Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Salesforce MuleSoft MuleSoft-Platform-Architect-I Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam MuleSoft-Platform-Architect-I Premium Access

View all detail and faqs for the MuleSoft-Platform-Architect-I exam


386 Students Passed

88% Average Score

92% Same Questions
Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

Select the correct Owner-Layer combinations from below options

Options:

A.

1. App Developers owns and focuses on Experience Layer APIs

2. Central IT owns and focuses on Process Layer APIs

3. LOB IT owns and focuses on System Layer APIs

B.

1. Central IT owns and focuses on Experience Layer APIs

2. LOB IT owns and focuses on Process Layer APIs

3. App Developers owns and focuses on System Layer APIs

C.

1. App Developers owns and focuses on Experience Layer APIs

2. LOB IT owns and focuses on Process Layer APIs

3. Central IT owns and focuses on System Layer APIs

Questions # 2:

Which of the below, when used together, makes the IT Operational Model effective?

Options:

A.

Create reusable assets, Do marketing on the created assets across organization, Arrange time to time LOB reviews to ensure assets are being consumed or not

B.

Create reusable assets, Make them discoverable so that LOB teams can self-serve and browse the APIs, Get active feedback and usage metrics

C.

Create resuable assets, make them discoverable so that LOB teams can self-serve and browse the APIs

Questions # 3:

An API experiences a high rate of client requests (TPS) vwth small message paytoads. How can usage limits be imposed on the API based on the type of client application?

Options:

A.

Use an SLA-based rate limiting policy and assign a client application to a matching SLA tier based on its type

B.

Use a spike control policy that limits the number of requests for each client application type

C.

Use a cross-origin resource sharing (CORS) policy to limit resource sharing between client applications, configured by the client application type

D.

Use a rate limiting policy and a client ID enforcement policy, each configured by the client application type

Questions # 4:

An online store's marketing team has noticed an increase in customers leaving online baskets without checking out. They suspect a technology issue is at the root cause of the baskets being left behind. They approach the Center for Enablement to ask for help identifying the issue. Multiple APIs from across all the layers of their application network are involved in the shopping application.

Which feature of the Anypoint Platform can be used to view metrics from all involved APIs at the same time?

Options:

A.

Custom dashboards

B.

Built-in dashboards

C.

Functional monitoring

D.

API Manager

Questions # 5:

A system API has a guaranteed SLA of 100 ms per request. The system API is deployed to a primary environment as well as to a disaster recovery (DR) environment, with different DNS names in each environment. An upstream process API invokes the system API and the main goal of this process API is to respond to client requests in the least possible time. In what order should the system APIs be invoked, and what changes should be made in order to speed up the response time for requests from the process API?

Options:

A.

In parallel, invoke the system API deployed to the primary environment and the system API deployed to the DR environment, and ONLY use the first response

B.

In parallel, invoke the system API deployed to the primary environment and the system API deployed to the DR environment using a scatter-gather configured with a timeout, and then merge the responses

C.

Invoke the system API deployed to the primary environment, and if it fails, invoke the system API deployed to the DR environment

D.

Invoke ONLY the system API deployed to the primary environment, and add timeout and retry logic to avoid intermittent failures

Questions # 6:

A company deployed an API to a single worker/replica in the shared cloud in the U.S. West Region.

What happens when the Availability Zone experiences an outage?

Options:

A.

CloudHub will auto-redeploy the APL in the U.S. East Region

B.

The APT will be unavailable until the availability comes back online, at which time the worker/replica will be auto-restarted

C.

CloudHub will auto-redeploy the API in another Availability Zone in the U.S. West Region

D.

The Anypoint Platform admin is alerted when the AP] is experiencing an outage and needs the trigger the CI/CD pipeline to redeploy to the US. East Region

Questions # 7:

A Mule application exposes an HTTPS endpoint and is deployed to the CloudHub Shared Worker Cloud. All traffic to that Mule application must stay inside the AWS VPC.

To what TCP port do API invocations to that Mule application need to be sent?

Options:

A.

443

B.

8081

C.

8091

D.

8082

Questions # 8:

An organization requires several APIs to be secured with OAuth 2.0, and PingFederate has been identified as the identity provider for API client authorization, The

PingFederate Client Provider is configured in access management, and the PingFederate OAuth 2.0 Token Enforcement policy is configured for the API instances required by the

organization. The API instances reside in two business groups (Group A and Group B) within the Master Organization (Master Org).

What should be done to allow API consumers to access the API instances?

Options:

A.

The API administrator should configure the correct client discovery URL in both child business groups, and the API consumer should request access to the API in Ping Identity

B.

The API administrator should grant access to the API consumers by creating contracts in the relevant API instances in API Manager

C.

The APL consumer should create a client application and request access to the APT in Anypoint Exchange, and the API administrator should approve the request

D.

The APT consumer should create a client application and request access to the API in Ping Identity, and the organization's Ping Identity workflow will grant access

Questions # 9:

An eCommerce company is adding a new Product Details feature to their website, A customer will launch the product catalog page, a new Product Details link will

appear by product where they can click to retrieve the product detail description. Product detail data is updated with product update releases, once or twice a year, Presently

the database response time has been very slow due to high volume.

What action retrieves the product details with the lowest response time, fault tolerant, and consistent data?

Options:

A.

Select the product details from a database in a Cache scope and return them within the API response

B.

Select the product details from a database and put them in Anypoint MQ; the Anypoint MO subseriber will receive the product details and return them within the API response

C.

Use an object store to store and retrieve the product details originally read from a database and return them within the API response

D.

Select the product details from a database and return them within the API response

Questions # 10:

What API policy would be LEAST LIKELY used when designing an Experience API that is intended to work with a consumer mobile phone or tablet application?

Options:

A.

OAuth 2.0 access token enforcement

B.

Client ID enforcement

C.

JSON threat protection

D.

IPwhitellst

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.