What type of object store(s) should be used, and what design gives both Mule applications access to the same object store instance?
An organization is designing the following two Mule applications that must share data via a common persistent object store instance: - Mule application P will be deployed within their on-premises datacenter. - Mule application C will run on CloudHub in an Anypoint VPC. The object store implementation used by CloudHub...
What is a valid approach that minimizes the impact of this change on API clients?
The implementation of a Process API must change. What is a valid approach that minimizes the impact of this change on API clients?A . Implement required changes to the Process API implementation so that whenever possible, the Process API's RAML definition remains unchangedB . Update the RAML definition of the...
What is the most appropriate choice of message broker(s) and message destination(s) in this scenario?
An Order microservice and a Fulfillment microservice are being designed to communicate with their dients through message-based integration (and NOT through API invocations). The Order microservice publishes an Order message (a kind of command message) containing the details of an order to be fulfilled. The intention is that Order messages...
After the Alice node completely restarts, from what node are the files polled, and what node is now the primary node for the cluster?
A Mule application is deployed to a cluster of two (2) cusomter-hosted Mule runtimes. Currently the node name Alice is the primary node and node named bob is the secondary node. The mule application has a flow that polls a directory on a file system for new files. The primary...
What MuleSoft component is responsible for feeding analytics data to non-MuleSoft analytics platforms?
An organization uses Mule runtimes which are managed by Anypoint Platform - Private Cloud Edition. What MuleSoft component is responsible for feeding analytics data to non-MuleSoft analytics platforms?A . Anypoint ExchangeB . The Mule runtimesC . Anypoint API ManagerD . Anypoint Runtime ManagerView AnswerAnswer: D Explanation: Correct answer is Anypoint...
In the network architecture, how must the firewall rules be configured to enable the above Interaction between API 1 and API 2?
Refer to the exhibit. A business process involves two APIs that interact with each other asynchronously over HTTP. Each API is implemented as a Mule application. API 1 receives the initial HTTP request and invokes API 2 (in a fire and forget fashion) while API 2, upon completion of the...
What API policy would LEAST likely be applied to a Process API?
What API policy would LEAST likely be applied to a Process API?A . Custom circuit breakerB . Client ID enforcementC . Rate limitingD . JSON threat protectionView AnswerAnswer: D Explanation: Key to this question lies in the fact that Process API are not meant to be accessed directly by clients....
What design choice (including choice of transactions) and order of steps addresses these requirements?
A Mule application is being designed to do the following: Step 1: Read a SalesOrder message from a JMS queue, where each SalesOrder consists of a header and a list of SalesOrderLineltems. Step 2: Insert the SalesOrder header and each SalesOrderLineltem into different tables in an RDBMS. Step 3: Insert...
How can the organization most effectively avoid creating duplicates in each Mule application of the credentials required to access the backend systems?
An organization has various integrations implemented as Mule applications. Some of these Mule applications are deployed to custom hosted Mule runtimes (on-premises) while others execute in the MuleSoft-hosted runtime plane (CloudHub). To perform the Integra functionality, these Mule applications connect to various backend systems, with multiple applications typically needing to...
What is the most appropriate integration style for an integration solution that meets the organization's current requirements?
An organization is designing an integration solution to replicate financial transaction data from a legacy system into a data warehouse (DWH). The DWH must contain a daily snapshot of financial transactions, to be delivered as a CSV file. Daily transaction volume exceeds tens of millions of records, with significant spikes...