Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

MCIA-Level-1-Maintenance MuleSoft Certified Integration Architect - Level 1 MAINTENANCE Questions and Answers

Questions 4

What API policy would LEAST likely be applied to a Process API?

Options:

A.

Custom circuit breaker

B.

Client ID enforcement

C.

Rate limiting

D.

JSON threat protection

Buy Now
Questions 5

An auto mobile company want to share inventory updates with dealers Dl and D2 asynchronously and concurrently via queues Q1 and Q2. Dealer Dl must consume the message from the queue Q1 and dealer D2 to must consume a message from the queue Q2.

Dealer D1 has implemented a retry mechanism to reprocess the transaction in case of any errors while processing the inventers updates. Dealer D2 has not implemented any retry mechanism.

How should the dealers acknowledge the message to avoid message loss and minimize impact on the current implementation?

Options:

A.

Dealer D1 must use auto acknowledgement and dealer D2 can use manual acknowledgement and acknowledge the message after successful processing

B.

Dealer D1 can use auto acknowledgement and dealer D2 can use IMMEDIATE acknowledgement and acknowledge the message of successful processing

C.

Dealer D1 and dealer D2 must use AUTO acknowledgement and acknowledge the message after successful processing

D.

Dealer D1 can use AUTO acknowledgement and dealer D2 must use manual acknowledgement and acknowledge the message

after successful processing

Buy Now
Questions 6

As a part of design , Mule application is required call the Google Maps API to perform a distance computation. The application is deployed to cloudhub.

At the minimum what should be configured in the TLS context of the HTTP request configuration to meet these requirements?

Options:

A.

The configuration is built-in and nothing extra is required for the TLS context

B.

Request a private key from Google and create a PKCS12 file with it and add it in keyStore as a part of TLS context

C.

Download the Google public certificate from a browser, generate JKS file from it and add it in key store as a part of TLS context

D.

Download the Google public certificate from a browser, generate a JKS file from it and add it in Truststore as part of the TLS context

Buy Now
Questions 7

What is maximum vCores can be allocated to application deployed to CloudHub?

Options:

A.

1 vCores

B.

2 vCores

C.

4 vCores

D.

16 vCores

Buy Now
Questions 8

A mule application must periodically process a large dataset which varies from 6 GB lo 8 GB from a back-end database and write transform data lo an FTPS server using a properly configured bad job scope.

The performance requirements of an application are approved to run in the cloud hub 0.2 vCore with 8 GB storage capacity and currency requirements are met.

How can the high rate of records be effectively managed in this application?

Options:

A.

Use streaming with a file storage repeatable strategy for reading records from the database and batch aggregator with streaming to write to FTPS

B.

Use streaming with an in-memory reputable store strategy for reading records from the database and batch aggregator with streaming to write to FTPS

C.

Use streaming with a file store repeatable strategy for reading records from the database and batch aggregator with an optimal size

D.

Use streaming with a file store repeatable strategy reading records from the database and batch aggregator without any required configuration

Buy Now
Questions 9

As a part of project requirement, client will send a stream of data to mule application. Payload size can vary between 10mb to 5GB. Mule application is required to transform the data and send across multiple sftp servers. Due to the cost cuttings in the organization, mule application can only be allocated one worker with size of 0.2 vCore.

As an integration architect , which streaming strategy you would suggest to handle this scenario?

Options:

A.

In-memory non repeatable stream

B.

File based non-repeatable stream

C.

In-memory repeatable stream

D.

File based repeatable storage

Buy Now
Questions 10

What is not true about Mule Domain Project?

Options:

A.

This allows Mule applications to share resources

B.

Expose multiple services within the Mule domain on the same port

C.

Only available Anypoint Runtime Fabric

D.

Send events (messages) to other Mule applications using VM queues

Buy Now
Questions 11

Customer has deployed mule applications to different customer hosted mule run times. Mule applications are managed from Anypoint platform.

What needs to be configured to monitor these Mule applications from Anypoint monitoring and what sends monitoring data to Anypoint monitoring?

Options:

A.

Enable monitoring of individual applications from runtime manager application settings

Runtime manager agent sends monitoring data from the mule applications to Anypoint monitoring

B.

Install runtime manager agent on each mule runtime

Runtime manager agent since monitoring data from the mule applications to Anypoint monitoring

C.

Anypoint monitoring agent on each mule runtime

Anypoint monitoring agent sends monitoring data from the mule applications to Anypoint monitoring

D.

By default, Anypoint monitoring agent will be installed on each Mule run time

Anypoint Monitoring agent automatically sends monitoring data from the Mule applications to Anypoint monitoring

Buy Now
Questions 12

A Mule application is running on a customer-hosted Mule runtime in an organization's network. The Mule application acts as a producer of asynchronous Mule events. Each Mule event must be broadcast to all interested external consumers outside the Mule application. The Mule events should be published in a way that is guaranteed in normal situations and also minimizes duplicate delivery in less frequent failure scenarios.

The organizational firewall is configured to only allow outbound traffic on ports 80 and 443. Some external event consumers are within the organizational network, while others are located outside the firewall.

What Anypoint Platform service is most idiomatic (used for its intended purpose) for publishing these Mule events to all external consumers while addressing the desired reliability goals?

Options:

A.

CloudHub VM queues

B.

Anypoint MQ

C.

Anypoint Exchange

D.

CloudHub Shared Load Balancer

Buy Now
Questions 13

In one of the critical payment related mule application, transaction is being used . As an enhancement to implementation , scatter gather route is introduced which is also the part of transaction group. Scatter gather route has 4 routes.

What will be the behavior of the Mule application in case of error occurs in 4th route of the scatter-gather router and transaction needs to be rolled back?

Options:

A.

Only errored route will be rolled back

B.

All routes will be rolled back

C.

Scatter Gather router cannot be part of transaction

Buy Now
Questions 14

An organization has implemented a continuous integration (CI) lifecycle that promotes Mule applications through code, build, and test stages. To standardize the organization's CI journey, a new dependency control approach is being designed to store artifacts that include information such as dependencies, versioning, and build promotions.

To implement these process improvements, the organization will now require developers to maintain all dependencies related to Mule application code in a shared location.

What is the most idiomatic (used for its intended purpose) type of system the organization should use in a shared location to standardize all dependencies related to Mule application code?

Options:

A.

A MuleSoft-managed repository atrepository.mulesoft.org

B.

A binary artifact repository

C.

API Community Manager

D.

The Anypoint Object Store service at cloudhub.io

Buy Now
Questions 15

An organization is evaluating using the CloudHub shared Load Balancer (SLB) vs creating a CloudHub dedicated load balancer (DLB). They are evaluating how this choice affects the various types of certificates used by CloudHub deplpoyed Mule applications, including MuleSoft-provided, customer-provided, or Mule application-provided certificates.

What type of restrictions exist on the types of certificates that can be exposed by the CloudHub Shared Load Balancer (SLB) to external web clients over the public internet?

Options:

A.

Only MuleSoft-provided certificates are exposed.

B.

Only customer-provided wildcard certificates are exposed.

C.

Only customer-provided self-signed certificates are exposed.

D.

Only underlying Mule application certificates are exposed (pass-through)

Buy Now
Questions 16

A rale limiting policy has been applied to a soap VI.2 API published in Clondhub. The API implementation catches errors in a global error handler on error propagate in the main flow for HTTP: RETRY_EXHAUSTED with HTTP status set to 429 and any with the HTTP status set to 500.

What is the expected H1TP status when the client exceeds the quota of the API calls?

Options:

A.

HTTP status 429 as defined in the HTTP:RETRY EXHAUSTED error handler in the API B. HTTP status 500 as defined in the ANY error handler in the API since an API:RETRY_EXHAUSTED will be generated

B.

HTTP status 401 unauthorized for policy violation

C.

HTTP status 400 from the rate-limiting policy violation since the call does not reach the back-end

Buy Now
Exam Name: MuleSoft Certified Integration Architect - Level 1 MAINTENANCE
Last Update: May 1, 2024
Questions: 116
MCIA-Level-1-Maintenance pdf

MCIA-Level-1-Maintenance PDF

$28  $80
MCIA-Level-1-Maintenance Engine

MCIA-Level-1-Maintenance Testing Engine

$33.25  $95
MCIA-Level-1-Maintenance PDF + Engine

MCIA-Level-1-Maintenance PDF + Testing Engine

$45.5  $130