Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

MuleSoft-Integration-Architect-I Exam Dumps - Salesforce Certified MuleSoft Platform Integration Architect (Mule-Arch-202)

Searching for workable clues to ace the Salesforce MuleSoft-Integration-Architect-I Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s MuleSoft-Integration-Architect-I PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 25

An integration Mute application is being designed to process orders by submitting them to a backend system for offline processing. Each order will be received by the Mute application through an HTTPS POST and must be acknowledged immediately. Once acknowledged, the order will be submitted to a backend system. Orders that cannot be successfully submitted due to rejections from the backend system will need to be processed manually (outside the backend system).

The Mule application will be deployed to a customer-hosted runtime and is able to use an existing ActiveMQ broker if needed.

The backend system has a track record of unreliability both due to minor network connectivity issues and longer outages.

What idiomatic (used for their intended purposes) combination of Mule application components and ActiveMQ queues are required to ensure automatic submission of orders to the backend system, while minimizing manual order processing?

A.

An On Error scope Non-persistent VM ActiveMQ Dead Letter Queue for manual processing

B.

An On Error scope MuleSoft Object Store ActiveMQ Dead Letter Queue for manual processing

C.

Until Successful component MuleSoft Object Store ActiveMQ is NOT needed or used

D.

Until Successful component ActiveMQ long retry Queue ActiveMQ Dead Letter Queue for manual processing

Full Access
Question # 26

Which Mulesoft feature helps users to delegate their access without sharing sensitive credentials or giving full control of accounts to 3rd parties?

A.

Secure Scheme

B.

client id enforcement policy

C.

Connected apps

D.

Certificates

Full Access
Question # 27

An airline is architecting an API connectivity project to integrate its flight data into an online aggregation website. The interface must allow for secure communication high-performance and asynchronous message exchange.

What are suitable interface technologies for this integration assuming that Mulesoft fully supports these technologies and that Anypoint connectors exist for these interfaces?

A.

AsyncAPI over HTTPSAMQP with RabbitMQ JSON/REST over HTTPS

B.

XML over ActiveMQ XML over SFTP XML/REST over HTTPS

C.

CSV over FTP YAM L over TLS JSON over HTTPS

D.

SOAP over HTTPS HOP over TLS gRPC over HTTPS

Full Access
Question # 28

Mule application is deployed to Customer Hosted Runtime. Asynchronous logging was implemented to improved throughput of the system. But it was observed over the period of time that few of the important exception log messages which were used to rollback transactions are not working as expected causing huge loss to the Organization. Organization wants to avoid these losses. Application also has constraints due to which they cant compromise on throughput much. What is the possible option in this case?

A.

Logging needs to be changed from asynchronous to synchronous

B.

External log appender needs to be used in this case

C.

Persistent memory storage should be used in such scenarios

D.

Mixed configuration of asynchronous or synchronous loggers should be used to log exceptions via synchronous way

Full Access
Question # 29

A retail company is implementing a MuleSoft API to get inventory details from two vendors by Invoking each vendor's online applications. Due to network issues, the invocations to the vendor applications are timing out intermittently, but the requests are successful after re-invoking each

vendor application.

What is the most performant way of implementing the API to invoke each vendor application and to retry invocations that generate timeout errors?

A.

Use a For-Each scope to invoke the two vendor applications in series, one after the other.Place the For-Each scope inside an Until-Successful scope to retry requests that raise timeout errors.

B.

Use a Choice scope to Invoke each vendor application on a separate route.Place the Choice scope inside an Until-Successful scope to retry requests that raisetimeout errors.

C.

Use a Scatter-Gather scope to invoke each vendor application on a separate route.Use an Until-Successful scope in each route to retry requests that raise timeout errors.

D.

Use a Round-Robin scope to invoke each vendor application on a separate route.Use a Try-Catch scope in each route to retry requests that raise timeout errors.

Full Access
Question # 30

An organization plans to use the Anypoint Platform audit logging service to log Anypoint MQ actions.

What consideration must be kept in mind when leveraging Anypoint MQ Audit Logs?

A.

Anypoint MQ Audit Logs include logs for sending, receiving, or browsing messages

B.

Anypoint MQ Audit Logs include fogs for failed Anypoint MQ operations

C.

Anypoint MQ Audit Logs include logs for queue create, delete, modify, and purge operations

Full Access
Question # 31

An organization has an HTTPS-enabled Mule application named Orders API that receives requests from another Mule application named Process Orders.

The communication between these two Mule applications must be secured by TLS mutual authentication (two-way TLS).

At a minimum, what must be stored in each truststore and keystore of these two Mule applications to properly support two-way TLS between the two Mule applications while properly protecting each Mule application's keys?

A.

Orders API truststore: The Orders API public keyProcess Orders keystore: The Process Orders private key and public key

B.

Orders API truststore: The Orders API private key and public keyProcess Orders keystore: The Process Orders private key public key

C.

Orders API truststore: The Process Orders public keyOrders API keystore: The Orders API private key and public keyProcess Orders truststore: The Orders API public keyProcess Orders keystore: The Process Orders private key and public key

D.

Orders API truststore: The Process Orders public keyOrders API keystore: The Orders API private keyProcess Orders truststore: The Orders API public keyProcess Orders keystore: The Process Orders private key

Full Access
Question # 32

During a planning session with the executive leadership, the development team director presents plans for a new API to expose the data in the company’s order database. An earlier effort to build an API on top of this data failed, so the director is recommending a design-first approach.

Which characteristics of a design-first approach will help make this API successful?

A.

Building MUnit tests so administrators can confirm code coverage percentage during deployment

B.

Publishing the fully implemented API to Exchange so all developers can reuse the API

C.

Adding global policies to the API so all developers automatically secure the implementation before coding anything

D.

Developing a specification so consumers can test before the implementation is built

Full Access
Go to page: