Free MCIA-Level-1 Exam Braindumps

Pass your MuleSoft Certified Integration Architect - Level 1 exam with these free Questions and Answers

Page 3 of 49
QUESTION 6

In a Mule Application, a flow contains two (2) JMS consume operations that are used to connect to a JMS broker and consume messages from two(2) JMS destination. The Mule application then joins the two JMS messages together.
The JMS broker does not implement high availability (HA) and periodically experiences scheduled outages of upto 10 mins for routine maintenance.
What is the most idiomatic (used for its intented purpose) way to build the mule flow so it can best recover from the expected outages?

  1. A. Configure a reconnection strategy for the JMS connector
  2. B. Enclose the two(2) JMS operation in an Until Successful scope
  3. C. Consider a transaction for the JMS connector
  4. D. Enclose the two(2) JMS operations in a Try scope with an Error Continue error handler

Correct Answer: A
When an operation in a Mule application fails to connect to an external server, the default behavior is for the operation to fail immediately and return a connectivity error. You can modify this default behavior by configuring a reconnection strategy for the operation. You can configure a reconnection strategy for an operation either by modifying the operation properties or by modifying the configuration of the global element for the operation. The following are the available reconnection strategies and their behaviors: None Is the default behavior, which immediately returns a connectivity error if the attempt to connect is unsuccessful Standard (reconnect) Sets the number of reconnection attempts and the interval at which to execute them before returning a connectivity error Forever (reconnect-forever) Attempts to reconnect continually at a given interval

QUESTION 7

A leading e-commerce giant will use Mulesoft API's on runtime fabric (RTF) to process customer orders. Some customer's sensitive information such as credit card information is also there as a part of a API payload.
What approach minimizes the risk of matching sensitive data to the original and can convert back to the original value whenever and wherever required?

  1. A. Apply masking to hide the sensitive information and then use API
  2. B. manager to detokenize the masking format to return the original value
  3. C. create a tokenization format and apply a tokenization policy to the API Gateway
  4. D. Used both masking and tokenization
  5. E. Apply a field level encryption policy in the API Gateway

Correct Answer: A

QUESTION 8

An organization has strict unit test requirement that mandate every mule application must have an MUnit test suit with a test case defined for each flow and a minimum test coverage of 80%.
A developer is building Munit test suit for a newly developed mule application that sends API request to an
external rest API.
What is the effective approach for successfully executing the Munit tests of this new application while still achieving the required test coverage for the Munit tests?

  1. A. Invoke the external endpoint of the rest API from the mule floors
  2. B. Mark the rest API invocations in the Munits and then call the mocking service flow that simulates standard responses from the REST API
  3. C. Mock the rest API invocation in the Munits and return a mock response for those invocations
  4. D. Create a mocking service flow to simulate standard responses from the rest API and then configure the mule flows to call the marking service flow

Correct Answer: C

QUESTION 9

An insurance company is using a CIoudHub runtime plane. As a part of requirement, email alert should be sent to internal operations team every time of policy applied to an API instance is deleted As an
integration architect suggest on how this requirement be met?

  1. A. Use audit logs in Anypoint platform to detect a policy deletion and configure the Audit logs alert feature to send an email to the operations team
  2. B. Use Anypoint monitoring to configure an alert that sends an email to the operations team every time a policy is deleted in API manager
  3. C. Create a custom connector to be triggered every time of policy is deleted in API manager
  4. D. Implement a new application that uses the Audit log REST API todetect the policy deletion and send an email to operations team the SMTP connector

Correct Answer: D

QUESTION 10

An organization's security policies mandate complete control of the login credentials used to log in to Anypoint Platform. What feature of Anypoint Platform should be used to meet this requirement?

  1. A. Enterprise Security Module
  2. B. Client ID Secret
  3. C. Federated Identity Management
  4. D. Federated Client Management

Correct Answer: C
Correct answer is Federated Identity Management As the Anypoint Platform organization administrator, you can configure identity management in Anypoint Platform to set up users for single sign-on (SSO). Configure identity management using one of the following single sign-on standards: OpenID Connect: End user identity verification by an authorization server including SSO SAML 2.0: Web-based authorization including
cross-domain SSO Where as Client Management is where Anypoint Platform acts as a client provider by default, but you can also configure external client providers to authorize client applications. As an API owner, you can apply an OAuth 2.0 policy to authorize client applications that try to access your API. You need an OAuth 2.0 provider to use an OAuth 2.0 policy

Page 3 of 49

Post your Comments and Discuss MuleSoft MCIA-Level-1 exam with other Community members: