The retrieveBalances flow in the Mule application is designed to use an operation in a connector to the Finance system (the Finance operation) that can only look up one account record at a time, and a operation from a different connector to the Audit system (the Audit operation) that can only insert one account record at a time. To best meet the performance-related requirements, what scope or scopes should be used and how should they be used to incorporate the Finance operation and Audit operation into the retrieveBalances flow?
A. Wrap the Finance operation in a Parallel For-Each scope. Wrap the Audit operation in a Async scope.
B. Wrap the Finance operation in a Until-Successful scope. Wrap the Audit operation in a Try-Catch scope.
C. Wrap both connector operations in a Async scope.
D. Wrap both connector operations in a For-Each scope.
What is an example of data confidentiality?
A. Signing a file digitally and sending it using a file transfer mechanism
B. Encrypting a file containing personally identifiable information (PV)
C. Providing a server's private key to a client for secure decryption of data during a twoway SSL handshake
D. De-masking a person's Social Security number while inserting it into a database
A developer needs to discover which API specifications have been created within the organization before starting a new project. Which Anypoint Platform component can the developer use to find and try out the currently released API specifications?
A. Anypoint Exchange
B. Runtime Manager
C. API Manager
D. Object Store
Following MuleSoft best practices, what MuleSoft runtime deployment option best meets the company's goals to begin its digital transformation journey?
A. Runtime Fabric on VMs/bare metal
B. CloudHub runtimes
C. Customer-hosted runtimes provisioned by a MuleSoft services partner
D. Customer-hosted self-provisioned runtimes
Which type of communication is managed by a service mesh in a microservices architecture?
A. Communication between microservices runtime administrators
B. Communication between microservices developers
C. Communication between microservices
D. Communication between trading partner services
An XA transaction Is being configured that involves a JMS connector listening for Incoming JMS messages. What is the meaning of the timeout attribute of the XA transaction, and what happens after the timeout expires?
A. The time that is allowed to pass between committing the transaction and the completionof the Mule flow After the timeout, flow processing triggers an error
B. The time that Is allowed to pass between receiving JMS messages on the same JMSconnection After the timeout, a new JMS connection Is established
C. The time that Is allowed to pass without the transaction being ended explicitly After thetimeout, the transaction Is forcefully rolled-back
D. The time that Is allowed to pass for state JMS consumer threads to be destroyed Afterthe timeout, a new JMS consumer thread is created
An organization will deploy Mule applications to Cloudhub, Business requirements mandate that all application logs be stored ONLY in an external splunk consolidated logging service and NOT in Cloudhub. In order to most easily store Mule application logs ONLY in Splunk, how must Mule application logging be configured in Runtime Manager, and where should the log4j2 splunk appender be defined?
A. Keep the default logging configuration in RuntimeManagerDefine the splunk appender in ONE global log4j.xml file that is uploaded once to RuntimeManager to support at Mule application deployments.
B. Disable Cloudhub logging in Runtime ManagerDefine the splunk appender in EACH Mule application’s log4j2.xml file
C. Disable Cloudhub logging in Runtime ManagerDefine the splunk appender in ONE global log4j.xml file that is uploaded once to RuntimeManger to support at Mule application deployments.
D. Keep the default logging configuration in Runtime ManagerDefine the Splunk appender in EACH Mule application log4j2.xml file
A Mule application is deployed to a cluster of two(2) cusomter-hosted Mule runtimes. Currently the node name Alice is the primary node and node named bob is the secondary node. The mule application has a flow that polls a directory on a file system for new files. The primary node Alice fails for an hour and then restarted. After the Alice node completely restarts, from what node are the files polled, and what node is now the primary node for the cluster?
A. Files are polled from Alice node Alice is now the primary node
B. Files are polled form Bob node Alice is now the primary node
C. Files are polled from Alice node Bob is the now the primary node
D. Files are polled form Bob node Bob is now the primary node
An organization is evaluating using the CloudHub shared Load Balancer (SLB) vs creating a CloudHub dedicated load balancer (DLB). They are evaluating how this choice affects the various types of certificates used by CloudHub deployed Mule applications, including MuleSoft-provided, customer-provided, or Mule application-provided certificates. What type of restrictions exist on the types of certificates for the service that can be exposed by the CloudHub Shared Load Balancer (SLB) to external web clients over the public internet?
A. Underlying Mule applications need to implement own certificates
B. Only MuleSoft provided certificates can be used for server side certificate
C. Only self signed certificates can be used
D. All certificates which can be used in shared load balancer need to get approved byraising support ticket
Refer to the exhibit.
A Mule 4 application has a parent flow that breaks up a JSON array payload into 200 separate items, then sends each item one at a time inside an Async scope to a VM queue. A second flow to process orders has a VM Listener on the same VM queue. The rest of this flow processes each received item by writing the item to a database. This Mule application is deployed to four CloudHub workers with persistent queues enabled. What message processing guarantees are provided by the VM queue and the CloudHub workers, and how are VM messages routed among the CloudHub workers for each invocation of the parent flow under normal operating conditions where all the CloudHub workers remain online?
A. EACH item VM message is processed AT MOST ONCE by ONE CloudHub worker, withworkers chosen in a deterministic round-robin fashion Each of the four CloudHub workerscan be expected to process 1/4 of the Item VM messages (about 50 items)
B. EACH item VM message is processed AT LEAST ONCE by ONE ARBITRARYCloudHub worker Each of the four CloudHub workers can be expected to process someitem VM messages
C. ALL Item VM messages are processed AT LEAST ONCE by the SAME CloudHubworker where the parent flow was invokedThis one CloudHub worker processes ALL 200 item VM messages
D. ALL item VM messages are processed AT MOST ONCE by ONE ARBITRARYCloudHub workerThis one CloudHub worker processes ALL 200 item VM messages