Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: get65

Salesforce Updated MuleSoft-Integration-Architect-I Exam Questions and Answers by damon

Page: 4 / 20

Salesforce MuleSoft-Integration-Architect-I Exam Overview :

Exam Name: Salesforce Certified MuleSoft Platform Integration Architect (Mule-Arch-202)
Exam Code: MuleSoft-Integration-Architect-I Dumps
Vendor: Salesforce Certification: Salesforce MuleSoft
Questions: 273 Q&A's Shared By: damon
Question 16

A leading eCommerce giant will use MuleSoft APIs on Runtime Fabric (RTF) to process customer orders. Some customer-sensitive information, such as credit card information, is required in request payloads or is included in response payloads in some of the APIs. Other API requests and responses are not authorized to access some of this customer-sensitive information but have been implemented to validate and transform based on the structure and format of this customer-sensitive information (such as account IDs, phone numbers, and postal codes).

What approach configures an API gateway to hide sensitive data exchanged between API consumers and API implementations, but can convert tokenized fields back to their original value for other API requests or responses, without having to recode the API implementations?

Later, the project team requires all API specifications to be augmented with an additional non-functional requirement (NFR) to protect the backend services from a high rate of requests, according to defined service-level

agreements (SLAs). The NFR's SLAs are based on a new tiered subscription level "Gold", "Silver", or "Platinum" that must be tied to a new parameter that is being added to the Accounts object in their enterprise data model.

Following MuleSoft's recommended best practices, how should the project team now convey the necessary non-functional requirement to stakeholders?

Options:

A.

Create and deploy API proxies in API Manager for the NFR, change the baseurl in eachAPI specification to the corresponding API proxy implementation endpoint, and publish each modified API specification to Exchange

B.

Update each API specification with comments about the NFR's SLAs and publish each modified API specification to Exchange

C.

Update each API specification with a shared RAML fragment required to implement the NFR and publish the RAML fragment and each modified API specification to Exchange

D.

Create a shared RAML fragment required to implement the NFR, list each API implementation endpoint in the RAML fragment, and publish the RAML fragment to Exchange

Discussion
Madeleine
Passed my exam with my dream score…. Guys do give these dumps a try. They are authentic.
Ziggy Feb 1, 2026
That's really impressive. I think I might give Cramkey Dumps a try for my next certification exam.
Victoria
Hey, guess what? I passed the certification exam! I couldn't have done it without Cramkey Dumps.
Isabel Feb 20, 2026
Same here! I was so surprised when I saw that almost all the questions on the exam were exactly what I found in their study materials.
Everleigh
I must say that they are updated regularly to reflect the latest exam content, so you can be sure that you are getting the most accurate information. Plus, they are easy to use and understand, so even new students can benefit from them.
Huxley Feb 8, 2026
That's great to know. So, you think new students should buy these dumps?
Fatima
Hey I passed my exam. The world needs to know about it. I have never seen real exam questions on any other exam preparation resource like I saw on Cramkey Dumps.
Niamh Feb 4, 2026
That's true. Cramkey Dumps are simply the best when it comes to preparing for the certification exam. They have all the key information you need and the questions are very similar to what you'll see on the actual exam.
Annabel
I recently used them for my exam and I passed it with excellent score. I am impressed.
Amirah Feb 10, 2026
I passed too. The questions I saw in the actual exam were exactly the same as the ones in the Cramkey Dumps. I was able to answer the questions confidently because I had already seen and studied them.
Question 17

One of the backend systems involved by the API implementation enforces rate limits on the number of request a particle client can make.

Both the back-end system and API implementation are deployed to several non-production environments including the staging environment and to a particular production environment. Rate limiting of the back-end system applies to all non-production environments.

The production environment however does not have any rate limiting.

What is the cost-effective approach to conduct performance test of the API implementation in the non-production staging environment?

Options:

A.

Including logic within the API implementation that bypasses in locations of the back-end system in the staging environment and invoke a Mocking service that replicates typical back-end system responsesThen conduct performance test using this API implementation

B.

Use MUnit to simulate standard responses from the back-end system.Then conduct performance test to identify other bottlenecks in the system

C.

Create a Mocking service that replicates the back-end system'sproduction performance characteristicsThen configure the API implementation to use the mockingservice and conduct the performance test

D.

Conduct scaled-down performance tests in the staging environment against rate-limiting back-end system. Then upscale performance results to full production scale

Discussion
Question 18

An organization has an HTTPS-enabled Mule application named Orders API that receives requests from another Mule application named Process Orders.

The communication between these two Mule applications must be secured by TLS mutual authentication (two-way TLS).

At a minimum, what must be stored in each truststore and keystore of these two Mule applications to properly support two-way TLS between the two Mule applications while properly protecting each Mule application's keys?

Options:

A.

Orders API truststore: The Orders API public keyProcess Orders keystore: The Process Orders private key and public key

B.

Orders API truststore: The Orders API private key and public keyProcess Orders keystore: The Process Orders private key public key

C.

Orders API truststore: The Process Orders public keyOrders API keystore: The Orders API private key and public keyProcess Orders truststore: The Orders API public keyProcess Orders keystore: The Process Orders private key and public key

D.

Orders API truststore: The Process Orders public keyOrders API keystore: The Orders API private keyProcess Orders truststore: The Orders API public keyProcess Orders keystore: The Process Orders private key

Discussion
Question 19

An organization is using Mulesoft cloudhub and develops API's in the latest version. As a part of requirements for one of the API's, third party API needs to be called. The security team has made it clear that calling any external API needs to have include listing

As an integration architect please suggest the best way to accomplish the design plan to support these requirements?

Options:

A.

Implement includelist IP on the cloudhub VPC firewall to allow the traffic

B.

Implement the validation of includelisted IP operation

C.

Implement the Any point filter processor to implement the include list IP

D.

Implement a proxy for the third party API and enforce the IPinclude list policy and call this proxy from the flow of the API

Discussion
Page: 4 / 20
Title
Questions
Posted

MuleSoft-Integration-Architect-I
PDF

$36.75  $104.99

MuleSoft-Integration-Architect-I Testing Engine

$43.75  $124.99

MuleSoft-Integration-Architect-I PDF + Testing Engine

$57.75  $164.99