Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Salesforce MuleSoft-Platform-Architect-I Dumps

Salesforce Certified MuleSoft Platform Architect 1 Exam (SU24) Questions and Answers

Question 1

Refer to the exhibit. An organization needs to enable access to their customer data from both a mobile app and a web application, which each need access to common fields as well as certain unique fields.

The data is available partially in a database and partially in a 3rd-party CRM system.

What APIs should be created to best fit these design requirements?

as

A) A Process API that contains the data required by both the web and mobile apps, allowing these applications to invoke it directly and access the data they need thereby providing the flexibility to add more fields in the future without needing API changes

as

B) One set of APIs (Experience API, Process API, and System API) for the web app, and another set for the mobile app

as

C) Separate Experience APIs for the mobile and web app, but a common Process API that invokes separate System APIs created for the database and CRM system

as

D) A common Experience API used by both the web and mobile apps, but separate Process APIs for the web and mobile apps that interact with the database and the CRM System

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 2

A system API is deployed to a primary environment as well as to a disaster recovery (DR) environment, with different DNS names in each environment. A process API is a client to the system API and is being rate limited by the system API, with different limits in each of the environments. The system API's DR environment provides only 20% of the rate limiting offered by the primary environment. What is the best API fault-tolerant invocation strategy to reduce overall errors in the process API, given these conditions and constraints?

Options:

A.

Invoke the system API deployed to the primary environment; add timeout and retry logic to the process API to avoid intermittent failures; if it still fails, invoke the system API deployed to the DR environment

B.

Invoke the system API deployed to the primary environment; add retry logic to the process API to handle intermittent failures by invoking the system API deployed to the DR environment

C.

In parallel, invoke the system API deployed to the primary environment and the system API deployed to the DR environment; add timeout and retry logic to the process API to avoid intermittent failures; add logic to the process API to combine the results

D.

Invoke the system API deployed to the primary environment; add timeout and retry logic to the process API to avoid intermittent failures; if it still fails, invoke a copy of the process API deployed to the DR environment

Question 3

An API client calls one method from an existing API implementation. The API implementation is later updated. What change to the API implementation would require the API client's invocation logic to also be updated?

Options:

A.

When the data type of the response is changed for the method called by the API client

B.

When a new method is added to the resource used by the API client

C.

When a new required field is added to the method called by the API client

D.

When a child method is added to the method called by the API client

Question 4

An API has been updated in Anypoint exchange by its API producer from version 3.1.1 to 3.2.0 following accepted semantic versioning practices and the changes have been communicated via the APIs public portal. The API endpoint does NOT change in the new version. How should the developer of an API client respond to this change?

Options:

A.

The API producer should be requested to run the old version in parallel with the new one

B.

The API producer should be contacted to understand the change to existing functionality

C.

The API client code only needs to be changed if it needs to take advantage of the new features

D.

The API clients need to update the code on their side and need to do full regression

Question 5

An organization is implementing a Quote of the Day API that caches today's quote.

What scenario can use the GoudHub Object Store via the Object Store connector to persist the cache's state?

Options:

A.

When there are three CloudHub deployments of the API implementation to three separate CloudHub regions that must share the cache state

B.

When there are two CloudHub deployments of the API implementation by two Anypoint Platform business groups to the same CloudHub region that must share the cache state

C.

When there is one deployment of the API implementation to CloudHub and anottV deployment to a customer-hosted Mule runtime that must share the cache state

D.

When there is one CloudHub deployment of the API implementation to three CloudHub workers that must share the cache state

Question 6

In an organization, the InfoSec team is investigating Anypoint Platform related data traffic.

From where does most of the data available to Anypoint Platform for monitoring and alerting originate?

Options:

A.

From the Mule runtime or the API implementation, depending on the deployment model

B.

From various components of Anypoint Platform, such as the Shared Load Balancer, VPC, and Mule runtimes

C.

From the Mule runtime or the API Manager, depending on the type of data

D.

From the Mule runtime irrespective of the deployment model

Question 7

An organization has implemented a Customer Address API to retrieve customer address information. This API has been deployed to multiple environments and has been configured to enforce client IDs everywhere.

A developer is writing a client application to allow a user to update their address. The developer has found the Customer Address API in Anypoint Exchange and wants to use it in their client application.

What step of gaining access to the API can be performed automatically by Anypoint Platform?

Options:

A.

Approve the client application request for the chosen SLA tier

B.

Request access to the appropriate API Instances deployed to multiple environments using the client application's credentials

C.

Modify the client application to call the API using the client application's credentials

D.

Create a new application in Anypoint Exchange for requesting access to the API

Question 8

True or False. We should always make sure that the APIs being designed and developed are self-servable even if it needs more man-day effort and resources.

Options:

A.

FALSE

B.

TRUE

Question 9

What are 4 important Platform Capabilities offered by Anypoint Platform?

Options:

A.

API Versioning, API Runtime Execution and Hosting, API Invocation, API Consumer Engagement

B.

API Design and Development, API Runtime Execution and Hosting, API Versioning, API Deprecation

C.

API Design and Development, API Runtime Execution and Hosting, API Operations and Management, API Consumer Engagement

D.

API Design and Development, API Deprecation, API Versioning, API Consumer Engagement

Question 10

What CANNOT be effectively enforced using an API policy in Anypoint Platform?

Options:

A.

Guarding against Denial of Service attacks

B.

Maintaining tamper-proof credentials between APIs

C.

Logging HTTP requests and responses

D.

Backend system overloading

Question 11

Once an API Implementation is ready and the API is registered on API Manager, who should request the access to the API on Anypoint Exchange?

Options:

A.

None

B.

Both

C.

API Client

D.

API Consumer

Question 12

A System API is designed to retrieve data from a backend system that has scalability challenges. What API policy can best safeguard the backend system?

Options:

A.

IPwhitelist

B.

SLA-based rate limiting

C.

Auth 2 token enforcement

D.

Client ID enforcement

Question 13

An Anypoint Platform organization has been configured with an external identity provider (IdP) for identity management and client management. What credentials or token must be provided to Anypoint CLI to execute commands against the Anypoint Platform APIs?

Options:

A.

The credentials provided by the IdP for identity management

B.

The credentials provided by the IdP for client management

C.

An OAuth 2.0 token generated using the credentials provided by the IdP for client management

D.

An OAuth 2.0 token generated using the credentials provided by the IdP for identity management

Question 14

What is a best practice when building System APIs?

Options:

A.

Document the API using an easily consumable asset like a RAML definition

B.

Model all API resources and methods to closely mimic the operations of the backend system

C.

Build an Enterprise Data Model (Canonical Data Model) for each backend system and apply it to System APIs

D.

Expose to API clients all technical details of the API implementation's interaction wifch the backend system

Question 15

What API policy would LEAST likely be applied to a Process API?

Options:

A.

Custom circuit breaker

B.

Client ID enforcement

C.

Rate limiting

D.

JSON threat protection

Question 16

Refer to the exhibit.

as

A developer is building a client application to invoke an API deployed to the STAGING environment that is governed by a client ID enforcement policy.

What is required to successfully invoke the API?

Options:

A.

The client ID and secret for the Anypoint Platform account owning the API in the STAGING environment

B.

The client ID and secret for the Anypoint Platform account's STAGING environment

C.

The client ID and secret obtained from Anypoint Exchange for the API instance in the STAGING environment

D.

A valid OAuth token obtained from Anypoint Platform and its associated client ID and secret

Question 17

Refer to the exhibit.

as

Three business processes need to be implemented, and the implementations need to communicate with several different SaaS applications.

These processes are owned by separate (siloed) LOBs and are mainly independent of each other, but do share a few business entities. Each LOB has one development team and their own budget

In this organizational context, what is the most effective approach to choose the API data models for the APIs that will implement these business processes with minimal redundancy of the data models?

A) Build several Bounded Context Data Models that align with coherent parts of the business processes and the definitions of associated business entities

as

B) Build distinct data models for each API to follow established micro-services and Agile API-centric practices

as

C) Build all API data models using XML schema to drive consistency and reuse across the organization

as

D) Build one centralized Canonical Data Model (Enterprise Data Model) that unifies all the data types from all three business processes, ensuring the data model is consistent and non-redundant

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 18

What API policy would be LEAST LIKELY used when designing an Experience API that is intended to work with a consumer mobile phone or tablet application?

Options:

A.

OAuth 2.0 access token enforcement

B.

Client ID enforcement

C.

JSON threat protection

D.

IPwhitellst

Question 19

The implementation of a Process API must change.

What is a valid approach that minimizes the impact of this change on API clients?

Options:

A.

Update the RAML definition of the current Process API and notify API client developers by sending them links to the updated RAML definition

B.

Postpone changes until API consumers acknowledge they are ready to migrate to a new Process API or API version

C.

Implement required changes to the Process API implementation so that whenever possible, the Process API's RAML definition remains unchanged

D.

Implement the Process API changes in a new API implementation, and have the old API implementation return an HTTP status code 301 - Moved Permanently to inform API clients they should be calling the new API implementation

Question 20

What correctly characterizes unit tests of Mule applications?

Options:

A.

They test the validity of input and output of source and target systems

B.

They must be run in a unit testing environment with dedicated Mule runtimes for the environment

C.

They must be triggered by an external client tool or event source

D.

They are typically written using MUnit to run in an embedded Mule runtime that does not require external connectivity

Question 21

A company has created a successful enterprise data model (EDM). The company is committed to building an application network by adopting modern APIs as a core enabler of the company's IT operating model. At what API tiers (experience, process, system) should the company require reusing the EDM when designing modern API data models?

Options:

A.

At the experience and process tiers

B.

At the experience and system tiers

C.

At the process and system tiers

D.

At the experience, process, and system tiers

Question 22

What Anypoint Connectors support transactions?

Options:

A.

Database, JMS, VM

B.

Database, 3MS, HTTP

C.

Database, JMS, VM, SFTP

D.

Database, VM, File

Question 23

What is typically NOT a function of the APIs created within the framework called API-led connectivity?

Options:

A.

They provide an additional layer of resilience on top of the underlying backend system, thereby insulating clients from extended failure of these systems.

B.

They allow for innovation at the user Interface level by consuming the underlying assets without being aware of how data Is being extracted from backend systems.

C.

They reduce the dependency on the underlying backend systems by helping unlock data from backend systems In a reusable and consumable way.

D.

They can compose data from various sources and combine them with orchestration logic to create higher level value.

Question 24

What are the major benefits of MuleSoft proposed IT Operating Model?

Options:

A.

1. Decrease the IT delivery gap

2. Meet various business demands without increasing the IT capacity

3. Focus on creation of reusable assets first. Upon finishing creation of all the possible assets then inform the LOBs in the organization to start using them

B.

1. Decrease the IT delivery gap

2. Meet various business demands by increasing the IT capacity and forming various IT departments

3. Make consumption of assets at the rate of production

C.

1. Decrease the IT delivery gap

2. Meet various business demands without increasing the IT capacity

3. Make consumption of assets at the rate of production

Question 25

Refer to the exhibit. An organization is running a Mule standalone runtime and has configured Active Directory as the Anypoint Platform external Identity Provider. The organization does not have budget for other system components.

as

What policy should be applied to all instances of APIs in the organization to most effecuvelyKestrict access to a specific group of internal users?

Options:

A.

Apply a basic authentication - LDAP policy; the internal Active Directory will be configured as the LDAP source for authenticating users

B.

Apply a client ID enforcement policy; the specific group of users will configure their client applications to use their specific client credentials

C.

Apply an IP whitelist policy; only the specific users' workstations will be in the whitelist

D.

Apply an OAuth 2.0 access token enforcement policy; the internal Active Directory will be configured as the OAuth server

Question 26

The application network is recomposable: it is built for change because it "bends but does not break"

Options:

A.

TRUE

B.

FALSE

Question 27

In which layer of API-led connectivity, does the business logic orchestration reside?

Options:

A.

System Layer

B.

Experience Layer

C.

Process Layer

Question 28

What is the most performant out-of-the-box solution in Anypoint Platform to track transaction state in an asynchronously executing long-running process implemented as a Mule application deployed to multiple CloudHub workers?

Options:

A.

Redis distributed cache

B.

java.util.WeakHashMap

C.

Persistent Object Store

D.

File-based storage

Page: 1 / 9
Total 93 questions