Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Salesforce MuleSoft-Platform-Architect-I Practice Exam with Questions & Answers | Set: 4

Questions 31

Which of the below, when used together, makes the IT Operational Model effective?

Options:
A.

Create reusable assets, Do marketing on the created assets across organization, Arrange time to time LOB reviews to ensure assets are being consumed or not

B.

Create reusable assets, Make them discoverable so that LOB teams can self-serve and browse the APIs, Get active feedback and usage metrics

C.

Create resuable assets, make them discoverable so that LOB teams can self-serve and browse the APIs

Salesforce MuleSoft-Platform-Architect-I Premium Access
Questions 32

What is true about automating interactions with Anypoint Platform using tools such as Anypoint Platform REST APIs, Anypoint CU, or the Mule Maven plugin?

Options:
A.

Access to Anypoint Platform APIs and Anypoint CU can be controlled separately through the roles and permissions in Anypoint Platform, so that specific users can get access to Anypoint CLI white others get access to the platform APIs

B.

Anypoint Platform APIs can ONLY automate interactions with CloudHub, while the Mule Maven plugin is required for deployment to customer-hosted Mule runtimes

C.

By default, the Anypoint CLI and Mule Maven plugin are NOT included in the Mule runtime, so are NOT available to be used by deployed Mule applications

D.

API policies can be applied to the Anypoint Platform APIs so that ONLY certain LOBs have access to specific functions

Questions 33

An organization has implemented a Customer Address API to retrieve customer address information. This API has been deployed to multiple environments and has been configured to enforce client IDs everywhere.

A developer is writing a client application to allow a user to update their address. The developer has found the Customer Address API in Anypoint Exchange and wants to use it in their client application.

What step of gaining access to the API can be performed automatically by Anypoint Platform?

Options:
A.

Approve the client application request for the chosen SLA tier

B.

Request access to the appropriate API Instances deployed to multiple environments using the client application's credentials

C.

Modify the client application to call the API using the client application's credentials

D.

Create a new application in Anypoint Exchange for requesting access to the API

Questions 34

An Order API must be designed that contains significant amounts of integration logic and involves the invocation of the Product API.

The power relationship between Order API and Product API is one of "Customer/Supplier", because the Product API is used heavily throughout the organization and is developed by a dedicated development team located in the office of the CTO.

What strategy should be used to deal with the API data model of the Product API within the Order API?

Options:
A.

Convince the development team of the Product API to adopt the API data model of the Order API such that the integration logic of the Order API can work with one consistent internal data model

B.

Work with the API data types of the Product API directly when implementing the integration logic of the Order API such that the Order API uses the same (unchanged) data types as the Product API

C.

Implement an anti-corruption layer in the Order API that transforms the Product API data model into internal data types of the Order API

D.

Start an organization-wide data modeling initiative that will result in an Enterprise Data Model that will then be used in both the Product API and the Order API

Questions 35

Which component monitors APIs and endpoints at scheduled intervals, receives reports about whether tests pass or fail, and displays statistics about API and endpoint

performance?

Options:
A.

API Analytics

B.

Anypoint Monitoring dashboards

C.

APT Functional Monitoring

D.

Anypoint Runtime Manager alerts

Questions 36

The Line of Business (LoB) of an eCommerce company is requesting a process that sends automated notifications via email every time a new order is processed through the

customer's mobile application or through the internal company's web application. In the future, multiple notification channels may be added: for example, text messages and

push notifications.

What is the most effective API-led connectivity approach for the scenario described above?

Options:
A.

Create one Experience API for the web application and one for the mobile application.

Create a Process API to orchestrate and retrieve the email template from = database.

Create a System API that sends the email using the Anypoint Connector for Email.

Create one Experience API for the web application and one for the mobile application.

Create a Process API to orchestrate and retrieve the email template from

B.

Create one Experience API for the web application and one for the mobile application,

Create a Process API to orchestrate, retrieve the email template from a database, and send the email using the Anypoint Connector for Email.

36

C.

Create Experience APIs for both the web application and mobile application.

Create a Process API ta orchestrate, retrieve the email template from e database, and send the email using the Anypoint Connector for Email.

\

D.

Create Experience APIs for both the web application and mobile application.

(Create 3 Process API to orchestrate and retrieve the email template from 2 databese.

Create a System API that sends the email using the Anypoint Connector for Email.

Questions 37

Once an API Implementation is ready and the API is registered on API Manager, who should request the access to the API on Anypoint Exchange?

Options:
A.

None

B.

Both

C.

API Client

D.

API Consumer

Questions 38

4 Production environment is running on a dedicated Virtual Private Cloud (VPC) on CloudHub 1,0, and the security team guidelines clearly state no traffic on HTTP.

Which two options support these security guidelines?

Choose 2 answers

Options:
A.

Configure the HTTPS protocol in HTTP listener in the Mule application

B.

Create a custom policy to apply to outgoing and incoming HTTP requests to control access to a configured API endpoint

C.

Remove the entry from the VPC firewall rule

38

D.

Configure the IP Blocklist policy to control access to a configured API endpoint from either a single IP address or a range of IP addresses.

E.

Add the entry in the VPC firewall rule.

38

Questions 39

A company stores financial transaction data in two legacy systems. For each legacy system, a separate, dedicated System API (SAPI) exposes data for that legacy system. A Process API (PAPI) merges the data retrieved from ail of the System APIs into a common format. Several API clients call the PAPI through its public domain name.

The company now wants to expose a subset of financial data to a newly developed mobile application that uses a different Bounded Context Data Model. The company wants to follow MuleSoft's best practices for building out an effective application network.

Following MuleSoft's best practices, how can the company expose financial data needed by the mobile application in a way that minimizes the impact on the currently running API clients, API implementations, and support asset reuse?

Options:
A.

Add two new Experience APIs (EAPI-i and EAPI-2}.

Add Mobile PAPI-2 to expose the Intended subset of financial data as requested.

Both PAPIs access the Legacy Systems via SAPI-1 and SAP]-2.

B.

Add two new Experience APIs (EAPI-i and EAPI-2}.

Add Mobile PAPI-2 to expose the Intended subset of financial data as requested.

Both PAPIs access the Legacy Systems via SAPI-1 and SAP]-2.

C.

Create a new mobile Experince API (EAPI) chat exposes that subset of PAPI endpoints.

Add transformtion login to the mobile Experince API implementation to make mobile data compatible with the required PAPIs.

39

D.

Develop and deploy is new PAPI implementation with data transformation and ... login to support this required endpoints of both mobile and web clients.

Deploy an API Proxy with an endpoint from API Manager that redirect the existing PAPI endpoints to the new PAPI.

Questions 40

An organization has several APIs that accept JSON data over HTTP POST. The APIs are all publicly available and are associated with several mobile applications and web applications.

The organization does NOT want to use any authentication or compliance policies for these APIs, but at the same time, is worried that some bad actor could send payloads that could somehow compromise the applications or servers running the API implementations.

What out-of-the-box Anypoint Platform policy can address exposure to this threat?

Options:
A.

Shut out bad actors by using HTTPS mutual authentication for all API invocations

B.

Apply an IP blacklist policy to all APIs; the blacklist will Include all bad actors

C.

Apply a Header injection and removal policy that detects the malicious data before it is used

D.

Apply a JSON threat protection policy to all APIs to detect potential threat vectors

Certification Provider: Salesforce
Exam Name: Salesforce Certified MuleSoft Platform Architect 1 Exam (SP25)
Last Update: Jul 15, 2025
Questions: 152

Salesforce Free Exams

Salesforce Free Exams
Examstrack provides free Salesforce exam prep materials and practice tests to support your Salesforce certification goals.