From where does most of the data available to Anypoint Platform for monitoring and alerting originate?
In an organization, the InfoSec team is investigating Anypoint Platform related data traffic. From where does most of the data available to Anypoint Platform for monitoring and alerting originate?A . From the Mule runtime or the API implementation, depending on the deployment modelB . From various components of Anypoint Platform,...
Which two attack vectors are protected by Cyber Threat Defense & Network Analytics? (Choose two.)
Which two attack vectors are protected by Cyber Threat Defense & Network Analytics? (Choose two.)A . CloudB . EmailC . EndpointsD . WebE . Data CenterView AnswerAnswer: DE
What is the impact of this advice?
When designing an upstream API and its implementation, the development team has been advised to NOT set timeouts when invoking a downstream API, because that downstream API has no SLA that can be relied upon. This is the only downstream API dependency of that upstream API. Assume the downstream API...
What scenario can use the CloudHub Object Store via the Object Store connector to persist the cache's state?
An organization is implementing a Quote of the Day API that caches today's quote. What scenario can use the CloudHub Object Store via the Object Store connector to persist the cache's state?A . When there are three CloudHub deployments of the API implementation to three separate CloudHub regions that must...
What is true when using customer-hosted Mule runtimes with the MuleSoft-hosted Anypoint Platform control plane (hybrid deployment)?
Refer to the exhibit. What is true when using customer-hosted Mule runtimes with the MuleSoft-hosted Anypoint Platform control plane (hybrid deployment)?A . Anypoint Runtime Manager initiates a network connection to a Mule runtime in order to deploy Mule applications.B . The MuleSoft-hosted Shared Load Balancer can be used to load...
What is required to successfully invoke the API?
Refer to the exhibit. A developer is building a client application to invoke an API deployed to the STAGING environment that is governed by a client ID enforcement policy. What is required to successfully invoke the API?A . The client ID and secret for the Anypoint Platform account owning the...
Which source IP address does the myList ACL deny?
A network administrator applies the ACL shown in the exhibit. Which source IP address does the myList ACL deny?A . 10.1.0.10B . 10.1.1.10C . 10.1.2.10D . 10.2.1.10View AnswerAnswer: D
What should be ensured before sharing an API through a public Anypoint Exchange portal?
What should be ensured before sharing an API through a public Anypoint Exchange portal?A . The visibility level of the API instances of that API that need to be publicly accessible should be set to public visibility.B . The users needing access to the API should be added to the...
What is true about where an API policy is defined in Anypoint Platform and how it is then applied to API instances?
What is true about where an API policy is defined in Anypoint Platform and how it is then applied to API instances?A . The API policy is defined in Runtime Manager as part of the API deployment to a Mule runtime, and then ONLY applied to the specific API instance.B...
What is a valid approach that minimizes the impact of this change on API clients?
The implementation of a Process API must change. What is a valid approach that minimizes the impact of this change on API clients?A . Update the RAML definition of the current Process API and notify API client developers by sending them links to the updated RAML definition.B . Postpone changes...