MuleSoft Certified Platform Architect - Level 1 Flashcards
(95 cards)
True or False. We should always make sure that the APIs being designed and developed are self-servable even if it needs more man-day effort and resources.
A. FALSE
B. TRUE
Answer: B
Explanation:
Correct Answer: TRUE
*********
» As per MuleSoft proposed IT Operating Model, designing APIs and making sure that they are discoverable and
self-servable is VERY VERY IMPORTANT and decides the success of an API and its application network.
What are 4 important Platform Capabilities offered by Anypoint Platform?
A . API Versioning, API Runtime Execution and Hosting, API Invocation, API Consumer Engagement
B . API Design and Development, API Runtime Execution and Hosting, API Versioning, API Deprecation
C . API Design and Development, API Runtime Execution and Hosting, API Operations and Management, API
Consumer Engagement
D . API Design and Development, API Deprecation, API Versioning, API Consumer Engagement
Answer: C
Explanation:
Correct Answer: API Design and Development, API Runtime Execution and Hosting, API Operations and
Management, API Consumer Engagement
*********
» API Design and Development - Anypoint Studio, Anypoint Design Center, Anypoint Connectors
» API Runtime Execution and Hosting - Mule Runtimes, CloudHub, Runtime Services
» API Operations and Management - Anypoint API Manager, Anypoint Exchange
» API Consumer Management - API Contracts, Public Portals, Anypoint Exchange, API Notebooks
What Anypoint Platform Capabilities listed below fall under APIs and API Invocations/Consumers category?
Select TWO
A . API Operations and Management
B . API Runtime Execution and Hosting
C . API Consumer Engagement
D . API Design and Development
Answer: B, D
Select the correct Owner-Layer combinations from below options
A .
1. App Developers owns and focuses on Experience Layer APIs
2. Central IT owns and focuses on Process Layer APIs
3. LOB IT owns and focuses on System Layer APIs
B .
1. Central IT owns and focuses on Experience Layer APIs
2. LOB IT owns and focuses on Process Layer APIs
3. App Developers owns and focuses on System Layer APIs
C .
1. App Developers owns and focuses on Experience Layer APIs
2. LOB IT owns and focuses on Process Layer APIs
3. Central IT owns and focuses on System Layer APIs
Answer: C
Which layer in the API-led connectivity focuses on unlocking key systems, legacy systems, data sources etc and exposes the functionality?
A . Experience Layer
B . Process Layer
C . System Layer
C
A Mule application exposes an HTTPS endpoint and is deployed to three CloudHub workers that do not use static IP addresses. The Mule application expects a high volume of client requests in short time periods. What is the most cost-effective infrastructure component that should be used to serve the high volume of client requests?
A . A customer-hosted load balancer
B . The CloudHub shared load balancer
C . An API proxy
D . Runtime Manager autoscaling
Answer: B
What are the major benefits of MuleSoft proposed IT Operating Model?
A .
1. Decrease the IT delivery gap
2. Meet various business demands without increasing the IT capacity
3. Focus on creation of reusable assets first. Upon finishing creation of all the possible assets then inform the LOBs
in the organization to start using them
B .
1. Decrease the IT delivery gap
2. Meet various business demands by increasing the IT capacity and forming various IT departments
3. Make consumption of assets at the rate of production
C .
1. Decrease the IT delivery gap
2. Meet various business demands without increasing the IT capacity
3. Make consumption of assets at the rate of production
Answer: C
Which of the following best fits the definition of API-led connectivity?
A . API-led connectivity is not just an architecture or technology but also a way to organize people and processes for efficient IT delivery in the organization
B . API-led connectivity is a 3-layered architecture covering Experience, Process, and System layers
C . API-led connectivity is a technology that enabled us to implement Experience, Process, and System layer
based APIs
Answer: A
A system API has a guaranteed SLA of 100 ms per request. The system API is deployed to a primary environment as well as to a disaster recovery (DR) environment, with different DNS names in each environment. An upstream process API invokes the system API and the main goal of this process API is to respond to client requests in the least possible time. In what order should the system APIs be invoked, and what changes should be made in order to speed up the response time for requests from the process API?
A . In parallel, invoke the system API deployed to the primary environment and the system API deployed to the DR environment, and ONLY use the first response
B . In parallel, invoke the system API deployed to the primary environment and the system API deployed to the DR environment using a scatter-gather configured with a timeout, and then merge the responses
C . Invoke the system API deployed to the primary environment, and if it fails, invoke the system API deployed to the DR environment
D . Invoke ONLY the system API deployed to the primary environment, and add timeout and retry logic to avoid
intermittent failures
Answer: A
The application network is recomposable: it is built for change because it ‘bends but does not break’
A . TRUE
B . FALSE
Answer: A
A company has created a successful enterprise data model (EDM). The company is committed to building an application network by adopting modern APIs as a core enabler of the company’s IT operating model. At what API tiers (experience, process, system) should the company require reusing the EDM when designing modern API data models?
A . At the experience and process tiers
B . At the experience and system tiers
C . At the process and system tiers
D . At the experience, process, and system tiers
Answer: C
Due to a limitation in the backend system, a system API can only handle up to 500 requests per second. What is the best type of API policy to apply to the system API to avoid overloading the backend system?
A . Rate limiting
B . HTTP caching
C . Rate limiting - SLA based
D . Spike control
Answer: D
A retail company with thousands of stores has an API to receive data about purchases and insert it into a single database. Each individual store sends a batch of purchase data to the API about every 30 minutes. The API implementation uses a database bulk insert command to submit all the purchase data to a database using a
custom JDBC driver provided by a data analytics solution provider. The API implementation is deployed to a single CloudHub worker. The JDBC driver processes the data into a set of several temporary disk files on the CloudHub worker, and then the data is sent to an analytics engine using a proprietary protocol. This process usually takes less than a few minutes. Sometimes a request fails. In this case, the logs show a message from the JDBC driver
indicating an out-of-file-space message. When the request is resubmitted, it is successful. What is the best way to
try to resolve this throughput issue?
A . se a CloudHub autoscaling policy to add CloudHub workers
B . Use a CloudHub autoscaling policy to increase the size of the CloudHub worker
C . Increase the size of the CloudHub worker(s)
D . Increase the number of CloudHub workers
Answer: D
An API implementation returns three X-RateLimit-* HTTP response headers to a requesting API client. What type of information do these response headers indicate to the API client?
A . The error codes that result from throttling
B . A correlation ID that should be sent in the next request
C . The HTTP response size
D . The remaining capacity allowed by the API implementation
Answer: D
An API has been updated in Anypoint exchange by its API producer from version 3.1.1 to 3.2.0 following accepted semantic versioning practices and the changes have been communicated via the APIs public portal. The API endpoint does NOT change in the new version. How should the developer of an API client respond to this change?
A . The API producer should be requested to run the old version in parallel with the new one
B . The API producer should be contacted to understand the change to existing functionality
C . The API client code only needs to be changed if it needs to take advantage of the new features
D . The API clients need to update the code on their side and need to do full regression
Answer: C
A company requires Mule applications deployed to CloudHub to be isolated between non-production and production environments. This is so Mule applications deployed to non-production environments can only access backend systems running in their customer-hosted non-production environment, and so Mule applications deployed to production environments can only access backend systems running in their customer-hosted production environment. How does MuleSoft recommend modifying Mule applications, configuring
environments, or changing infrastructure to support this type of per-environment isolation between Mule applications and backend systems?
A . Modify properties of Mule applications deployed to the production Anypoint Platform environments to prevent access from non-production Mule applications
B . Configure firewall rules in the infrastructure inside each customer-hosted environment so that only IP addresses from the corresponding Anypoint Platform environments are allowed to communicate with corresponding backend systems
C . Create non-production and production environments in different Anypoint Platform business groups
D . Create separate Anypoint VPCs for non-production and production environments, then configure connections to the backend systems in the corresponding customer-hosted environments
Answer: D
An organization wants to make sure only known partners can invoke the organization’s APIs. To achieve this security goal, the organization wants to enforce a Client ID Enforcement policy in API Manager so that only registered partner applications can invoke the organization’s APIs. In what type of API implementation does
MuleSoft recommends adding an API proxy to enforce the Client ID Enforcement policy, rather than embedding the policy directly in the application’s JVM?
A . A Mule 3 application using APIkit
B . A Mule 3 or Mule 4 application modified with custom Java code
C . A Mule 4 application with an API specification
D . A Non-Mule application
Answer: D
A company uses a hybrid Anypoint Platform deployment model that combines the EU control plane with customer-hosted Mule runtimes. After successfully testing a Mule API implementation in the Staging
environment, the Mule API implementation is set with environment-specific properties and must be promoted to the Production environment. What is a way that MuleSoft recommends configuring the Mule API implementation and automating its promotion to the Production environment?
A . Bundle properties files for each environment into the Mule API implementation’s deployable archive, then promote the Mule API implementation to the Production environment using Anypoint CLI or the Anypoint Platform REST APIsB.
B . Modify the Mule API implementation’s properties in the API Manager Properties tab, then promote the Mule API implementation to the Production environment using API Manager
C . Modify the Mule API implementation’s properties in Anypoint Exchange, then promote the Mule API implementation to the Production environment using Runtime Manager
D . Use an API policy to change properties in the Mule API implementation deployed to the Staging environment and another API policy to deploy the Mule API implementation to the Production environment
Answer: A
A system API is deployed to a primary environment as well as to a disaster recovery (DR) environment, with different DNS names in each environment. A process API is a client to the system API and is being rate limited by the system API, with different limits in each of the environments. The system API’s DR environment provides only
20% of the rate limiting offered by the primary environment. What is the best API fault-tolerant invocation strategy to reduce overall errors in the process API, given these conditions and constraints?
A . Invoke the system API deployed to the primary environment; add timeout and retry logic to the process API to avoid intermittent failures; if it still fails, invoke the system API deployed to the DR environment
B . Invoke the system API deployed to the primary environment; add retry logic to the process API to handle intermittent failures by invoking the system API deployed to the DR environment
C . In parallel, invoke the system API deployed to the primary environment and the system API deployed to the DR environment; add timeout and retry logic to the process API to avoid intermittent failures; add logic to the
process API to combine the results
D . Invoke the system API deployed to the primary environment; add timeout and retry logic to the process API to avoid intermittent failures; if it still fails, invoke a copy of the process API deployed to the DR environment
Answer: A
In which layer of API-led connectivity, does the business logic orchestration reside?
A . System Layer
B . Experience Layer
C . Process Layer
Answer: C
Once an API Implementation is ready and the API is registered on API Manager, who should request the access to the API on Anypoint Exchange?
A . None
B . Both
C . API Client
D . API Consumer
Answer: D
Traffic is routed through an API proxy to an API implementation. The API proxy is managed by API Manager and the API implementation is deployed to a CloudHub VPC using Runtime Manager. API policies have been applied to this API. In this deployment scenario, at what point are the API policies enforced on incoming API client requests?
A . At the API proxy
B . At the API implementation
C . At both the API proxy and the API implementation
D . At a MuleSoft-hosted load balancer
Answer: A
An API client calls one method from an existing API implementation. The API implementation is later updated. What change to the API implementation would require the API client’s invocation logic to also be updated?
A . When the data type of the response is changed for the method called by the API client
B . When a new method is added to the resource used by the API client
C . When a new required field is added to the method called by the API client
D . When a child method is added to the method called by the API client
Answer: C
An organization has created an API-led architecture that uses various API layers to integrate mobile clients with a backend system. The backend system consists of a number of specialized components and can be accessed via a REST API. The process and experience APIs share the same bounded-context model that is different from the
backend data model. What additional canonical models, bounded-context models, or anti-corruption layers are best added to this architecture to help process data consumed from the backend system?
A . Create a bounded-context model for every layer and overlap them when the boundary contexts overlap, letting API developers know about the differences between upstream and downstream data models
B . Create a canonical model that combines the backend and API-led models to simplify and unify data models, and minimize data transformations.
C . Create a bounded-context model for the system layer to closely match the backend data model, and add an anti-corruption layer to let the different bounded contexts cooperate across the system and process layers
D . Create an anti-corruption layer for every API to perform transformation for every data model to match each
other, and let data simply travel between APIs to avoid the complexity and overhead of building canonical models
Answer: C