use the Object store v2 REST API configured to access the Pub Mule application persistence object store. object store. Answer: D Answer: D
Question 10 Question 10 In a Mule Application, a flow contains two (2) JMS consume operations that are used to connect to a In a Mule Application, a flow contains two (2) JMS consume operations that are used to connect to a JMS broker and consume messages from two (2) JMS destination. The Mule application then joins JMS broker and consume messages from two (2) JMS destination. The Mule application then joins the two JMS messages together. the two JMS messages together. The JMS broker does not implement high availability (HA) and periodically experiences scheduled The JMS broker does not implement high availability (HA) and periodically experiences scheduled outages of upto 10 mins for routine maintenance. outages of upto 10 mins for routine maintenance. What is the most idiomatic (used for its intented purpose) way to build the mule flow so it can best What is the most idiomatic (used for its intented purpose) way to build the mule flow so it can best recover from the expected outages? recover from the expected outages? A. Configure a reconnection strategy for the JMS connector A. Configure a reconnection strategy for the JMS connector B. Enclose the two(2) JMS operation in an Until Successful scope B. Enclose the two(2) JMS operation in an Until Successful scope C. Consider a transaction for the JMS connector C. Consider a transaction for the JMS connector D. Enclose the two(2) JMS operations in a Try scope with an Error Continue error handler D. Enclose the two(2) JMS operations in a Try scope with an Error Continue error handler Answer: A Answer: A