MuleSoft MCPA: Certified Platform Architect – Level 1 Sample Questions
![MuleSoft MCPA Certified Platform Architect Level - 1 Sample Questions](https://www.testpreptraining.com/tutorial/wp-content/uploads/2022/08/MuleSoft-MCPA-Certified-Platform-Architect-Level-1-Sample-Questions.jpg)
Advanced Sample Questions
Which of the following is not a type of MuleSoft deployment option?
- A. On-premises
- B. CloudHub
- C. Anypoint Platform Private Cloud Edition
- D. Anypoint Platform Hybrid
Answer: C. Anypoint Platform Private Cloud Edition
Explanation: Anypoint Platform Private Cloud Edition is not a type of MuleSoft deployment option. Anypoint Platform supports three deployment options: on-premises, CloudHub, and Anypoint Platform Hybrid.
Which of the following is not a type of MuleSoft API?
- A. System API
- B. Experience API
- C. Process API
- D. Composite API
Answer: B. Experience API
Explanation: Experience API is not a type of MuleSoft API. MuleSoft supports four types of APIs: System API, Process API, Experience API, and Composite API.
Which of the following is true about a MuleSoft flow?
- A. A MuleSoft flow is a set of operations that run sequentially.
- B. A MuleSoft flow is a set of operations that run in parallel.
- C. A MuleSoft flow is a set of operations that can run in any order.
- D. A MuleSoft flow is a set of operations that run based on a set of conditions.
Answer: A. A MuleSoft flow is a set of operations that run sequentially.
Explanation: A MuleSoft flow is a set of operations that run sequentially. It is a sequence of message processors that are executed in a specific order.
Option B and C are incorrect, as they do not correctly describe the order in which a MuleSoft flow executes.
Option D is incorrect, as it does not correctly describe the purpose of a MuleSoft flow.
Which of the following is true about a MuleSoft connector?
- A. A MuleSoft connector is used to connect to an external system or service.
- B. A MuleSoft connector is used to create a MuleSoft application.
- C. A MuleSoft connector is used to monitor MuleSoft applications.
- D. A MuleSoft connector is used to debug MuleSoft applications.
Answer: A. A MuleSoft connector is used to connect to an external system or service.
Explanation: A MuleSoft connector is used to connect to an external system or service. It provides a set of pre-built operations that can be used to interact with the system or service.
Option B, C, and D are incorrect, as they do not correctly describe the purpose of a MuleSoft connector.
Which of the following is true about MuleSoft dataweave?
- A. MuleSoft dataweave is a programming language used to write MuleSoft applications.
- B. MuleSoft dataweave is a mapping language used to transform data in MuleSoft applications.
- C. MuleSoft dataweave is a database used to store data in MuleSoft applications.
- D. MuleSoft dataweave is a messaging system used to send and receive data in MuleSoft applications.
Answer: B. MuleSoft dataweave is a mapping language used to transform data in MuleSoft applications.
Explanation: MuleSoft dataweave is a mapping language used to transform data in MuleSoft applications. It allows developers to transform data from one format to another, such as converting a CSV file to a JSON object.
Option A, C, and D are incorrect, as they do not correctly describe the purpose of MuleSoft dataweave.
Which of the following is not a MuleSoft CloudHub deployment region?
- A. US West (Oregon)
- B. Asia Pacific (Mumbai)
- C. Europe (London)
- D. Africa (Johannesburg)
Answer: D. Africa (Johannesburg)
Explanation: Currently, MuleSoft does not offer a CloudHub deployment region in Africa. However, it offers regions in the United States, Asia Pacific, Europe, and other parts of the world.
Which of the following is not a MuleSoft best practice for designing APIs?
- A. Use HTTP status codes to indicate the status of a response.
- B. Use descriptive URIs to make APIs easy to understand.
- C. Limit the number of resources in an API to reduce complexity.
- D. Use secure protocols, such as HTTPS, to protect sensitive data.
Answer: C. Limit the number of resources in an API to reduce complexity.
Explanation: It is not a MuleSoft best practice to limit the number of resources in an API. Instead, APIs should be designed with the resources that are necessary to meet the requirements of the use case.
Option A, B, and D are correct best practices for designing APIs.
Which of the following is not a type of MuleSoft error handling strategy?
- A. On Error Propagate
- B. On Error Continue
- C. On Error Retry
- D. On Error Abort
Answer: B. On Error Continue
Explanation: On Error Continue is not a type of MuleSoft error handling strategy. MuleSoft supports three error handling strategies: On Error Propagate, On Error Retry, and On Error Abort.
Which of the following is not a type of MuleSoft cache scope?
- A. In Memory
- B. On Disk
- C. Redundant
- D. Persistent
Answer: C. Redundant
Explanation: Redundant is not a type of MuleSoft cache scope. MuleSoft supports three types of cache scope: In Memory, On Disk, and Persistent.
Which of the following is not a MuleSoft integration pattern?
- A. Request-Reply
- B. Publish-Subscribe
- C. Scatter-Gather
- D. Round-Robin
Answer: D. Round-Robin
Explanation: Round-Robin is not a MuleSoft integration pattern. However, MuleSoft supports other integration patterns, such as Request-Reply, Publish-Subscribe, and Scatter-Gather.
Option D is incorrect because it is not a valid MuleSoft integration pattern.
Basic Sample Questions
Question 1
An API is experiencing a considerably higher rate of client requests (TPS) with very small message payloads. In what ways can the API be restricted based on the type of client application?
- A. Using an SLA-based rate limiting policy and assigning a client application to a matching SLA tier based on its type.
- B. Using a spike control policy that would limit the number of requests for each client application type.
- C. Using a cross-origin resource sharing (CORS) policy for limiting the resource sharing between client applications, configured by the client application type.
- D. Using a rate-limiting policy and a client ID enforcement policy, each configured by the client application type.
Correct Answer: A
Question 2
Which key performance indicator (KPI) measures the success of a typical C4E based on the API responses from Anypoint?
- A. The number of production outage incidents reported in the last 24 hours
- B. The number of API implementations that have a publicly accessible HTTP endpoint and are managed by the Anypoint Platform
- C. The fraction of API implementations deployed manually relative to those deployed using a CI/CD tool
- D. The number of API specifications in RAML or OAS format published to Anypoint Exchange
Correct Answer: B
Reference: https://help.mulesoft.com/s/question/0D52T00004mXSTUSA4/how-should-a-company-measure-c4e-success
Question 3
An organization is working on the implementation of a Quote of the Day API that could cache today’s quote. In what scenarios can the cache’s state be persistent via the CloudHub Object Store connector?
- A. When the API implementation is deployed to three separate CloudHub regions and the cache state must be shared among them.
- B. When two Anypoint Platform business groups deploy the API implementation to the same CloudHub region, the cache state must be shared.
- C. When there are two deployments of an API implementation to CloudHub and one deployment to a customer-hosted Mule runtime where the cache state must be shared.
- D. If the API implementation has been deployed to three CloudHub workers sharing the cache state.
Correct Answer: C
Question 4
Which of the given is the best practice for building System APIs?
- A. Documenting the API by using an easily consumable asset like a RAML definition
- B. Modelling all API resources and methods for closely mimicking the operations of the backend system
- C. Building an Enterprise Data Model (Canonical Data Model) for each backend system and applying it to System APIs
- D. Exposing to API clients all technical details of the API implementation’s interaction with the backend system
Correct Answer: A
Question 5
In Anypoint Platform, what can’t be effectively enforced with an API policy?
- A. Guarding against Denial of Service attacks
- B. Maintaining tamper-proof credentials between APIs
- C. Logging HTTP requests and responses
- D. Backend system overloading
Correct Answer: A
Question 6
A company decides to migrate to an IT operating model that emphasizes the consumption of reusable IT assets through modern APIs (as defined by MuleSoft). In relation to the new IT operating model, how would you describe each modern API?
- A. Each modern API has its own software development lifecycle, reducing the need for documentation and automation.
- B. Each modern API needs to be treated like a product and designed for a particular target audience (for instance, mobile app developers)
- C. Each modern API needs to be easy to consume and must avoid complex authentication mechanisms such as SAML or JWT.
- D. Each modern API needs to be REST and HTTP based.
Correct Answer: B
Question 7
When designing an Experience API for a consumer app on a smartphone or tablet, which API policy is LESS LIKELY to be used?
- A. OAuth 2.0 access token enforcement
- B. Client ID enforcement
- C. JSON threat protection
- D. IP whitelist
Correct Answer: C
Question 8
Which of the given condition would require using a CloudHub Dedicated Load Balancer?
- A. Mule applications need cross-region load balancing when deployed in separate regions
- B. A custom DNS name is required when deploying APIs to customers’ Mule instances
- C. Load balancing of API calls across multiple CloudHub workers
- D. API implementations and API clients require load-balanced TLS mutual authentication
Correct Answer: B
Question 9
What is provided by the API invocation metrics that are provided by Anypoint Platform?
- A. ROI metrics from APIs which are directly shared with business users
- B. Measurements of the effectiveness of the application network based on the level of reuse
- C. Data on past API invocations for identifying anomalies and usage patterns across various APIs
- D. Proactive identification of likely future policy violations exceeding a specific threat threshold
Correct Answer: B
Reference: https://usermanual.wiki/Document/APAAppNetstudentManual02may2018.991784750.pdf
Question 10
If Mule applications are deployed over Anypoint Platform Private Cloud Edition or Anypoint Platform for Pivotal Cloud Foundry, what scenario must be considered?
- A. When it is required to make ALL applications highly available across multiple data centers.
- B. When it is required that ALL APIs are private and NOT exposed to the public cloud.
- C. When regulatory requirements mandate on-premises processing of EVERY data item, including meta-data.
- D. When ALL backend systems in the application network are deployed in the organization’s intranet.
Correct Answer: C
Question 11
How does API-led connectivity typically NOT benefit from the APIs created within it?
- A. providing an additional layer of resilience on top of the underlying backend system, for insulating clients from an extended failure of these systems.
- B. allowing innovation at the user interface level by consuming the underlying assets without even being aware of the process of data extraction from the backend systems.
- C. reduces the dependency on the underlying backend systems by unlocking data from backend systems in a way that is reusable and consumable.
- D. composing data from various sources and combining them with orchestration logic for creating a higher level value
Correct Answer: A
Reference: https://dzone.com/articles/api-led-connectivity-with-mule
Question 12
Which of the given statement is correct about the technology architecture of Anypoint VPCs?
- A. The private IP address range of an Anypoint VPC is automatically chosen by CloudHub.
- B. Traffic between Mule applications deployed to an Anypoint VPC and on-premises systems can stay within a private network.
- C. Each CloudHub environment requires a separate Anypoint VPC.
- D. VPC peering can be used to link the underlying AWS VPC to an on-premises (non-AWS) the private network.
Correct Answer: B
Reference: https://docs.mulesoft.com/runtime-manager/vpc-connectivity-methods-concept
Question 13
What is the typical outcome of implementing a business process using a fine-grained API deployment model rather than a coarse-grained API deployment model?
- A. decrease in the number of connections within the application network supporting the business process.
- B. the higher number of discoverable API-related assets in the application network.
- C. better response time for the end user as a result of the APIs being smaller in scope and complexity.
- D. overall lower usage of resources because each fine-grained API consumes fewer resources.
Correct Answer: C
Question 14
How should Mule unit tests be characterized?
- A. They test the validity of input and output of source and target systems.
- B. Dedicated Mule runtimes for the environment must be used for unit testing.
- C. They should be triggered by an external client tool or event source.
- D. They are generally written by using MUnit for running in an embedded Mule runtime that requires no external connectivity.
Correct Answer: B
Reference: https://dzone.com/articles/munit-framework
Question 15
Clients invoke an API implementation deployed on a CloudHub worker by calling external API clients (outside the CloudHub platform). When an API implementation stops responding to API calls, how can an alert be set up to trigger automatically?
- A. Implementing a heartbeat/health check within the API and invoking it from outside the Anypoint Platform and alerting when the heartbeat does not respond.
- B. Configuring a “worker not responding” alert in Anypoint Runtime Manager.
- C. Handling API invocation exceptions within the calling API client and raising an alert from that API client when the API is unavailable.
- D. Creating an alert for when the API receives no requests within a specified time.
Correct Answer: D
Question 16
The implementation of a Process API requires a change. Is there a valid approach to minimize the impact of this change on API clients?
- A. Updating the RAML definition of the current Process API and notifying API client developers by sending them links to the updated RAML definition.
- B. Postponing changes until API consumers acknowledge that they are ready for migrating to a new Process API or API version.
- C. Implementing required changes to the Process API implementation so that, whenever possible, the Process API’s RAML definition remains unchanged.
- D. Reimplementing the Process API in a new API implementation and returning 301 – Moved Permanently in the old API implementation to inform API clients to call the new API.
Correct Answer: A
Question 17
In API implementations, how can auto-discovery be used?
- A. making the API Manager aware of the API implementations and enabling it to enforce policies.
- B. enabling the Anypoint Studio to discover API definitions configured in Anypoint Platform.
- C. enabling Anypoint Exchange to discover assets and make them available for reuse.
- D. enabling Anypoint Analytics for gaining insight into the usage of APIs.
Correct Answer: A
Reference: https://docs.mulesoft.com/api-manager/2.x/api-auto-discovery-new-concept
Question 18
When sharing an API through the Anypoint Exchange, what should be ensured?
- A. Public visibility should be set for API instances that need to be publicly accessible.
- B. Anypoint Platform should add the users who need API access to the appropriate role.
- C. Users should be able to interact with the API once an initial implementation has been deployed.
- D. Authentication/authorization mechanisms should be used to secure APIs to prevent theft of data.
Correct Answer: A
Reference: https://docs.mulesoft.com/exchange/to-share-api-asset-to-portal
Question 19
System APIs are designed to enable data retrieval from scalability-challenged backend systems. How can the backend system be best protected by API policies?
- A. IP whitelist
- B. SLA-based rate limiting
- C. OAuth 2 token enforcement
- D. Client ID enforcement
Correct Answer: A
Reference: https://dzone.com/articles/how-to-secure-apis
Question 20
How is the fully qualified domain name (FQDN) created by Mule applications when deployed to the CloudHub Shared Worker Cloud described?
- A. IRRESPECTIVE of the environment and VPC design, a fixed number of FQDNs is created
- B. FQDNs are determined by the application name chosen, regardless of the region
- C. Once deployed, the FQDNs can be modified by the administrator, based on the application name.
- D. FQDNs are determined both by the name of the application and the organization of the Anypoint Platform
Correct Answer: B