Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

MuleSoft-Integration-Architect-I Practice Test


Page 6 out of 54 Pages

A platform architect includes both an API gateway and a service mesh in the architect of a distributed application for communication management. Which type of communication management does a service mesh typically perform in this architecture?


A. Between application services and the firewall


B. Between the application and external API clients


C. Between services within the application


D. Between the application and external API implementations.





C.
  Between services within the application

Explanation:

In a distributed application architecture, a service mesh typically manages communication between services within the application. A service mesh provides a dedicated infrastructure layer that handles service-to-service communication, including service discovery, load balancing, failure recovery, metrics, and monitoring. This allows developers to offload these operational concerns from individual services, ensuring consistent and reliable inter-service communication.

References:

Understanding Service Mesh

Service Mesh for Microservices

According to MuleSoft's API development best practices, which type of API development approach starts with writing and approving an API contract?


A. Implement-first


B. Catalyst


C. Agile


D. Design-first





D.
  Design-first

Explanation:

MuleSoft's API development best practices emphasize a design-first approach, which starts with writing and approving an API contract before any implementation begins. This approach ensures that the API's interface is agreed upon and understood by all stakeholders before the backend is built. It involves creating an API specification using tools like RAML or OpenAPI, which serves as a blueprint for development. This method promotes better planning, communication, and alignment between different teams and stakeholders, leading to more efficient and predictable API development processes.

References:

API Design Best Practices

MuleSoft's Approach to API Development

An organization is evaluating using the CloudHub shared Load Balancer (SLB) vs creating a CloudHub dedicated load balancer (DLB). They are evaluating how this choice affects the various types of certificates used by CloudHub deplpoyed Mule applications, including MuleSoft-provided, customer-provided, or Mule application-provided certificates. What type of restrictions exist on the types of certificates that can be exposed by the CloudHub Shared Load Balancer (SLB) to external web clients over the public internet?


A. Only MuleSoft-provided certificates are exposed.


B. Only customer-provided wildcard certificates are exposed.


C. Only customer-provided self-signed certificates are exposed.


D. Only underlying Mule application certificates are exposed (pass-through)





A.
  Only MuleSoft-provided certificates are exposed.

Explanation:

https://docs.mulesoft.com/runtime-manager/dedicated-load-balancer-tutorial

An organization plans to migrate all its Mule applications to Runtime Fabric (RTF). Currently, all Mule applications have been deployed to CloudHub using automated CI/CD scripts. What steps should be taken to properly migrate the applications from CloudHub to RTF, while keeping the same automated CI/CD deployment strategy?


A. A runtimefabric dependency should be added as a mule-plugin to the pom.xml file in all the Mule applications.


B. runtimeFabric command-line parameter should be added to the CI/CD deployment scripts.


C. A runtimefFabricDeployment profile should be added to Mule configuration properties YAML files in all the Mule applications. CI/CD scripts must be modified to use the new configuration properties.


D. runtimefabricDeployment profile should be added to the pom.xml file in all the Mule applications. CI/CD scripts must be modified to use the new RTF profile.


E. - The pom.xml and Mule configuration YAML files can remain unchanged in each Mule application. A --runtimeFabric command-line parameter should be added to the CI/CD deployment scripts





D.
  runtimefabricDeployment profile should be added to the pom.xml file in all the Mule applications. CI/CD scripts must be modified to use the new RTF profile.

Explanation:

To migrate Mule applications from CloudHub to Runtime Fabric (RTF) while maintaining the same automated CI/CD deployment strategy, follow these steps:

Add runtimefabricDeployment Profile: Add a runtimefabricDeployment profile to the pom.xml file in all Mule applications. This profile will include the necessary configurations specific to RTF deployments.

Modify CI/CD Scripts: Update the CI/CD deployment scripts to use the new runtimefabricDeployment profile. This modification ensures that the deployment process will correctly reference the RTF-specific configurations when deploying applications.

Keep Configuration Files Unchanged: There is no need to change the pom.xml and Mule configuration YAML files other than adding the runtimefabricDeployment profile. This maintains consistency and reduces the risk of errors during the migration.

This approach ensures a smooth transition to RTF while leveraging existing CI/CD scripts with minimal changes, maintaining the automated deployment strategy.

References

MuleSoft Documentation on Runtime Fabric Deployment

Best Practices for CI/CD with MuleSoft

An organization is using Mulesoft cloudhub and develops API's in the latest version. As a part of requirements for one of the API's, third party API needs to be called. The security team has made it clear that calling any external API needs to have include listing As an integration architect please suggest the best way to accomplish the design plan to support these requirements?


A. Implement includelist IP on the cloudhub VPC firewall to allow the traffic


B. Implement the validation of includelisted IP operation


C. Implement the Any point filter processor to implement the include list IP


D. Implement a proxy for the third party API and enforce the IPinclude list policy and call this proxy from the flow of the API





D.
  Implement a proxy for the third party API and enforce the IPinclude list policy and call this proxy from the flow of the API

Explanation:

Requirement Analysis: The security team requires any external API call to be restricted by an IP include list. This ensures that only specified IP addresses can access the third-party API. Design Plan: To fulfill this requirement, implementing a proxy for the third-party API is the best approach. This proxy can enforce the IP include list policy.

Implementation Steps:

Advantages:

References

MuleSoft Documentation on API Proxies

MuleSoft Documentation on IP Whitelist Policy


Page 6 out of 54 Pages
Previous