MuleSoft Certified Platform Architect - Level 1 Flashcards
True or False. We should always make sure that the APIs being designed and developed are self-servable even if it needs more man-day effort and resources.
A. FALSE
B. TRUE
Answer: B
Explanation:
Correct Answer: TRUE
*********
» As per MuleSoft proposed IT Operating Model, designing APIs and making sure that they are discoverable and
self-servable is VERY VERY IMPORTANT and decides the success of an API and its application network.
What are 4 important Platform Capabilities offered by Anypoint Platform?
A . API Versioning, API Runtime Execution and Hosting, API Invocation, API Consumer Engagement
B . API Design and Development, API Runtime Execution and Hosting, API Versioning, API Deprecation
C . API Design and Development, API Runtime Execution and Hosting, API Operations and Management, API
Consumer Engagement
D . API Design and Development, API Deprecation, API Versioning, API Consumer Engagement
Answer: C
Explanation:
Correct Answer: API Design and Development, API Runtime Execution and Hosting, API Operations and
Management, API Consumer Engagement
*********
» API Design and Development - Anypoint Studio, Anypoint Design Center, Anypoint Connectors
» API Runtime Execution and Hosting - Mule Runtimes, CloudHub, Runtime Services
» API Operations and Management - Anypoint API Manager, Anypoint Exchange
» API Consumer Management - API Contracts, Public Portals, Anypoint Exchange, API Notebooks
What Anypoint Platform Capabilities listed below fall under APIs and API Invocations/Consumers category?
Select TWO
A . API Operations and Management
B . API Runtime Execution and Hosting
C . API Consumer Engagement
D . API Design and Development
Answer: B, D
Select the correct Owner-Layer combinations from below options
A .
1. App Developers owns and focuses on Experience Layer APIs
2. Central IT owns and focuses on Process Layer APIs
3. LOB IT owns and focuses on System Layer APIs
B .
1. Central IT owns and focuses on Experience Layer APIs
2. LOB IT owns and focuses on Process Layer APIs
3. App Developers owns and focuses on System Layer APIs
C .
1. App Developers owns and focuses on Experience Layer APIs
2. LOB IT owns and focuses on Process Layer APIs
3. Central IT owns and focuses on System Layer APIs
Answer: C
Which layer in the API-led connectivity focuses on unlocking key systems, legacy systems, data sources etc and exposes the functionality?
A . Experience Layer
B . Process Layer
C . System Layer
C
A Mule application exposes an HTTPS endpoint and is deployed to three CloudHub workers that do not use static IP addresses. The Mule application expects a high volume of client requests in short time periods. What is the most cost-effective infrastructure component that should be used to serve the high volume of client requests?
A . A customer-hosted load balancer
B . The CloudHub shared load balancer
C . An API proxy
D . Runtime Manager autoscaling
Answer: B
What are the major benefits of MuleSoft proposed IT Operating Model?
A .
1. Decrease the IT delivery gap
2. Meet various business demands without increasing the IT capacity
3. Focus on creation of reusable assets first. Upon finishing creation of all the possible assets then inform the LOBs
in the organization to start using them
B .
1. Decrease the IT delivery gap
2. Meet various business demands by increasing the IT capacity and forming various IT departments
3. Make consumption of assets at the rate of production
C .
1. Decrease the IT delivery gap
2. Meet various business demands without increasing the IT capacity
3. Make consumption of assets at the rate of production
Answer: C
Which of the following best fits the definition of API-led connectivity?
A . API-led connectivity is not just an architecture or technology but also a way to organize people and processes for efficient IT delivery in the organization
B . API-led connectivity is a 3-layered architecture covering Experience, Process, and System layers
C . API-led connectivity is a technology that enabled us to implement Experience, Process, and System layer
based APIs
Answer: A
A system API has a guaranteed SLA of 100 ms per request. The system API is deployed to a primary environment as well as to a disaster recovery (DR) environment, with different DNS names in each environment. An upstream process API invokes the system API and the main goal of this process API is to respond to client requests in the least possible time. In what order should the system APIs be invoked, and what changes should be made in order to speed up the response time for requests from the process API?
A . In parallel, invoke the system API deployed to the primary environment and the system API deployed to the DR environment, and ONLY use the first response
B . In parallel, invoke the system API deployed to the primary environment and the system API deployed to the DR environment using a scatter-gather configured with a timeout, and then merge the responses
C . Invoke the system API deployed to the primary environment, and if it fails, invoke the system API deployed to the DR environment
D . Invoke ONLY the system API deployed to the primary environment, and add timeout and retry logic to avoid
intermittent failures
Answer: A
The application network is recomposable: it is built for change because it ‘bends but does not break’
A . TRUE
B . FALSE
Answer: A
A company has created a successful enterprise data model (EDM). The company is committed to building an application network by adopting modern APIs as a core enabler of the company’s IT operating model. At what API tiers (experience, process, system) should the company require reusing the EDM when designing modern API data models?
A . At the experience and process tiers
B . At the experience and system tiers
C . At the process and system tiers
D . At the experience, process, and system tiers
Answer: C
Due to a limitation in the backend system, a system API can only handle up to 500 requests per second. What is the best type of API policy to apply to the system API to avoid overloading the backend system?
A . Rate limiting
B . HTTP caching
C . Rate limiting - SLA based
D . Spike control
Answer: D
A retail company with thousands of stores has an API to receive data about purchases and insert it into a single database. Each individual store sends a batch of purchase data to the API about every 30 minutes. The API implementation uses a database bulk insert command to submit all the purchase data to a database using a
custom JDBC driver provided by a data analytics solution provider. The API implementation is deployed to a single CloudHub worker. The JDBC driver processes the data into a set of several temporary disk files on the CloudHub worker, and then the data is sent to an analytics engine using a proprietary protocol. This process usually takes less than a few minutes. Sometimes a request fails. In this case, the logs show a message from the JDBC driver
indicating an out-of-file-space message. When the request is resubmitted, it is successful. What is the best way to
try to resolve this throughput issue?
A . se a CloudHub autoscaling policy to add CloudHub workers
B . Use a CloudHub autoscaling policy to increase the size of the CloudHub worker
C . Increase the size of the CloudHub worker(s)
D . Increase the number of CloudHub workers
Answer: D
An API implementation returns three X-RateLimit-* HTTP response headers to a requesting API client. What type of information do these response headers indicate to the API client?
A . The error codes that result from throttling
B . A correlation ID that should be sent in the next request
C . The HTTP response size
D . The remaining capacity allowed by the API implementation
Answer: D
An API has been updated in Anypoint exchange by its API producer from version 3.1.1 to 3.2.0 following accepted semantic versioning practices and the changes have been communicated via the APIs public portal. The API endpoint does NOT change in the new version. How should the developer of an API client respond to this change?
A . The API producer should be requested to run the old version in parallel with the new one
B . The API producer should be contacted to understand the change to existing functionality
C . The API client code only needs to be changed if it needs to take advantage of the new features
D . The API clients need to update the code on their side and need to do full regression
Answer: C
A company requires Mule applications deployed to CloudHub to be isolated between non-production and production environments. This is so Mule applications deployed to non-production environments can only access backend systems running in their customer-hosted non-production environment, and so Mule applications deployed to production environments can only access backend systems running in their customer-hosted production environment. How does MuleSoft recommend modifying Mule applications, configuring
environments, or changing infrastructure to support this type of per-environment isolation between Mule applications and backend systems?
A . Modify properties of Mule applications deployed to the production Anypoint Platform environments to prevent access from non-production Mule applications
B . Configure firewall rules in the infrastructure inside each customer-hosted environment so that only IP addresses from the corresponding Anypoint Platform environments are allowed to communicate with corresponding backend systems
C . Create non-production and production environments in different Anypoint Platform business groups
D . Create separate Anypoint VPCs for non-production and production environments, then configure connections to the backend systems in the corresponding customer-hosted environments
Answer: D
An organization wants to make sure only known partners can invoke the organization’s APIs. To achieve this security goal, the organization wants to enforce a Client ID Enforcement policy in API Manager so that only registered partner applications can invoke the organization’s APIs. In what type of API implementation does
MuleSoft recommends adding an API proxy to enforce the Client ID Enforcement policy, rather than embedding the policy directly in the application’s JVM?
A . A Mule 3 application using APIkit
B . A Mule 3 or Mule 4 application modified with custom Java code
C . A Mule 4 application with an API specification
D . A Non-Mule application
Answer: D
A company uses a hybrid Anypoint Platform deployment model that combines the EU control plane with customer-hosted Mule runtimes. After successfully testing a Mule API implementation in the Staging
environment, the Mule API implementation is set with environment-specific properties and must be promoted to the Production environment. What is a way that MuleSoft recommends configuring the Mule API implementation and automating its promotion to the Production environment?
A . Bundle properties files for each environment into the Mule API implementation’s deployable archive, then promote the Mule API implementation to the Production environment using Anypoint CLI or the Anypoint Platform REST APIsB.
B . Modify the Mule API implementation’s properties in the API Manager Properties tab, then promote the Mule API implementation to the Production environment using API Manager
C . Modify the Mule API implementation’s properties in Anypoint Exchange, then promote the Mule API implementation to the Production environment using Runtime Manager
D . Use an API policy to change properties in the Mule API implementation deployed to the Staging environment and another API policy to deploy the Mule API implementation to the Production environment
Answer: A
A system API is deployed to a primary environment as well as to a disaster recovery (DR) environment, with different DNS names in each environment. A process API is a client to the system API and is being rate limited by the system API, with different limits in each of the environments. The system API’s DR environment provides only
20% of the rate limiting offered by the primary environment. What is the best API fault-tolerant invocation strategy to reduce overall errors in the process API, given these conditions and constraints?
A . Invoke the system API deployed to the primary environment; add timeout and retry logic to the process API to avoid intermittent failures; if it still fails, invoke the system API deployed to the DR environment
B . Invoke the system API deployed to the primary environment; add retry logic to the process API to handle intermittent failures by invoking the system API deployed to the DR environment
C . In parallel, invoke the system API deployed to the primary environment and the system API deployed to the DR environment; add timeout and retry logic to the process API to avoid intermittent failures; add logic to the
process API to combine the results
D . Invoke the system API deployed to the primary environment; add timeout and retry logic to the process API to avoid intermittent failures; if it still fails, invoke a copy of the process API deployed to the DR environment
Answer: A
In which layer of API-led connectivity, does the business logic orchestration reside?
A . System Layer
B . Experience Layer
C . Process Layer
Answer: C
Once an API Implementation is ready and the API is registered on API Manager, who should request the access to the API on Anypoint Exchange?
A . None
B . Both
C . API Client
D . API Consumer
Answer: D
Traffic is routed through an API proxy to an API implementation. The API proxy is managed by API Manager and the API implementation is deployed to a CloudHub VPC using Runtime Manager. API policies have been applied to this API. In this deployment scenario, at what point are the API policies enforced on incoming API client requests?
A . At the API proxy
B . At the API implementation
C . At both the API proxy and the API implementation
D . At a MuleSoft-hosted load balancer
Answer: A
An API client calls one method from an existing API implementation. The API implementation is later updated. What change to the API implementation would require the API client’s invocation logic to also be updated?
A . When the data type of the response is changed for the method called by the API client
B . When a new method is added to the resource used by the API client
C . When a new required field is added to the method called by the API client
D . When a child method is added to the method called by the API client
Answer: C
An organization has created an API-led architecture that uses various API layers to integrate mobile clients with a backend system. The backend system consists of a number of specialized components and can be accessed via a REST API. The process and experience APIs share the same bounded-context model that is different from the
backend data model. What additional canonical models, bounded-context models, or anti-corruption layers are best added to this architecture to help process data consumed from the backend system?
A . Create a bounded-context model for every layer and overlap them when the boundary contexts overlap, letting API developers know about the differences between upstream and downstream data models
B . Create a canonical model that combines the backend and API-led models to simplify and unify data models, and minimize data transformations.
C . Create a bounded-context model for the system layer to closely match the backend data model, and add an anti-corruption layer to let the different bounded contexts cooperate across the system and process layers
D . Create an anti-corruption layer for every API to perform transformation for every data model to match each
other, and let data simply travel between APIs to avoid the complexity and overhead of building canonical models
Answer: C
Which of the following sequence is correct?
A . API Client implementes logic to call an API»_space; API Consumer requests access to API»_space; API Implementation routes the request to»_space; API
B . API Consumer requests access to API»_space; API Client implementes logic to call an API»_space; API routes the request to»_space; API Implementation
C . API Consumer implementes logic to call an API»_space; API Client requests access to API»_space; API Implementation routes the request to»_space; API
D . API Client implementes logic to call an API»_space; API Consumer requests access to API»_space; API routes the request to»_space; API Implementation
Answer: B
Which of the below, when used together, makes the IT Operational Model effective?
A . Create reusable assets, Do marketing on the created assets across the organization, and Arrange time to time LOB reviews to ensure assets are being consumed or not
B . Create reusable assets, Make them discoverable so that LOB teams can self-serve and browse the APIs, Get active feedback and usage metrics
C . Create reusable assets, and make them discoverable so that LOB teams can self-serve and browse the APIs
Answer: C
A set of tests must be performed prior to deploying API implementations to a staging environment. Due to data
security and access restrictions, untested APIs cannot be granted access to the backend systems, so instead mocked data must be used for these tests. The amount of available mocked data and its contents is sufficient to entirely test the API implementations with no active connections to the backend systems. What type of tests should be used to incorporate this mocked data?
A . Integration tests
B . Performance tests
C . Functional tests (Blackbox)
D . Unit tests (Whitebox)
Answer: D
A company wants to move its Mule API implementations into production as quickly as possible. To protect access to all Mule application data and metadata, the company requires that all Mule applications be deployed to the company’s customer-hosted infrastructure within the corporate firewall. What combination of runtime plane and control plane options meets these project lifecycle goals?
A . Manually provisioned customer-hosted runtime plane and customer-hosted control plane
B . MuleSoft-hosted runtime plane and customer-hosted control plane
C . Manually provisioned customer-hosted runtime plane and MuleSoft-hosted control plane
D . iPaaS provisioned customer-hosted runtime plane and MuleSoft-hosted control plane
Answer: A
Version 3.0.1 of a REST API implementation represents time values in PST time using ISO 8601 hh:mm:ss format. The API implementation needs to be changed to instead represent time values in CEST time using ISO 8601 hh:mm:ss format. When following the semver.org semantic versioning specification, what version should be
assigned to the updated API implementation?
A . 3.0.2
B . 4.0.0
C . 3.1.0
D . 3.0.1
Answer: B
What is the main change to the IT operating model that MuleSoft recommends to organizations to improve innovation and clock speed?
A . Drive consumption as much as production of assets; this enables developers to discover and reuse assets from other projects and encourages standardization
B . Expose assets using a Master Data Management (MDM) system; this standardizes projects and enables developers to quickly discover and reuse assets from other projects
C . Implement SOA for reusable APIs to focus on production over consumption; this standardizes on XML and WSDL formats to speed up decision making
D . Create a lean and agile organization that makes many small decisions everyday; this speeds up decision making and enables each line of business to take ownership of its projects
Answer: A
An Anypoint Platform organization has been configured with an external identity provider (IdP) for identity management and client management. What credentials or token must be provided to Anypoint CLI to execute commands against the Anypoint Platform APIs?
A . The credentials provided by the IdP for identity management
B . The credentials provided by the IdP for client management
C . An OAuth 2.0 token generated using the credentials provided by the IdP for client management
D . An OAuth 2.0 token generated using the credentials provided by the IdP for identity management
Answer: A
Say, there is a legacy CRM system called CRM-Z which is offering below functions:
1. Customer creation
2. Amend details of an existing customer
3. Retrieve details of a customer
4. Suspend a customer
A . Implement a system API named customerManagement which has all the functionalities wrapped in it as various operations/resources
B . Implement different system APIs named createCustomer, amendCustomer, retrieveCustomer and suspendCustomer as they are modular and has seperation of concerns
C . Implement different system APIs named createCustomerInCRMZ, amendCustomerInCRMZ, retrieveCustomerFromCRMZ and suspendCustomerInCRMZ as they are modular and has seperation of concerns
Answer: B
An organization wants MuleSoft-hosted runtime plane features (such as HTTP load balancing, zero downtime, and horizontal and vertical scaling) in its Azure environment. What runtime plane minimizes the organization’s effort to achieve these features?
A . Anypoint Runtime Fabric
B . Anypoint Platform for Pivotal Cloud Foundry
C . CloudHub
D . A hybrid combination of customer-hosted and MuleSoft-hosted Mule runtimes
Answer: A
A company has started to create an application network and is now planning to implement a Center for Enablement (C4E) organizational model. What key factor would lead the company to decide upon a federated rather than a centralized C4E?
A . When there are a large number of existing common assets shared by development teams
B . When various teams responsible for creating APIs are new to integration and hence need extensive training
C . When development is already organized into several independent initiatives or groups
D . When the majority of the applications in the application network are cloud based
Answer: C
A retail company is using an Order API to accept new orders. The Order API uses a JMS queue to submit orders to a backend order management service. The normal load for orders is being handled using two (2) CloudHub workers, each configured with 0.2 vCore. The CPU load of each CloudHub worker normally runs well below 70%.
However, several times during the year the Order API gets four times (4x) the average number of orders. This causes the CloudHub worker CPU load to exceed 90% and the order submission time to exceed 30 seconds. The cause, however, is NOT the backend order management service, which still responds fast enough to meet the
response SLA for the Order API. What is the MOST resource-efficient way to configure the Mule application’s CloudHub deployment to help the company cope with this performance challenge?
A . Permanently increase the size of each of the two (2) CloudHub workers by at least four times (4x) to one (1) vCore
B . Use a vertical CloudHub autoscaling policy that triggers on CPU utilization greater than 70%
C . Permanently increase the number of CloudHub workers by four times (4x) to eight (8) CloudHub workers
D . Use a horizontal CloudHub autoscaling policy that triggers on CPU utilization greater than 70%
Answer: D
A REST API is being designed to implement a Mule application.
What standard interface definition language can be used to define REST APIs?
A . Web Service Definition Language(WSDL)
B . OpenAPI Specification (OAS)
C . YAML
D . AsyncAPI Specification
Answer: B
What Anypoint Connectors support transactions?
A . Database, JMS, VM
B . Database, 3MS, HTTP
C . Database, JMS, VM, SFTP
D . Database, VM, File
Answer: A
What Mule application can have API policies applied by
Anypoint Platform to the endpoint exposed by that Mule application?
A) A Mule application that accepts requests over HTTP/1.x
B) A Mule application that accepts JSON requests over TCP but is NOT required to provide a response
C) A Mute application that accepts JSON requests over WebSocket
D) A Mule application that accepts gRPC requests over HTTP/2
Answer: A