MuleSoft Certified Platform Architect - Level 1 MAINTENANCE MuleSoft Certified Platform Architect - Level 1 MAINTENANCE Exam Questions in PDF

Free MuleSoft MuleSoft Certified Platform Architect - Level 1 MAINTENANCE Dumps Questions (page: 1)

Refer to the exhibit.



what is true when using customer-hosted Mule runtimes with the MuleSoft-hosted Anypoint Platform control plane (hybrid deployment)?

  1. Anypoint Runtime Manager initiates a network connection to a Mule runtime in order to deploy Mule applications
  2. The MuleSoft-hosted Shared Load Balancer can be used to load balance API invocations to the Mule runtimes
  3. API implementations can run successfully in customer-hosted Mule runtimes, even when they are unable to communicate with the control plane
  4. Anypoint Runtime Manager automatically ensures HA in the control plane by creating a new Mule runtime instance in case of a node failure

Answer(s): C

Explanation:

Correct Answer: API implementations can run successfully in customer-hosted Mule runtimes, even when they are unable to communicate with the control plane.
*****************************************
>> We CANNOT use Shared Load balancer to load balance APIs on customer hosted runtimes



>> For Hybrid deployment models, the on-premises are first connected to Runtime Manager using Runtime Manager agent. So, the connection is initiated first from On-premises to Runtime Manager. Then all control can be done from Runtime Manager. >> Anypoint Runtime Manager CANNOT ensure automatic HA. Clusters/Server Groups etc should be configured before hand.

Only TRUE statement in the given choices is, API implementations can run successfully in customer- hosted Mule runtimes, even when they are unable to communicate with the control plane. There are several references below to justify this statement.


Reference:

https://docs.mulesoft.com/runtime-manager/deployment-strategies#hybrid-deployments https://help.mulesoft.com/s/article/On-Premise-Runtimes-Disconnected-From-US-Control-Plane- June-18th-2018
https://help.mulesoft.com/s/article/Runtime-Manager-cannot-manage-On-Prem-Applications-and- Servers-from-US-Control-Plane-June-25th-2019
https://help.mulesoft.com/s/article/On-premise-Runtimes-Appear-Disconnected-in-Runtime- Manager-May-29th-2018



============================



============================



A System API is designed to retrieve data from a backend system that has scalability challenges.
What API policy can best safeguard the backend system?

  1. IPwhitelist
  2. SLA-based rate limiting
  3. Auth 2 token enforcement
  4. Client ID enforcement

Answer(s): B

Explanation:

Correct Answer: SLA-based rate limiting
*****************************************
>> Client Id enforement policy is a "Compliance" related NFR and does not help in maintaining the "Quality of Service (QoS)". It CANNOT and NOT meant for protecting the backend systems from scalability challenges.
>> IP Whitelisting and OAuth 2.0 token enforcement are "Security" related NFRs and again does not help in maintaining the "Quality of Service (QoS)". They CANNOT and are NOT meant for protecting the backend systems from scalability challenges.
Rate Limiting, Rate Limiting-SLA, Throttling, Spike Control are the policies that are "Quality of Service (QOS)" related NFRs and are meant to help in protecting the backend systems from getting overloaded.
https://dzone.com/articles/how-to-secure-apis



Refer to the exhibit.



What is a valid API in the sense of API-led connectivity and application networks?

  1. Java RMI over TCP

  2. Java RMI over TCP

  3. CORBA over HOP

  4. XML over UDP

Answer(s): D

Explanation:

Correct Answer: XML over HTTP
*****************************************
>> API-led connectivity and Application Networks urge to have the APIs on HTTP based protocols for building most effective APIs and networks on top of them.

>> The HTTP based APIs allow the platform to apply various varities of policies to address many NFRs >> The HTTP based APIs also allow to implement many standard and effective implementation patterns that adhere to HTTP based w3c rules.



Bottom of Form
Top of Form



Refer to the exhibit.



Three business processes need to be implemented, and the implementations need to communicate with several different SaaS applications.

These processes are owned by separate (siloed) LOBs and are mainly independent of each other, but do share a few business entities. Each LOB has one development team and their own budget In this organizational context, what is the most effective approach to choose the API data models for the APIs that will implement these business processes with minimal redundancy of the data models?

  1. Build several Bounded Context Data Models that align with coherent parts of the business processes and the definitions of associated business entities

  2. Build distinct data models for each API to follow established micro-services and Agile API-centric practices

  3. Build all API data models using XML schema to drive consistency and reuse across the organization

  4. Build one centralized Canonical Data Model (Enterprise Data Model) that unifies all the data types from all three business processes, ensuring the data model is consistent and non-redundant

Answer(s): A

Explanation:

Correct Answer: Build several Bounded Context Data Models that align with coherent parts of the business processes and the definitions of associated business entities.
*****************************************
>> The options w.r.t building API data models using XML schema/ Agile API-centric practices are irrelevant to the scenario given in the question. So these two are INVALID. >> Building EDM (Enterprise Data Model) is not feasible or right fit for this scenario as the teams and LOBs work in silo and they all have different initiatives, budget etc.. Building EDM needs intensive coordination among all the team which evidently seems not possible in this scenario. So, the right fit for this scenario is to build several Bounded Context Data Models that align with coherent parts of the business processes and the definitions of associated business entities.



What best describes the Fully Qualified Domain Names (FQDNs), also known as DNS entries, created when a Mule application is deployed to the CloudHub Shared Worker Cloud?

  1. A fixed number of FQDNs are created, IRRESPECTIVE of the environment and VPC design
  2. The FQDNs are determined by the application name chosen, IRRESPECTIVE of the region
  3. The FQDNs are determined by the application name, but can be modified by an administrator after deployment
  4. The FQDNs are determined by both the application name and the Anypoint Platform organization

Answer(s): B

Explanation:

Correct Answer: The FQDNs are determined by the application name chosen, IRRESPECTIVE of the region:
*****************************************
>> When deploying applications to Shared Worker Cloud, the FQDN are always determined by application name chosen.
>> It does NOT matter what region the app is being deployed to. >> Although it is fact and true that the generated FQDN will have the region included in it (Ex: exp- salesorder-api.au-s1.cloudhub.io), it does NOT mean that the same name can be used when deploying to another CloudHub region.
>> Application name should be universally unique irrespective of Region and Organization and solely determines the FQDN for Shared Load Balancers.



Viewing page 1 of 17

Share your comments for MuleSoft MuleSoft Certified Platform Architect - Level 1 MAINTENANCE exam with other users:

L
Limbo
10/9/2023 3:08:00 AM

this is way too informative

T
Tejasree
8/26/2023 1:46:00 AM

very helpfull

Y
Yolostar Again
10/12/2023 3:02:00 PM

q.189 - answers are incorrect.

S
Shikha Bakra
9/10/2023 5:16:00 PM

awesome job in getting these questions

K
Kevin
10/20/2023 2:01:00 AM

i cant find aws certified practitioner clf-c01 exam in aws website but i found aws certified practitioner clf-c02 exam. can everyone please verify the difference between the two clf-c01 and clf-c02? thank you

D
D Mario
6/19/2023 10:38:00 PM

grazie mille. i got a satisfactory mark in my exam test today because of this exam dumps. sorry for my english.

B
Bharat Kumar Saraf
10/31/2023 4:36:00 AM

some of the answers are incorrect. need to be reviewed.

J
JP
7/13/2023 12:21:00 PM

so far so good

K
Kiky V
8/8/2023 6:32:00 PM

i am really liking it

T
trying
7/28/2023 12:37:00 PM

thanks good stuff

E
exampei
10/4/2023 2:40:00 PM

need dump c_tadm_23

E
Eman Sawalha
6/10/2023 6:18:00 AM

next time i will write a full review

J
johnpaul
11/15/2023 7:55:00 AM

first time using this site

O
omiornil@gmail.com
7/25/2023 9:36:00 AM

please sent me oracle 1z0-1105-22 pdf

J
John
8/29/2023 8:59:00 PM

very helpful

K
Kvana
9/28/2023 12:08:00 PM

good info about oml

C
Checo Lee
7/3/2023 5:45:00 PM

very useful to practice

D
dixitdnoh@gmail.com
8/27/2023 2:58:00 PM

this website is very helpful.

S
Sanjay
8/14/2023 8:07:00 AM

good content

B
Blessious Phiri
8/12/2023 2:19:00 PM

so challenging

P
PAYAL
10/17/2023 7:14:00 AM

17 should be d ,for morequery its scale out

K
Karthik
10/12/2023 10:51:00 AM

nice question

G
Godmode
5/7/2023 10:52:00 AM

yes.

B
Bhuddhiman
7/30/2023 1:18:00 AM

good mateial

K
KJ
11/17/2023 3:50:00 PM

good practice exam

S
sowm
10/29/2023 2:44:00 PM

impressivre qustion

C
CW
7/6/2023 7:06:00 PM

questions seem helpful

L
luke
9/26/2023 10:52:00 AM

good content

Z
zazza
6/16/2023 9:08:00 AM

question 21 answer is alerts

A
Abwoch Peter
7/4/2023 3:08:00 AM

am preparing for exam

M
mohamed
9/12/2023 5:26:00 AM

good one thanks

M
Mfc
10/23/2023 3:35:00 PM

only got thru 5 questions, need more to evaluate

W
Whizzle
7/24/2023 6:19:00 AM

q26 should be b

S
sarra
1/17/2024 3:44:00 AM

the aaa triad in information security is authentication, accounting and authorisation so the answer should be d 1, 3 and 5.

AI Tutor 👋 I’m here to help!