Certbus > Mulesoft > Mulesoft Certifications > MCPA-LEVEL1 > MCPA-LEVEL1 Online Practice Questions and Answers

MCPA-LEVEL1 Online Practice Questions and Answers

Questions 4

What is a key performance indicator (KPI) that measures the success of a typical C4E that is immediately apparent in responses from the Anypoint Platform APIs?

A. The number of production outage incidents reported in the last 24 hours

B. The number of API implementations that have a publicly accessible HTTP endpoint and are being managed by Anypoint Platform

C. The fraction of API implementations deployed manually relative to those deployed using a CI/CD tool

D. The number of API specifications in RAML or OAS format published to Anypoint Exchange

Browse 95 Q&As
Questions 5

In an organization, the InfoSec team is investigating Anypoint Platform related data traffic.

From where does most of the data available to Anypoint Platform for monitoring and alerting originate?

A. From the Mule runtime or the API implementation, depending on the deployment model

B. From various components of Anypoint Platform, such as the Shared Load Balancer, VPC, and Mule runtimes

C. From the Mule runtime or the API Manager, depending on the type of data

D. From the Mule runtime irrespective of the deployment model

Browse 95 Q&As
Questions 6

What should be ensured before sharing an API through a public Anypoint Exchange portal?

A. The visibility level of the API instances of that API that need to be publicly accessible should be set to public visibility.

B. The users needing access to the API should be added to the appropriate role in Anypoint Platform.

C. The API should be functional with at least an initial implementation deployed and accessible for users to interact with.

D. The API should be secured using one of the supported authentication/authorization mechanisms to ensure that data is not compromised.

Browse 95 Q&As
Questions 7

A System API is designed to retrieve data from a backend system that has scalability challenges.

What API policy can best safeguard the backend system?

A. IP whitelist

B. SLA-based rate limiting

C. OAuth 2 token enforcement

D. Client ID enforcement

Browse 95 Q&As
Questions 8

Refer to the exhibit.

Three business processes need to be implemented, and the implementations need to communicate with several different SaaS applications.

These processes are owned by separate (siloed) LOBs and are mainly independent of each other, but do share a few business entities. Each LOB has one development team and their own budget.

In this organizational context, what is the most effective approach to choose the API data models for the APIs that will implement these business processes with minimal redundancy of the data models?

A. Option A

B. Option B

C. Option C

D. Option D

Browse 95 Q&As
Questions 9

What best describes the Fully Qualified Domain Names (FQDNs), also known as DNS entries, created when a Mule application is deployed to the CloudHub Shared Worker Cloud?

A. A fixed number of FQDNs are created, IRRESPECTIVE of the environment and VPC design

B. The FQDNs are determined by the application name chosen, IRRESPECTIVE of the region

C. The FQDNs are determined by the application name, but can be modified by an administrator after deployment

D. The FQDNs are determined by both the application name and the Anypoint Platform organization

Browse 95 Q&As
Questions 10

Refer to the exhibit.

What is the best way to decompose one end-to-end business process into a collaboration of Experience, Process, and of System APIs?

A. Option A

B. Option B

C. Option C

D. Option D

Browse 95 Q&As
Questions 11

How can the application of a rate limiting API policy be accurately reflected in the RAML definition of an API?

A. By refining the resource definitions by adding a description of the rate limiting policy behavior

B. By refining the request definitions by adding a remainingRequests query parameter with description, type, and example

C. y refining the response definitions by adding the out-of-the-box Anypoint Platform rate-limitenforcement securityScheme with description, type, and example

D. By refining the response definitions by adding the x-ratelimit-* response headers with description, type, and example

Browse 95 Q&As
Questions 12

A code-centric API documentation environment should allow API consumers to investigate and execute API client source code that demonstrates invoking one or more APIs as part of representative scenarios.

What is the most effective way to provide this type of code-centric API documentation environment using Anypoint Platform?

A. Enable mocking services for each of the relevant APIs and expose them via their Anypoint Exchange entry

B. Ensure the APIs are well documented through their Anypoint Exchange entries and API Consoles and share these pages with all API consumers

C. Create API Notebooks and include them in the relevant Anypoint Exchange entries

D. Make relevant APIs discoverable via an Anypoint Exchange entry

Browse 95 Q&As
Questions 13

What API policy would be LEAST LIKELY used when designing an Experience API that is intended to work with a consumer mobile phone or tablet application?

A. OAuth 2.0 access token enforcement

B. Client ID enforcement

C. JSON threat protection D. IP whitelist

Browse 95 Q&As
Questions 14

What is typically NOT a function of the APIs created within the framework called API-led connectivity?

A. They provide an additional layer of resilience on top of the underlying backend system, thereby insulating clients from extended failure of these systems.

B. They allow for innovation at the user interface level by consuming the underlying assets without being aware of how data is being extracted from backend systems.

C. They reduce the dependency on the underlying backend systems by helping unlock data from backend systems in a reusable and consumable way.

D. They can compose data from various sources and combine them with orchestration logic to create higher level value

Browse 95 Q&As
Questions 15

An Order API must be designed that contains significant amounts of integration logic and involves the invocation of the Product API.

The power relationship between Order API and Product API is one of "Customer/Supplier", because the Product API is used heavily throughout the organization and is developed by a dedicated development team located in the office of the CTO.

What strategy should be used to deal with the API data model of the Product API within the Order API?

A. Convince the development team of the Product API to adopt the API data model of the Order API such that the integration logic of the Order API can work with one consistent internal data model.

B. Work with the API data types of the Product API directly when implementing the integration logic of the Order API such that the Order API uses the same (unchanged) data types as the Product API.

C. Implement an anti-corruption layer in the Order API that transforms the Product API data model into internal data types of the Order API.

D. Start an organization-wide data modeling initiative that will result in an Enterprise Data Model that will then be used in both the Product API and the Order API.

Browse 95 Q&As
Questions 16

When must an API implementation be deployed to an Anypoint VPC?

A. When the API implementation must invoke publicly exposed services that are deployed outside of CloudHub in a customer-managed AWS instance.

B. When the API implementation must be accessible within a subnet of a restricted customer-hosted network that does not allow public access.

C. When the API implementation must be deployed to a production AWS VPC using the Mule Maven plugin

D. When the API implementation must write to a persistent Object Store

Browse 95 Q&As
Questions 17

What is true about API implementations when dealing with legal regulations that require all data processing to be performed within a certain jurisdiction (such as in the USA or the EU)?

A. They must avoid using the Object Store as it depends on services deployed ONLY to the US East region.

B. They must use a jurisdiction-local external messaging system such as Active MQ rather than Anypoint MQ.

C. They must be deployed to Anypoint Platform runtime planes that are managed by Anypoint Platform control planes, with both planes in the same jurisdiction.

D. They must ensure ALL data is encrypted both in transit and at rest.

Browse 95 Q&As
Questions 18

Refer to the exhibit.

An organization uses one specific CloudHub (AWS) region for all CloudHub deployments.

How are CloudHub workers assigned to availability zones (AZs) when the organization's Mule applications are deployed to CloudHub in that region?

A. Workers belonging to a given environment are assigned to the same AZ within that region.

B. AZs are selected as part of the Mule application's deployment configuration.

C. Workers are randomly distributed across available AZs within that region.

D. An AZ is randomly selected for a Mule application, and all the Mule application's CloudHub workers are assigned to that one AZ.

Browse 95 Q&As
Exam Code: MCPA-LEVEL1
Exam Name: MuleSoft Certified Platform Architect - Level 1
Last Update: Apr 15, 2024
Questions: 95 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99