Discount Offer
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

MuleSoft-Platform-Architect-I Practice Test


Page 1 out of 31 Pages

What best describes the Fully Qualified Domain Names (FQDNs), also known as DNS entries, created when a Mule application is deployed to the CloudHub Shared Worker Cloud?


A. A fixed number of FQDNs are created, IRRESPECTIVE of the environment and VPC design


B. The FQDNs are determined by the application name chosen, IRRESPECTIVE of the region


C. The FQDNs are determined by the application name, but can be modified by an administrator after deployment


D. The FQDNs are determined by both the application name and the Anypoint Platform organization





B.
  The FQDNs are determined by the application name chosen, IRRESPECTIVE of the region

Explanation

Correct Answer: The FQDNs are determined by the application name chosen, IRRESPECTIVE of the region

*****************************************

 When deploying applications to Shared Worker Cloud, the FQDN are always determined by application name chosen.

It does NOT matter what region the app is being deployed to.

Although it is fact and true that the generated FQDN will have the region included in it (Ex: exp-salesorder-api.au-s1.cloudhub.io), it does NOT mean that the same name can be used when deploying to another CloudHub region.

Application name should be universally unique irrespective of Region and Organization and solely determines the FQDN for Shared Load Balancers.

Which of the following best fits the definition of API-led connectivity?


A. API-led connectivity is not just an architecture or technology but also a way to organize people and processes for efficient IT delivery in the organization


B. API-led connectivity is a 3-layered architecture covering Experience, Process and System layers


C. API-led connectivity is a technology which enabled us to implement Experience, Process and System layer based APIs





A.
  API-led connectivity is not just an architecture or technology but also a way to organize people and processes for efficient IT delivery in the organization

Explanation

Correct Answer: API-led connectivity is not just an architecture or technology but also a way to organize people and processes for efficient IT delivery in the organization.

*****************************************

Reference: [Reference: https://blogs.mulesoft.com/dev/api-dev/what-is-api-led-connectivity/, , ]

What is a key requirement when using an external Identity Provider for Client Management in Anypoint Platform?


A. Single sign-on is required to sign in to Anypoint Platform


B. The application network must include System APIs that interact with the Identity Provider


C. To invoke OAuth 2.0-protected APIs managed by Anypoint Platform, API clients must submit access tokens issued by that same Identity Provider


D. APIs managed by Anypoint Platform must be protected by SAML 2.0 policies





C.
  To invoke OAuth 2.0-protected APIs managed by Anypoint Platform, API clients must submit access tokens issued by that same Identity Provider

Explanation:

https://www.folkstalk.com/2019/11/mulesoft-integration-and-platform.html

Explanation

Correct Answer: To invoke OAuth 2.0-protected APIs managed by Anypoint Platform, API clients must submit access tokens issued by that same Identity Provider

*****************************************

It is NOT necessary that single sign-on is required to sign in to Anypoint Platform because we are using an external Identity Provider for Client Management

It is NOT necessary that all APIs managed by Anypoint Platform must be protected by SAML 2.0 policies because we are using an external Identity Provider for Client Management

Not TRUE that the application network must include System APIs that interact with the Identity Provider because we are using an external Identity Provider for Client Management

Only TRUE statement in the given options is - "To invoke OAuth 2.0-protected APIs managed by Anypoint Platform, API clients must submit access tokens issued by that same Identity Provider"

References:

https://docs.mulesoft.com/api-manager/2.x/external-oauth-2.0-token-validation-policy

https://blogs.mulesoft.com/dev/api-dev/api-security-ways-to-authenticate-and-authorize/

How are an API implementation, API client, and API consumer combined to invoke and process an API?


A. The API consumer creates an API implementation, which receives API invocations from an API such that they are processed for an API client


B. The API client creates an API consumer, which receives API invocations from an API such that they are processed for an API implementation


C. The ApI consumer creates an API client, which sends API invocations to an API such that they are processed by an API implementation


D. The ApI client creates an API consumer, which sends API invocations to an API such that they are processed by an API implementation





C.
  The ApI consumer creates an API client, which sends API invocations to an API such that they are processed by an API implementation

Explanation

Correct Answer: The API consumer creates an API client, which sends API invocations to an API such that they are processed by an API implementation

*****************************************

Terminology:

API Client - It is a piece of code or program the is written to invoke an API

API Consumer - An owner/entity who owns the API Client. API Consumers write API clients.

API - The provider of the API functionality. Typically an API Instance on API Manager where they are managed and operated.

API Implementation - The actual piece of code written by API provider where the functionality of the API is implemented. Typically, these are Mule Applications running on Runtime Manager.

A System API is designed to retrieve data from a backend system that has scalability challenges. What API policy can best safeguard the backend system?


A. IPwhitelist


B. SLA-based rate limiting


C. Auth 2 token enforcement


D. Client ID enforcement





B.
  SLA-based rate limiting

Explanation

Correct Answer: SLA-based rate limiting

*****************************************

Client Id enforement policy is a "Compliance" related NFR and does not help in maintaining the "Quality of Service (QoS)". It CANNOT and NOT meant for protecting the backend systems from scalability challenges.

IP Whitelisting and OAuth 2.0 token enforcement are "Security" related NFRs and again does not help in maintaining the "Quality of Service (QoS)". They CANNOT and are NOT meant for protecting the backend systems from scalability challenges.

Rate Limiting, Rate Limiting-SLA, Throttling, Spike Control are the policies that are "Quality of Service (QOS)" related NFRs and are meant to help in protecting the backend systems from getting overloaded.

https://dzone.com/articles/how-to-secure-apis


Page 1 out of 31 Pages