Refer to the exhibit.
The HTTP Listener and the Logger are being handled from which thread pools respectively?
A. BLOCKING _IO and UBER
B. Shared Selector Pool and CPU LITE
C. CPU_INTENSIVE and Dedicated Selector pool
D. UBER and NONBLOCKING
正解:B
質問 2:
What aspects of a CI/CD pipeline for Mule applications can be automated using MuleSoft-provided Maven plugins?
A. Compile, package, unit test, deploy, integration test (Incorrect)
B. Compile, package, unit test, deploy, create associated API instances in API Manager
C. Import from API designer, compile, package, unit test, deploy, publish to Anypoint Exchange
D. Compile, package, unit test, validate unit test coverage, deploy
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 3:
A company is planning to migrate its deployment environment from on-premises cluster to a Runtime Fabric (RTF) cluster. It also has a requirement to enable Mule applications deployed to a Mule runtime instance to store and share data across application replicas and restarts.
How can these requirements be met?
A. Configure Persistence Gateway in any of the servers using Mule Object Store
B. Install the object store pod on one of the cluster nodes
C. Configure Persistent Gateway at the RTF
D. Anypoint object store V2 to share data between replicas in the RTF cluster
正解:C
質問 4:
A company is designing a mule application to consume batch data from a partner's ftps server The data files have been compressed and then digitally signed using PGP.
What inputs are required for the application to securely consumed these files?
A. The PGP public key of the partner
The PGP private key for the company The FTP username and password
B. ATLS context first store containing a public certificate for partner ftps server and the PGP public key of the partner TLS contact Key Store containing the FTP credentials
C. TLS context trust or containing a public certificate for the ftps server The FTP username and password The PGP public key of the partner
D. ATLS context Key Store requiring the private key and certificate for the company PGP public key of partner PGP private key for the company
正解:A
質問 5:
A Mule application is synchronizing customer data between two different database systems.
What is the main benefit of using eXtended Architecture (XA) transactions over local transactions to synchronize these two different database systems?
A. An XA transaction writes to both database systems as fast as possible
B. An XA transaction synchronizes the database systems with the least amount of Mule configuration or coding
C. An XA transaction handles the largest number of requests in the shortest time
D. An XA transaction automatically rolls back operations against both database systems if any operation falls
正解:C
質問 6:
A leading e-commerce giant will use Mulesoft API's on runtime fabric (RTF) to process customer orders.
Some customer's sensitive information such as credit card information is also there as a part of a API payload.
What approach minimizes the risk of matching sensitive data to the original and can convert back to the original value whenever and wherever required?
A. Apply masking to hide the sensitive information and then use API
B. Apply a field level encryption policy in the API Gateway
C. Used both masking and tokenization
D. create a tokenization format and apply a tokenization policy to the API Gateway
E. manager to detokenize the masking format to return the original value
正解:A
質問 7:
A trading company handles millions of requests a day. Due to nature of its business, it requires excellent performance and reliability within its application.
For this purpose, company uses a number of event-based API's hosted on various mule clusters that communicate across a shared message queue sitting within its network.
Which method should be used to meet the company's requirement for its system?
A. JMS manual acknowledgements with a reliability pattern
B. XA transactions and XA connected components
C. JMS transactions
D. VM queues with reliability pattern
正解:A
Ai -
このMCIA-Level-1-Maintenance問題集を使って、効率よくポイントを絞った勉強をすることができます。