Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

MuleSoft-Integration-Architect-I Exam Dumps - Salesforce MuleSoft Questions and Answers

Question # 14

A Mule application is being designed to do the following:

Step 1: Read a SalesOrder message from a JMS queue, where each SalesOrder consists of a header and a list of SalesOrderLineltems.

Step 2: Insert the SalesOrder header and each SalesOrderLineltem into different tables in an RDBMS.

Step 3: Insert the SalesOrder header and the sum of the prices of all its SalesOrderLineltems into a table In a different RDBMS.

No SalesOrder message can be lost and the consistency of all SalesOrder-related information in both RDBMSs must be ensured at all times.

What design choice (including choice of transactions) and order of steps addresses these requirements?

Options:

A.

1) Read the JMS message (NOT in an XA transaction)

2) Perform BOTH DB inserts in ONE DB transaction

3) Acknowledge the JMS message

B.

1) Read the JMS message (NOT in an XA transaction)

2) Perform EACH DB insert in a SEPARATE DB transaction

3) Acknowledge the JMS message

C.

1) Read the JMS message in an XA transaction

2) In the SAME XA transaction, perform BOTH DB inserts but do NOT acknowledge the JMS message

D.

1) Read and acknowledge the JMS message (NOT in an XA transaction)

2) In a NEW XA transaction, perform BOTH DB inserts

Buy Now
Question # 15

A retail company is implementing a MuleSoft API to get inventory details from two vendors by Invoking each vendor's online applications. Due to network issues, the invocations to the vendor applications are timing out intermittently, but the requests are successful after re-invoking each

vendor application.

What is the most performant way of implementing the API to invoke each vendor application and to retry invocations that generate timeout errors?

Options:

A.

Use a For-Each scope to invoke the two vendor applications in series, one after the other.

Place the For-Each scope inside an Until-Successful scope to retry requests that raise timeout errors.

B.

Use a Choice scope to Invoke each vendor application on a separate route.

Place the Choice scope inside an Until-Successful scope to retry requests that raise

timeout errors.

C.

Use a Scatter-Gather scope to invoke each vendor application on a separate route.

Use an Until-Successful scope in each route to retry requests that raise timeout errors.

D.

Use a Round-Robin scope to invoke each vendor application on a separate route.

Use a Try-Catch scope in each route to retry requests that raise timeout errors.

Buy Now
Question # 16

The company's FTPS server login username and password

Options:

A.

TLS context trust store containing a public certificate for the company. The company's PGP public key that was used to sign the files

B.

The partner's PGP public key used by the company to login to the FTPS server. A TLS context key store containing the private key for the company

The partner's PGP private key that was used to sign the files

C.

The company's FTPS server login username and password. A TLS context trust store containing a public certificate for ftps.partner.com

The partner's PGP public key that was used to sign the files

D.

The partner's PGP public key used by the company to login to the FTPS server. A TLS context key store containing the private key for ftps.partner.com

The company's PGP private key that was used to sign the files

Buy Now
Question # 17

An Order microservice and a Fulfillment microservice are being designed to communicate with their dients through message-based integration (and NOT through API invocations).

The Order microservice publishes an Order message (a kind of command message) containing the details of an order to be fulfilled. The intention is that Order messages are only consumed by one Mute application, the Fulfillment microservice.

The Fulfilment microservice consumes Order messages, fulfills the order described therein, and then publishes an OrderFulfilted message (a kind of event message). Each OrderFulfilted message can be consumed by any interested Mule application, and the Order microservice is one such Mute application.

What is the most appropriate choice of message broker(s) and message destination(s) in this scenario?

Options:

A.

Order messages are sent to an Anypoint MQ exchange OrderFulfilled messages are sent to an Anypoint MQ queue Both microservices interact with Anypoint MQ as the message broker, which must therefore scale to support the load of both microservices

B.

Order messages are sent to a JMS queue. OrderFulfilled messages are sent to a JMS topic Both microservices interact with the same JMS provider (message broker) instance, which must therefore scale to support the load of both microservices

C.

Order messages are sent directly to the Fulfillment microservices. OrderFulfilled messages are sent directly to the Order microservice The Order microservice interacts with one AMQP-compatible message broker and the Fulfillment microservice interacts with a different AMQP-compatible message broker, so that both message brokers can be chosen and scaled to best support the load of each microservice

D.

Order messages are sent to a JMS queue. OrderFulfilled messages are sent to a JMS topic The Order microservice interacts with one JMS provider (message broker) and the Fulfillment microservice interacts with a different JMS provider, so that both message brokers can be chosen and scaled to best support the load of each microservice

Buy Now
Question # 18

What is an advantage of using OAuth 2.0 client credentials and access tokens over only API keys for API authentication?

Options:

A.

If the access token is compromised, the client credentials do not to be reissued.

B.

If the access token is compromised, I can be exchanged for an API key.

C.

If the client ID is compromised, it can be exchanged for an API key

D.

If the client secret is compromised, the client credentials do not have to be reissued.

Buy Now
Question # 19

Refer to the exhibit.

An organization uses a 2-node Mute runtime cluster to host one stateless API implementation. The API is accessed over HTTPS through a load balancer that uses round-robin for load distribution.

Two additional nodes have been added to the cluster and the load balancer has been configured to recognize the new nodes with no other change to the load balancer.

What average performance change is guaranteed to happen, assuming all cluster nodes are fully operational?

Options:

A.

50% reduction in the response time of the API

B.

100% increase in the throughput of the API

C.

50% reduction In the JVM heap memory consumed by each node

D.

50% reduction In the number of requests being received by each node

Buy Now
Question # 20

What best describes the Fully Qualified Domain Names (FQDNs), also known as DNS entries, created when a Mule application is deployed to the CloudHub Shared Worker Cloud?

Options:

A.

A fixed number of FQDNs are created, IRRESPECTIVE of the environment and VPC design

B.

The FQDNs are determined by the application name chosen, IRRESPECTIVE of the region

C.

The FQDNs are determined by the application name, but can be modified by an administrator after deployment

D.

The FQDNs are determined by both the application name and the region

Buy Now
Question # 21

An organization is designing Mule application which connects to a legacy backend. It has been reported that backend services are not highly available and experience downtime quite often. As an integration architect which of the below approach you would propose to achieve high reliability goals?

Options:

A.

Alerts can be configured in Mule runtime so that backend team can be communicated when services are down

B.

Until Successful scope can be implemented while calling backend API's

C.

On Error Continue scope to be used to call in case of error again

D.

Create a batch job with all requests being sent to backend using that job as per the availability of backend API's

Buy Now
Question # 22

An organization has implemented the cluster with two customer hosted Mule runtimes is hosting an application.

This application has a flow with a JMS listener configured to consume messages from a queue destination. As an integration architect can you advise which JMS listener configuration must be used to receive messages in all the nodes of the cluster?

Options:

A.

Use the parameter primaryNodeOnly= "false" on the JMS listener

B.

Use the parameter primaryNodeOnly= "false" on the JMS listener with a shared subscription

C.

Use the parameter primaryNodeOnly= "true" on the JMS listener with a non­shared subscription

D.

Use the parameter primaryNodeOnly= "true" on the JMS listener

Buy Now
Question # 23

Which type of communication is managed by a service mesh in a microservices architecture?

Options:

A.

Communication between microservices runtime administrators

B.

Communication between microservices developers

C.

Communication between microservices

D.

Communication between trading partner services

Buy Now
Exam Name: Salesforce Certified MuleSoft Integration Architect 1 (WI25) Exam
Last Update: Feb 22, 2025
Questions: 273
MuleSoft-Integration-Architect-I pdf

MuleSoft-Integration-Architect-I PDF

$25.5  $84.99
MuleSoft-Integration-Architect-I Engine

MuleSoft-Integration-Architect-I Testing Engine

$28.5  $94.99
MuleSoft-Integration-Architect-I PDF + Engine

MuleSoft-Integration-Architect-I PDF + Testing Engine

$40.5  $134.99