From where does most of the data available to Anypoint Platform for monitoring and alerting originate?

In an organization, the InfoSec team is investigating Anypoint Platform related data traffic. From where does most of the data available to Anypoint Platform for monitoring and alerting originate?A . From the Mule runtime or the API implementation, depending on the deployment modelB . From various components of Anypoint Platform,...

February 4, 2020 No Comments READ MORE +

Which two attack vectors are protected by Cyber Threat Defense & Network Analytics? (Choose two.)

Which two attack vectors are protected by Cyber Threat Defense & Network Analytics? (Choose two.)A . CloudB . EmailC . EndpointsD . WebE . Data CenterView AnswerAnswer: DE

February 4, 2020 No Comments READ MORE +

What is the impact of this advice?

When designing an upstream API and its implementation, the development team has been advised to NOT set timeouts when invoking a downstream API, because that downstream API has no SLA that can be relied upon. This is the only downstream API dependency of that upstream API. Assume the downstream API...

February 4, 2020 2 Comments READ MORE +

What scenario can use the CloudHub Object Store via the Object Store connector to persist the cache's state?

An organization is implementing a Quote of the Day API that caches today's quote. What scenario can use the CloudHub Object Store via the Object Store connector to persist the cache's state?A . When there are three CloudHub deployments of the API implementation to three separate CloudHub regions that must...

February 4, 2020 No Comments READ MORE +

What is true when using customer-hosted Mule runtimes with the MuleSoft-hosted Anypoint Platform control plane (hybrid deployment)?

Refer to the exhibit. What is true when using customer-hosted Mule runtimes with the MuleSoft-hosted Anypoint Platform control plane (hybrid deployment)?A . Anypoint Runtime Manager initiates a network connection to a Mule runtime in order to deploy Mule applications.B . The MuleSoft-hosted Shared Load Balancer can be used to load...

February 3, 2020 No Comments READ MORE +

What is required to successfully invoke the API?

Refer to the exhibit. A developer is building a client application to invoke an API deployed to the STAGING environment that is governed by a client ID enforcement policy. What is required to successfully invoke the API?A . The client ID and secret for the Anypoint Platform account owning the...

February 2, 2020 No Comments READ MORE +

Which source IP address does the myList ACL deny?

A network administrator applies the ACL shown in the exhibit. Which source IP address does the myList ACL deny?A . 10.1.0.10B . 10.1.1.10C . 10.1.2.10D . 10.2.1.10View AnswerAnswer: D

February 1, 2020 No Comments READ MORE +

What should be ensured before sharing an API through a public Anypoint Exchange portal?

What should be ensured before sharing an API through a public Anypoint Exchange portal?A . The visibility level of the API instances of that API that need to be publicly accessible should be set to public visibility.B . The users needing access to the API should be added to the...

February 1, 2020 No Comments READ MORE +

What is true about where an API policy is defined in Anypoint Platform and how it is then applied to API instances?

What is true about where an API policy is defined in Anypoint Platform and how it is then applied to API instances?A . The API policy is defined in Runtime Manager as part of the API deployment to a Mule runtime, and then ONLY applied to the specific API instance.B...

January 31, 2020 No Comments READ MORE +

What is a valid approach that minimizes the impact of this change on API clients?

The implementation of a Process API must change. What is a valid approach that minimizes the impact of this change on API clients?A . Update the RAML definition of the current Process API and notify API client developers by sending them links to the updated RAML definition.B . Postpone changes...

January 31, 2020 No Comments READ MORE +