Summer Sale - Limited Time 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 5763r953

Welcome To DumpsPedia

MCIA-Level-1-Maintenance Sample Questions Answers

Questions 4

An API implementation is being developed to expose data from a production database via HTTP requests. The API implementation executes a database SELECT statement that is dynamically created based upon data received from each incoming HTTP request. The developers are planning to use various types of testing to make sure the Mule application works as expected, can handle specific workloads, and behaves correctly from an API consumer perspective. What type of testing would typically mock the results from each SELECT statement rather than actually execute it in the production database?

Options:

A.

Unit testing (white box)

B.

Integration testing

C.

Functional testing (black box)

D.

Performance testing

Buy Now
Questions 5

A company is modernizing its legal systems lo accelerate access lo applications and data while supporting the adoption of new technologies. The key to achieving this business goal is unlocking the companies' key systems and dala including microservices miming under Docker and kubernetes containers using apis.

Considering the current aggressive backlog and project delivery requirements the company wants to take a strategic approach in the first phase of its transformation projects by quickly deploying API's in mule runtime that are able lo scale, connect to on premises systems and migrate as needed.

Which runtime deployment option supports company's goals?

Options:

A.

Customer hosted self provisioned runtimes

B.

Cloudhub runtimes

C.

Runtime fabric on self managed Kubernetes

D.

Runtime fabric on Vmware metal

Buy Now
Questions 6

What is not true about Mule Domain Project?

Options:

A.

This allows Mule applications to share resources

B.

Expose multiple services within the Mule domain on the same port

C.

Only available Anypoint Runtime Fabric

D.

Send events (messages) to other Mule applications using VM queues

Buy Now
Questions 7

A company is designing an integration Mule application to process orders by submitting them to a back-end system for offline processing. Each order will be received by the Mule application through an HTTP5 POST and must be acknowledged immediately.

Once acknowledged the order will be submitted to a back-end system. Orders that cannot be successfully submitted due to the rejections from the back-end system will need to be processed manually (outside the banking system).

The mule application will be deployed to a customer hosted runtime and will be able to use an existing ActiveMQ broker if needed. The ActiveMQ broker is located inside the organization's firewall. The back-end system has a track record of unreliability due to both minor network connectivity issues and longer outages.

Which combination of Mule application components and ActiveMQ queues are required to ensure automatic submission of orders to the back-end system while supporting but minimizing manual order processing?

Options:

A.

One or more On Error scopes to assist calling the back-end system An Untill successful scope containing VM components for long retries A persistent dead-letter VM queue configure in Cloud hub

B.

An Until Successful scope to call the back-end system One or more ActiveMQ long-retry queues One or more ActiveMQ dead-letter queues for manual processing

C.

One or more on-Error scopes to assist calling the back-end system one or more ActiveMQ long-retry queues A persistent dead-letter Object store configuration in the CloudHub object store service

D.

A batch job scope to call the back in system An Untill successful scope containing Object Store components for long retries. A dead-letter object store configured in the Mule application

Buy Now
Questions 8

As a part of project requirement, client will send a stream of data to mule application. Payload size can vary between 10mb to 5GB. Mule application is required to transform the data and send across multiple sftp servers. Due to the cost cuttings in the organization, mule application can only be allocated one worker with size of 0.2 vCore.

As an integration architect , which streaming strategy you would suggest to handle this scenario?

Options:

A.

In-memory non repeatable stream

B.

File based non-repeatable stream

C.

In-memory repeatable stream

D.

File based repeatable storage

Buy Now
Questions 9

A company is implementing a new Mule application that supports a set of critical functions driven by a rest API enabled, claims payment rules engine hosted on oracle ERP. As designed the mule application requires many data transformation operations as it performs its batch processing logic.

The company wants to leverage and reuse as many of its existing java-based capabilities (classes, objects, data model etc.) as possible

What approach should be considered when implementing required data mappings and transformations between Mule application and Oracle ERP in the new Mule application?

Options:

A.

Create a new metadata RAML classes in Mule from the appropriate Java objects and then perform transformations via Dataweave

B.

From the mule application, transform via theXSLT model

C.

Transform by calling any suitable Java class from Dataweave

D.

Invoke any of the appropriate Java methods directly, create metadata RAML classes and then perform required transformations via Dataweave

Buy Now
Questions 10

In Anypoint Platform, a company wants to configure multiple identity providers (IdPs) for multiple lines of business (LOBs). Multiple business groups, teams, and environments have been defined for these LOBs.

What Anypoint Platform feature can use multiple IdPs across the company’s business groups, teams, and environments?

Options:

A.

MuleSoft-hosted (CloudHub) dedicated load balancers

B.

Client (application) management

C.

Virtual private clouds

D.

Permissions

Buy Now
Questions 11

An organization is designing multiple new applications to run on CloudHub in a single Anypoint VPC and that must share data using a common persistent Anypoint object store V2 (OSv2).

Which design gives these mule applications access to the same object store instance?

Options:

A.

AVM connector configured to directly access the persistence queue of the persistent object store

B.

An Anypoint MQ connector configured to directly access the persistent object store

C.

Object store V2 can be shared across cloudhub applications with the configured osv2 connector

D.

The object store V2 rest API configured to access the persistent object store

Buy Now
Questions 12

As a part of project , existing java implementation is being migrated to Mulesoft. Business is very tight on the budget and wish to complete the project in most economical way possible.

Canonical object model using java is already a part of existing implementation. Same object model is required by mule application for a business use case. What is the best way to achieve this?

Options:

A.

Make use of Java module

B.

Create similar model for Mule applications

C.

Create a custom application to read Java code and make it available for Mule application

D.

Use Anypoint exchange

Buy Now
Questions 13

A stock broking company makes use of CloudHub VPC to deploy Mule applications. Mule application needs to connect to a database application in the customers on-premises corporate data center and also to a Kafka cluster running in AWS VPC.

How is access enabled for the API to connect to the database application and Kafka cluster securely?

Options:

A.

Set up a transit gateway to the customers on-premises corporate datacenter to AWS VPC

B.

Setup AnyPoint VPN to the customer's on-premise corporate data

center and VPC peering with AWS VPC

C.

Setup VPC peering with AWS VPC and the customers devices corporate data center

D.

Setup VPC peering with the customers onto my service corporate data center and Anypoint VPN to AWS VPC

Buy Now
Questions 14

Organization wants to achieve high availability goal for Mule applications in customer hosted runtime plane. Due to the complexity involved, data cannot be shared among of different instances of same Mule application. What option best suits to this requirement considering high availability is very much critical to the organization?

Options:

A.

The cluster can be configured

B.

Use third party product to implement load balancer

C.

High availability can be achieved only in CloudHub

D.

Use persistent object store

Buy Now
Questions 15

A company is building an application network and has deployed four Mule APIs: one experience API, one process API, and two system APIs. The logs from all the APIs are aggregated in an external log aggregation tool. The company wants to trace messages that are exchanged between multiple API implementations. What is the most idiomatic (based on its intended use) identifier that should be used to implement Mule event tracing across the multiple API implementations?

Options:

A.

Mule event ID

B.

Mule correlation ID

C.

Client's IP address

D.

DataWeave UUID

Buy Now
Questions 16

A Mule application is synchronizing customer data between two different database systems.

What is the main benefit of using eXtended Architecture (XA) transactions over local transactions to synchronize these two different database systems?

Options:

A.

An XA transaction synchronizes the database systems with the least amount of Mule configuration or coding

B.

An XA transaction handles the largest number of requests in the shortest time

C.

An XA transaction automatically rolls back operations against both database systems if any operation falls

D.

An XA transaction writes to both database systems as fast as possible

Buy Now
Questions 17

A leading e-commerce giant will use Mulesoft API's on runtime fabric (RTF) to process customer orders. Some customer's sensitive information such as credit card information is also there as a part of a API payload.

What approach minimizes the risk of matching sensitive data to the original and can convert back to the original value whenever and wherever required?

Options:

A.

Apply masking to hide the sensitive information and then use API

B.

manager to detokenize the masking format to return the original value

C.

create a tokenization format and apply a tokenization policy to the API Gateway

D.

Used both masking and tokenization

E.

Apply a field level encryption policy in the API Gateway

Buy Now
Exam Code: MCIA-Level-1-Maintenance
Exam Name: MuleSoft Certified Integration Architect - Level 1 MAINTENANCE
Last Update: Apr 11, 2024
Questions: 116
$72  $159.99
$54  $119.99
$45  $99.99
buy now MCIA-Level-1-Maintenance