Salesforce MULESOFT INTEGRATION ARCHITECT I Exam Questions
Questions for the MULESOFT INTEGRATION ARCHITECT I were updated on : Dec 01 ,2025
Page 1 out of 19. Viewing questions 1-15 out of 273
Question 1
The retrieveBalances flow in the Mule application is designed to use an operation in a connector to the Finance system (the Finance operation) that can only look up one account record at a time, and a operation from a different connector to the Audit system (the Audit operation) that can only insert one account record at a time. To best meet the performance-related requirements, what scope or scopes should be used and how should they be used to incorporate the Finance operation and Audit operation into the retrieveBalances flow?
A. Wrap the Finance operation in a Parallel For-Each scope. Wrap the Audit operation in a Async scope.
B. Wrap the Finance operation in a Until-Successful scope. Wrap the Audit operation in a Try-Catch scope.
C. Wrap both connector operations in a Async scope.
D. Wrap both connector operations in a For-Each scope.
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 2
A large life sciences customer plans to use the Mule Tracing module with the Mapped Diagnostic Context (MDC) logging operations to enrich logging in its Mule application and to improve tracking by providing more context in the Mule application logs. The customer also wants to improve throughput and lower the message processing latency in its Mule application flows. After installing the Mule Tracing module in the Mule application, how should logging be performed in flows in Mule applications, and what should be changed In the log4j2.xml files?
A. In the flows, add Mule Tracing module Set logging variable operations before any Core Logger components. In log4j2.xml files, change the appender's pattern layout to use %MDC and then assign the appender to a Logger or Root element.
B. In the flows, add Mule Tracing module Set logging variable operations before any Core Logger components. In log4j2.xmI files, change the appender’s pattern layout to use the %MDC placeholder and then assign the appender to an AsyncLogger element.
C. In the flows, add Mule Tracing module Set logging variable operations before any Core Logger components. In log4j2.xmI files, change the appender’'s pattern layout to use %asyncLogger placeholder and then assign the appender to an AsyncLogger element.
D. In the flows, wrap Logger components in Async scopes. In log4j2.xmI files, change the appender's pattern layout to use the %asyncLogger placeholder and then assign the appender to a Logger or Root element.
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 3
An organization is building out a test suite for their application using MUnit. The Integration Architect has recommended using Test Recorder in Anypoint Studio to record the processing flows and then configure unit tests based on the captured events. What Is a core consideration that must be kept In mind while using Test Recorder?
A. The Recorder supports loops where the structure of the data being tested changes inside the Iteration
B. Mocking values resulting from parallel processes are possible and will not affect theexecution of the processors that follow in the test
C. The Recorder supports mocking a message before or inside a Foreach processor
D. Tests for flows cannot be created if Mule errors are raised Inside the flows, even if the errors are handled by On-Error Continue error handlers
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 4
An architect is designing a Mule application to meet the following two requirements: 1. The application must process files asynchronously and reliably from an FTPS server to a back-end database using VM intermediary queues for load-balancing Mule events. 2. The application must process a medium rate of records from a source to a target system using a Batch Job scope. To make the Mule application more reliable, the Mule application will be deployed to two CloudHub 1.0 workers. Following MuleSoft-recommended best practices, how should the Mule application deployment typically be configured in Runtime Manger to best support the performance and reliability goals of both the Batch Job scope and the file processing VM queues?
A. Check the Persistent VM queues checkbox in the application deployment configuration
B. Check the Non-persistent VM queues checkbox in the application deployment configuration
C. In the Runtime Manager Properties tab, disable persistent VM queues for Batch Job scopes
D. In the Runtime Manager Properties tab, enable persistent VM queues for the FTPS connector
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 5
Following MuleSoft best practices, what MuleSoft runtime deployment option best meets the company's goals to begin its digital transformation journey?
A. Runtime Fabric on VMs/bare metal
B. CloudHub runtimes
C. Customer-hosted runtimes provisioned by a MuleSoft services partner
D. Customer-hosted self-provisioned runtimes
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 6
A gaming company has implemented an API as a Mule application and deployed the API implementation to a CloudHub 2.0 private space. The API implementation must connect to a mainframe application running in the customer’s on-premises corporate data center and also to a Kafka cluster running in an Amazon AWS VPC. What is the most efficient way to enable the API to securely connect from its private space to the mainframe application and Kafka cluster?
A. Option A
B. Option B
C. Option C
D. Option D
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 7
Refer to the exhibit. A customer is running Mule applications on Runtime Fabric for Self-Managed Kubernetes (RTF-BYOKS) in a multi-cloud environment. Based on this configuration, how do Agents and Runtime Manager communicate, and what Is exchanged between them?
A. BLOCKING_IO, UBER
B. UBER, Dedicated NIO Selector Pool
C. CPU_LITE, CPU_INTENSIVE
D. Shared NIO Selector Pool, CPU_LITE
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 8
A stock trading company handles millions of trades a day and requires excellent performance and reliability within its stock trading system. The company operates a number of event-driven APIs Implemented as Mule applications that are hosted on various customer-hosted Mule clusters and needs to enable message exchanges between the APIs within their internal network using shared message queues. What is an effective way to meet the cross-cluster messaging requirements of its event-driven APIs?
A. Non-transactional JMS operations with a reliability pattern and manual acknowledgements
B. Persistent VM queues with automatic acknowledgements
C. JMS transactions with automatic acknowledgements
D. extended Architecture (XA) transactions and XA connected components with manual acknowledgements
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 9
Why would an Enterprise Architect use a single enterprise-wide canonical data model (CDM) when designing an integration solution using Anypoint Platform?
A. To reduce dependencies when integrating multiple systems that use different data formats
B. To automate Al-enabled API implementation generation based on normalized backend databases from separate vendors
C. To leverage a data abstraction layer that shields existing Mule applications from nonbackward compatible changes to the model's data structure
D. To remove the need to perform data transformation when processing message payloads in Mule applications
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 10
A payment processing company has implemented a Payment Processing API Mule application to process credit card and debit card transactions, Because the Payment Processing API handles highly sensitive information, the payment processing company requires that data must be encrypted both In-transit and at-rest. To meet these security requirements, consumers of the Payment Processing API must create request message payloads in a JSON format specified by the API, and the message payload values must be encrypted. How can the Payment Processing API validate requests received from API consumers?
A. A Transport Layer Security (TLS) - Inbound policy can be applied in API Manager to decrypt the message payload and the Mule application implementation can then use the JSON Validation module to validate the JSON data
B. The Mule application implementation can use the APIkit module to decrypt and then validate the JSON data
C. The Mule application implementation can use the Validation module to decrypt and then validate the JSON data
D. The Mule application implementation can use DataWeave to decrypt the message payload and then use the JSON Scheme Validation module to validate the JSON data
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 11
An organization plans to migrate its deployment environment from an onpremises cluster to a Runtime Fabric (RTF) cluster. The on-premises Mule applications are currently configured with persistent object stores. There is a requirement to enable Mule applications deployed to the RTF cluster to store and share data across application replicas and through restarts of the entire RTF cluster, How can these reliability requirements be met?
A. Replace persistent object stores with persistent VM queues in each Mule application deployment
B. Install the Object Store pod on one of the cluster nodes
C. Configure Anypoint Object Store v2 to share data between replicas in the RTF cluster
D. Configure the Persistence Gateway in the RTF installation
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 12
A new Mule application has been deployed through Runtime Manager to CloudHub 1.0 using a CI/CD pipeline with sensitive properties set as cleartext. The Runtime Manager Administrator opened a high priority incident ticket about this violation of their security requirements indicating these sensitive properties values must not be stored or visible in Runtime Manager but should be changeable in Runtime Manager by Administrators with proper permissions. How can the Mule application be deployed while safely hiding the sensitive properties?
A. Add an ArrayList of all the sensitive properties’ names in the mule-artifact.json file of the application
B. Add encrypted versions of the sensitive properties as global configuration properties in the Mule application
C. Add a new wrapper.java.additional.xx parameter for each sensitive property in the wrapper.conf file used by the CI/CD pipeline scripts
D. Create a variable for each sensitive property and declare them as hidden in the CI/CD pipeline scripts
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 13
The company's FTPS server login username and password
A. TLS context trust store containing a public certificate for the company. The company's PGP public key that was used to sign the files
B. The partner's PGP public key used by the company to login to the FTPS server. A TLS context key store containing the private key for the company The partner's PGP private key that was used to sign the files
C. The company's FTPS server login username and password. A TLS context trust store containing a public certificate for ftps.partner.com The partner's PGP public key that was used to sign the files
D. The partner's PGP public key used by the company to login to the FTPS server. A TLS context key store containing the private key for ftps.partner.com The company's PGP private key that was used to sign the files
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 14
What requirement prevents using Anypoint MQ as the messaging broker for a Mule application?
A. When the payload sent through the message broker must use XML format
B. When the payload sent through the message broker must be encrypted
C. When the messaging broker must support point-to-point messaging
D. When the messaging broker must be deployed on-premises
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 15
An organization plans to use the Anypoint Platform audit logging service to log Anypoint MQ actions. What consideration must be kept in mind when leveraging Anypoint MQ Audit Logs?
A. Anypoint MQ Audit Logs include logs for sending, receiving, or browsing messages
B. Anypoint MQ Audit Logs include fogs for failed Anypoint MQ operations
C. Anypoint MQ Audit Logs include logs for queue create, delete, modify, and purge operations