What combination of deployment options of the Anypoint Platform control plane and runtime plane(s) best serves this organization at the start of this strategic journey?
A global organization operates datacenters in many countries. There are private network links between these datacenters because all business data (but NOT metadata) must be exchanged over these private network connections. The organization does not currently use AWS in any way. The strategic decision has Just been made to rigorously...
In order to most easily store Mule application logs ONLY in Splunk, how must Mule application logging be configured in Runtime Manager, and where should the log4j2 splunk appender be defined?
An organization will deploy Mule applications to Cloudhub, Business requirements mandate that all application logs be stored ONLY in an external splunk consolidated logging service and NOT in Cloudhub. In order to most easily store Mule application logs ONLY in Splunk, how must Mule application logging be configured in Runtime...
What type of testing would typically mock the results from each SELECT statement rather than actually execute it in the production database?
An API implementation is being developed to expose data from a production database via HTTP requests. The API implementation executes a database SELECT statement that is dynamically created based upon data received from each incoming HTTP request. The developers are planning to use various types of testing to make sure...
What aspects of RBAC must ALWAYS be controlled from the Anypoint Platform control plane and CANNOT be controlled via the external Identity Provider?
Refer to the exhibit. Anypoint Platform supports role-based access control (RBAC) to features of the platform. An organization has configured an external Identity Provider for identity management with Anypoint Platform. What aspects of RBAC must ALWAYS be controlled from the Anypoint Platform control plane and CANNOT be controlled via the...
When using Anypoint Platform across various lines of business with their own Anypoint Platform business groups, what configuration of Anypoint Platform is always performed at the organization level as opposed to at the business group level?
When using Anypoint Platform across various lines of business with their own Anypoint Platform business groups, what configuration of Anypoint Platform is always performed at the organization level as opposed to at the business group level?A . Environment setupB . Identity management setupC . Role and permission setupD . Dedicated...
What aspects of a CI/CD pipeline for Mute applications can be automated using MuleSoft-provided Maven plugins?
What aspects of a CI/CD pipeline for Mute applications can be automated using MuleSoft-provided Maven plugins?A . Compile, package, unit test, deploy, create associated API instances in API Manager B Import from API designer, compile, package, unit test, deploy, publish to Am/point ExchangeB . Compile, package, unit test, validate unit...
What Anypoint Connector can be used in the organization's Mule application to securely receive data from this external business partner?
Refer to the exhibit. An organization is designing a Mule application to receive data from one external business partner. The two companies currently have no shared IT infrastructure and do not want to establish one. Instead, all communication should be over the public internet (with no VPN). What Anypoint Connector...
What APIs should be created to best fit these design requirements?
An organization needs to enable access to their customer data from both a mobile app and a web application, which each need access to common fields as well as certain unique fields. The data is available partially in a database and partially in a 3rd-party CRM system. What APIs should...
What is the most effective way to design for these requirements in order to minimize the impact of future change?
Refer to the exhibit. A business process involves the receipt of a file from an external vendor over SFTP. The file needs to be parsed and its content processed, validated, and ultimately persisted to a database. The delivery mechanism is expected to change in the future as more vendors send...
What requires configuration of both a key store and a trust store for an HTTP Listener?
What requires configuration of both a key store and a trust store for an HTTP Listener?A . Support for TLS mutual (two-way) authentication with HTTP clientsB . Encryption of requests to both subdomains and API resource endpoints fhttPs://aDi.customer.com/ and https://customer.com/api)C . Encryption of both HTTP request and HTTP response bodies...