Month End Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What correctly characterizes unit tests of Mule applications?

A.

They test the validity of input and output of source and target systems

B.

They must be run in a unit testing environment with dedicated Mule runtimes for the environment

C.

They must be triggered by an external client tool or event source

D.

They are typically written using MUnit to run in an embedded Mule runtime that does not require external connectivity

Which APIs can be used with DataGraph to create a unified schema?

A.

APIs 1, 3, 5

B.

APIs 2, 4 ,6

C.

APIs 1, 2, s5, 6

D.

APIs 1, 2, 3, 4

An organization uses various cloud-based SaaS systems and multiple on-premises systems. The on-premises systems are an important part of the organization's application network and can only be accessed from within the organization's intranet.

What is the best way to configure and use Anypoint Platform to support integrations with both the cloud-based SaaS systems and on-premises systems?

A) Use CloudHub-deployed Mule runtimes in an Anypoint VPC managed by Anypoint Platform Private Cloud Edition control plane

B) Use CloudHub-deployed Mule runtimes in the shared worker cloud managed by the MuleSoft-hosted Anypoint Platform control plane

C) Use an on-premises installation of Mule runtimes that are completely isolated with NO external network access, managed by the Anypoint Platform Private Cloud Edition control plane

D) Use a combination of Cloud Hub-deployed and manually provisioned on-premises Mule runtimes managed by the MuleSoft-hosted Anypoint Platform control plane

A.

Option A

B.

Option B

C.

Option C

D.

Option D

An Order API must be designed that contains significant amounts of integration logic and involves the invocation of the Product API.

The power relationship between Order API and Product API is one of "Customer/Supplier", because the Product API is used heavily throughout the organization and is developed by a dedicated development team located in the office of the CTO.

What strategy should be used to deal with the API data model of the Product API within the Order API?

A.

Convince the development team of the Product API to adopt the API data model of the Order API such that the integration logic of the Order API can work with one consistent internal data model

B.

Work with the API data types of the Product API directly when implementing the integration logic of the Order API such that the Order API uses the same (unchanged) data types as the Product API

C.

Implement an anti-corruption layer in the Order API that transforms the Product API data model into internal data types of the Order API

D.

Start an organization-wide data modeling initiative that will result in an Enterprise Data Model that will then be used in both the Product API and the Order API

What is a key requirement when using an external Identity Provider for Client Management in Anypoint Platform?

A.

Single sign-on is required to sign in to Anypoint Platform

B.

The application network must include System APIs that interact with the Identity Provider

C.

To invoke OAuth 2.0-protected APIs managed by Anypoint Platform, API clients must submit access tokens issued by that same Identity Provider

D.

APIs managed by Anypoint Platform must be protected by SAML 2.0 policies

What are the major benefits of MuleSoft proposed IT Operating Model?

A.

1. Decrease the IT delivery gap2. Meet various business demands without increasing the IT capacity3. Focus on creation of reusable assets first. Upon finishing creation of all the possible assets then inform the LOBs in the organization to start using them

B.

1. Decrease the IT delivery gap2. Meet various business demands by increasing the IT capacity and forming various IT departments3. Make consumption of assets at the rate of production

C.

1. Decrease the IT delivery gap2. Meet various business demands without increasing the IT capacity3. Make consumption of assets at the rate of production

What Mule application can have API policies applied by

Anypoint Platform to the endpoint exposed by that Mule application?

A) A Mule application that accepts requests over HTTP/1.x

B) A Mule application that accepts JSON requests over TCP but is NOT required to provide a response

C) A Mute application that accepts JSON requests over WebSocket

D) A Mule application that accepts gRPC requests over HTTP/2

A.

Option A

B.

Option B

C.

Option C

D.

Option D

A company stores financial transaction data in two legacy systems. For each legacy system, a separate, dedicated System API (SAPI) exposes data for that legacy system. A Process API (PAPI) merges the data retrieved from ail of the System APIs into a common format. Several API clients call the PAPI through its public domain name.

The company now wants to expose a subset of financial data to a newly developed mobile application that uses a different Bounded Context Data Model. The company wants to follow MuleSoft's best practices for building out an effective application network.

Following MuleSoft's best practices, how can the company expose financial data needed by the mobile application in a way that minimizes the impact on the currently running API clients, API implementations, and support asset reuse?

A.

Add two new Experience APIs (EAPI-i and EAPI-2}. Add Mobile PAPI-2 to expose the Intended subset of financial data as requested. Both PAPIs access the Legacy Systems via SAPI-1 and SAP]-2.

B.

Add two new Experience APIs (EAPI-i and EAPI-2}. Add Mobile PAPI-2 to expose the Intended subset of financial data as requested. Both PAPIs access the Legacy Systems via SAPI-1 and SAP]-2.

C.

Create a new mobile Experince API (EAPI) chat exposes that subset of PAPI endpoints.Add transformtion login to the mobile Experince API implementation to make mobile data compatible with the required PAPIs.

D.

Develop and deploy is new PAPI implementation with data transformation and ... login to support this required endpoints of both mobile and web clients.Deploy an API Proxy with an endpoint from API Manager that redirect the existing PAPI endpoints to the new PAPI.

Refer to the exhibit.

A developer is building a client application to invoke an API deployed to the STAGING environment that is governed by a client ID enforcement policy.

What is required to successfully invoke the API?

A.

The client ID and secret for the Anypoint Platform account owning the API in the STAGING environment

B.

The client ID and secret for the Anypoint Platform account's STAGING environment

C.

The client ID and secret obtained from Anypoint Exchange for the API instance in the STAGING environment

D.

A valid OAuth token obtained from Anypoint Platform and its associated client ID and secret

An organization wants to create a Center for Enablement (C4E). The IT director schedules a series of meetings with IT senior managers.

What should be on the agenda of the first meeting?

A.

Define C4E objectives, mission statement, guiding principles, a

B.

Explore API monetization options based on identified use cases through MuleSoft

C.

A walk through of common-services best practices for logging, auditing, exception handling, caching, security via policy, and rate limiting/throttling via policy

D.

Specify operating model for the MuleSoft Integrations division