Free MCIA-LEVEL-1 Exam Braindumps (page: 32)

Page 31 of 62

A Mule application is being designed for deployment to a single CloudHub worker. The Mule application will have a flow that connects to a SaaS system to perform some operations each time the flow is invoked.
The SaaS system connector has operations that can be configured to request a short-lived token (fifteen minutes) that can be reused for subsequent connections within the fifteen minute time window. After the token expires, a new token must be requested and stored.
What is the most performant and idiomatic (used for its intended purpose) Anypoint Platform component or service to use to support persisting and reusing tokens in the Mule application to help speed up reconnecting the Mule application to the SaaS application?

  1. Nonpersistent object store
  2. Persistent object store
  3. Variable
  4. Database

Answer(s): D


Reference:

https://docs.mulesoft.com/mule-runtime/4.4/reconnection-strategy-about



An organization has an HTTPS-enabled Mule application named Orders API that receives requests from another Mule application named Process Orders.
The communication between these two Mule applications must be secured by TLS mutual authentication (two-way TLS).
At a minimum, what must be stored in each truststore and keystore of these two Mule applications to properly support two-way TLS between the two Mule applications while properly protecting each Mule application's keys?

  1. Orders API truststore: The Orders API public key
    Process Orders keystore: The Process Orders private key and public key
  2. Orders API truststore: The Orders API private key and public key Process Orders keystore: The Process Orders private key public key
  3. Orders API truststore: The Process Orders public key
    Orders API keystore: The Orders API private key and public key Process Orders truststore: The Orders API public key
    Process Orders keystore: The Process Orders private key and public key
  4. Orders API truststore: The Process Orders public key Orders API keystore: The Orders API private key Process Orders truststore: The Orders API public key
    Process Orders keystore: The Process Orders private key

Answer(s): C


Reference:

https://www.caeliusconsulting.com/blogs/one-way-and-two-way-tls-and-their- implementation-in-mulesoft/



A Mule application is built to support a local transaction for a series of operations on a single database. The Mule application has a Scatter-Gather that participates in the local transaction.
What is the behavior of the Scatter-Gather when running within this local transaction?

  1. Execution of each route within the Scatter-Gather occurs sequentially
    Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations
  2. Execution of all routes within the Scatter-Gather occurs in parallel
    Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations
  3. Execution of each route within the Scatter-Gather occurs sequentially
    Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations
  4. Execution of each route within the Scatter-Gather occurs in parallel
    Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations

Answer(s): A


Reference:

https://docs.mulesoft.com/mule-runtime/4.4/transaction-management



An organization is creating a Mule application that will be deployed to CloudHub. The Mule application has a property named dbPassword that stores a database user’s password.
The organization's security standards indicate that the dbPassword property must be hidden from every Anypoint Platform user after the value is set in the Runtime Manager Properties tab.
What configuration in the Mule application helps hide the dbPassword property value in Runtime Manager?

  1. Use secure::dbPassword as the property placeholder name and store the cleartext (unencrypted) value in a secure properties placeholder file
  2. Use secure::dbPassword as the property placeholder name and store the property encrypted value in a secure properties placeholder file
  3. Add the dbPassword property to the secureProperties section of the pom.xml file
  4. Add the dbPassword property to the secureProperties section of the mule-artifact.json file

Answer(s): B


Reference:

https://docs.mulesoft.com/runtime-manager/secure-application-properties






Post your Comments and Discuss MuleSoft MCIA-LEVEL-1 exam with other Community members:

Exam Discussions & Posts