An organization is designing Mule application which connects to a legacy backend. It has been reported that backend services are not highly available and experience downtime quite often. As an integration architect which of the below approach you would propose to achieve high reliability goals?
A. Alerts can be configured in Mule runtime so that backend team can be communicated when services are down
B. Until Successful scope can be implemented while calling backend API's
C. On Error Continue scope to be used to call in case of error again
D. Create a batch job with all requests being sent to backend using that job as per the availability of backend API's
An organization is migrating all its Mule applications to Runtime Fabric (RTF). None of the Mule applications use Mule domain projects.
Currently, all the Mule applications have been manually deployed to a server group among several customer hosted Mule runtimes.
Port conflicts between these Mule application deployments are currently managed by the DevOps team who carefully manage Mule application properties files.
When the Mule applications are migrated from the current customer-hosted server group to Runtime Fabric (RTF), fo the Mule applications need to be rewritten and what DevOps port configuration responsibilities change or stay the same?
A. Yes, the Mule applications Must be rewritten
DevOps No Longer needs to manage port conflicts between the Mule applications
B. Yes, the Mule applications Must be rewritten
DevOps Must Still Manage port conflicts.
C. NO, The Mule applications do NOT need to be rewritten
DevOps MUST STILL manage port conflicts
D. NO, the Mule applications do NO need to be rewritten
DevOps NO LONGER needs to manage port conflicts between the Mule applications.
According to MuleSoft, what is a major distinguishing characteristic of an application network in relation to the integration of systems, data, and devices?
A. It uses a well-organized monolithic approach with standards
B. It is built for change and self-service
C. It leverages well-accepted internet standards like HTTP and JSON
D. It uses CI/CD automation for real-time project delivery
Explanation:
A major distinguishing characteristic of an application network, according to MuleSoft, is that it is built for change and self-service. An application network connects applications, data, and devices with APIs, enabling self-service access and reuse of assets. This architecture allows organizations to rapidly adapt to changing business needs, fosters innovation, and reduces time to market by empowering different teams to access and integrate systems independently without waiting for centralized IT.
References:
Application Networks: The Future of Integration
MuleSoft's Approach to Building Application Networks
A system administrator needs to determine when permissions were last changed for an Anypoint Platform user.
Which Anypoint Platform component should the administrator use to obtain this information?
A. Audit Logging
B. Anypoint Monitoring
C. Anypiont Studio
D. Mule Stack Traces
According to the Internet Engineering Task Force (IETF), which supporting protocol does File Transfer Protocol (FTP) use for reliable communication?
A. A Secure Sockets Layer (SSL)
B. B Transmission Control Protocol (TCP)
C. Lightweight Directory Access Protocol (LDAP)
D. Hypertext Transfer Protocol (HTTP)
Explanation:
The File Transfer Protocol (FTP) uses the Transmission Control Protocol (TCP) for reliable communication. TCP is one of the core protocols of the Internet Protocol Suite and provides reliable, ordered, and error-checked delivery of a stream of data between applications running on hosts communicating via an IP network. FTP relies on TCP to ensure that all data packets are delivered accurately and in the correct sequence, which is essential for the reliable transfer of files between a client and server.
References
• IETF RFC 959 - File Transfer Protocol (FTP)
• TCP/IP Protocol Suite Documentation
An IT integration delivery team begins a project by gathering all of the requirements, and proceeds to execute the remaining project activities as sequential, non-repeating phases.
Which IT project delivery methodology is this team following?
A. Kanban
B. Scrum
C. Waterfall
D. Agile
Explanation:
The described approach of gathering all requirements upfront and proceeding through sequential, non-repeating phases is characteristic of the Waterfall methodology. Waterfall is a linear project management approach where each phase must be completed before the next one begins, and there is typically no going back to a previous phase once it is completed. This methodology is well-suited for projects with well-defined requirements and deliverables, but it can be inflexible if changes or new requirements arise during the project.
References:
• Waterfall Model
• Waterfall vs. Agile: Which is the Right Development Methodology for Your Project?
The ABC company has an Anypoint Runtime Fabric on VMs/Bare Metal (RTF-VM) appliance installed on its own customer-hosted AWS infrastructure.
Mule applications are deployed to this RTF-VM appliance. As part of the company standards, the Mule application logs must be forwarded to an external log management tool (LMT).
Given the company's current setup and requirements, what is the most idiomatic (used for its intended purpose) way to send Mule application logs to the external LMT?
A. In RTF-VM, install and configure the external LTM's log-forwarding agent
B. In RTF-VM, edit the pod configuration to automatically install and configure an Anypoint Monitoring agent
C. In each Mule application, configure custom Log4j settings
D. In each Mule application, configure custom Log4j settings
Explanation:
Reference:
[Reference: https://help.mulesoft.com/s/article/Enable-external-log-forwarding-for-Mule-applications-deployed-in-RTF, , , ]
What Is a recommended practice when designing an integration Mule 4 application that reads a large XML payload as a stream?
A. The payload should be dealt with as a repeatable XML stream, which must only be traversed (iterated-over) once and CANNOT be accessed randomly from DataWeave expressions and scripts
B. The payload should be dealt with as an XML stream, without converting it to a single Java object (POJO)
C. The payload size should NOT exceed the maximum available heap memory of the Mute runtime on which the Mule application executes
D. The payload must be cached using a Cache scope If It Is to be sent to multiple backend systems
Page 1 out of 5 Pages |