Free MCIA - Level 1 Sample Questions — MuleSoft Certified Integration Architect - Level 1

Free MCIA - Level 1 sample questions for the MuleSoft Certified Integration Architect - Level 1 exam. No account required: study at your own pace.

Want an interactive quiz? Take the full MCIA - Level 1 practice test

Looking for more? Click here to get the full PDF with 68+ practice questions for $10 for offline study and deeper preparation.

Question 1

The AnyAirline organization's passenger reservations center is designing an integration solution that combines invocations of three different System APIs (bookFlight, bookHotel, and bookCar) in a business transaction. Each System API makes calls to a single database. The entire business transaction must be rolled back when at least one of the APIs fails. What is the most idiomatic (used for its intended purpose) way to integrate these APIs in near real-time that provides the best balance of consistency, performance, and reliability?

  • A. Implement eXtended Architecture (XA) transactions between the API implementations Coordinate between the API implementations using a Saga pattern Implement caching in each API implementation to improve performance
  • B. Implement local transactions within each API implementation Configure each API implementation to also participate in the same eXtended Architecture (XA) transaction Implement caching in each API implementation to improve performance
  • C. Implement local transactions in each API implementation Coordinate between the API implementations using a Saga pattern Apply various compensating actions depending on where a failure occurs
  • D. Implement an eXtended Architecture (XA) transaction manager in a Mule application using a Saga pattern Connect each API implementation with the Mule application using XA transactions Apply various compensating actions depending on where a failure occurs
Show Answer
Correct Answer:
C. Implement local transactions in each API implementation Coordinate between the API implementations using a Saga pattern Apply various compensating actions depending on where a failure occurs
Question 2

A Mule application uses an HTTP Request operation to invoke an external API. The external API follows the HTTP specification for proper status code usage. What is a possible cause when a 3xx status code is returned to the HTTP Request operation from the external API?

  • A. The request was ACCEPTED by the external API
  • B. The request was REDIRECTED to a different URL by the external API
  • C. The request was NOT RECEIVED by the external API
  • D. The request was NOT ACCEPTED by the external API
Show Answer
Correct Answer:
B. The request was REDIRECTED to a different URL by the external API
Question 3

An ABC Farms project team is planning to build a new API that is required to work with data from different domains across the organization. The organization has a policy that all project teams should leverage existing investments by reusing existing APIs and related resources and documentation that other project teams have already developed and deployed. To support reuse, where on Anypoint Platform should the project team go to discover and read existing APIs, discover related resources and documentation, and interact with mocked versions of those APIs?

  • A. Design Center
  • B. API Manager
  • C. Runtime Manager
  • D. Anypoint Exchange
Show Answer
Correct Answer:
D. Anypoint Exchange
Question 4

What aspects of a CI/CD pipeline for Mule applications can be automated using MuleSoft-provided Maven plugins?

  • A. Import from API designer, compile, package, unit test, deploy, publish to Anypoint Exchange
  • B. Compile, package, unit test, validate unit test coverage, deploy
  • C. Compile, package, unit test, deploy, integration test
  • D. Compile, package, unit test, deploy, create associated API instances in API Manager
Show Answer
Correct Answer:
B. Compile, package, unit test, validate unit test coverage, deploy
Question 5

A Mule application named Inventory uses a persistent object store. The Inventory Mule application is deployed to CloudHub and is configured to use Object Store v2. Another Mule application named Roomba is being developed to delete values from the Inventory Mule application's persistent object store. The Roomba Mule application will also be deployed to CloudHub. What is the most direct way for the Roomba Mule application to delete values from the Inventory Mule application's persistent object store with the least latency?

  • A. Use the Object Store v2 REST API configured to access the Inventory Mule application's persistent object store
  • B. Use a VM connector configured to directly access the persistent queue of the Inventory Mule application's persistent object store
  • C. Use an Object Store connector configured to access the Inventory Mule application's persistent object store
  • D. Use an Anypoint MQ connector configured to directly access the Inventory Mule application's persistent object store
Show Answer
Correct Answer:
A. Use the Object Store v2 REST API configured to access the Inventory Mule application's persistent object store
Question 6

An organization currently uses a multi-node Mule runtime deployment model within their datacenter, so each Mule runtime hosts several Mule applications. The organization is planning to transition to a deployment model based on Docker containers in a Kubernetes cluster. The organization has already created a standard Docker image containing a Mule runtime and all required dependencies (including a JVM), but excluding the Mule application itself. What is an expected outcome of this transition to container-based Mule application deployments?

  • A. Guaranteed consistency of execution environments across all deployments of a Mule application
  • B. Required change to the URL endpoints used by clients to send requests to the Mule applications
  • C. Required migration to the Docker and Kubernetes-based Anypoint Platform - Private Cloud Edition
  • D. Required redesign of Mule applications to follow microservice architecture principles
Show Answer
Correct Answer:
D. Required redesign of Mule applications to follow microservice architecture principles
Question 7

A Mule application contains a Batch Job scope with several Batch Step scopes. The Batch Job scope is configured with a batch block size of 25. A payload with 4,000 records is received by the Batch Job scope. When there are no errors, how does the Batch Job scope process records within and between the Batch Step scopes?

  • A. The Batch Job scope processes multiple record blocks in parallel, and a block of 25 records can jump ahead to the next Batch Step scope over an earlier block of records Each Batch Step scope is invoked with one record in the payload of the received Mule event For each Batch Step scope, all 25 records within a block are processed in parallel All the records in a block must be completed before the block of 25 records is available to the next Batch Step scope
  • B. The Batch Job scope processes each record block sequentially, one at a time Each Batch Step scope is invoked with one record in the payload of the received Mule event For each Batch Step scope, all 25 records within a block are processed sequentially, one at a time All 4000 records must be completed before the blocks of records are available to the next Batch Step scope
  • C. The Batch Job scope processes multiple record blocks in parallel, and a block of 25 records can jump ahead to the next Batch Step scope over an earlier block of records Each Batch Step scope is invoked with one record in the payload of the received Mule event For each Batch Step scope, all 25 records within a block are processed sequentially, one record at a time All the records in a block must be completed before the block of 25 records is available to the next Batch Step scope
  • D. The Batch Job scope processes multiple record blocks in parallel Each Batch Step scope is invoked with a batch of 25 records in the payload of the received Mule event For each Batch Step scope, all 4000 records are processed in parallel Individual records can jump ahead to the next Batch Step scope before the rest of the records finish processing in the current Batch Step scope
Show Answer
Correct Answer:
C. The Batch Job scope processes multiple record blocks in parallel, and a block of 25 records can jump ahead to the next Batch Step scope over an earlier block of records Each Batch Step scope is invoked with one record in the payload of the received Mule event For each Batch Step scope, all 25 records within a block are processed sequentially, one record at a time All the records in a block must be completed before the block of 25 records is available to the next Batch Step scope
Question 8

An organization will deploy Mule applications to CloudHub. Business requirements mandate that all application logs be stored ONLY in an external Splunk consolidated logging service and NOT in CloudHub. In order to most easily store Mule application logs ONLY in Splunk, how must Mule application logging be configured in Runtime Manager, and where should the log4j2 Splunk appender be defined?

  • A. Disable CloudHub logging in Runtime Manager Define the Splunk appender in ONE global log4j2.xml file that is uploaded once to Runtime Manager to support all Mule application deployments
  • B. Keep the default logging configuration in Runtime Manager Define the Splunk appender in ONE global log4j2.xml file that is uploaded once to Runtime Manager to support all Mule application deployments
  • C. Disable CloudHub logging in Runtime Manager Define the Splunk appender in EACH Mule application's log4j2.xml file
  • D. Keep the default logging configuration in Runtime Manager Define the Splunk appender in EACH Mule application's log4j2.xml file
Show Answer
Correct Answer:
C. Disable CloudHub logging in Runtime Manager Define the Splunk appender in EACH Mule application's log4j2.xml file
Question 9

A Mule application is deployed to a cluster of two (2) customer-hosted Mule runtimes. Currently, the node named Alice is the primary node and the node named Bob is the secondary node. The Mule application has a flow that polls a directory on a file system for new files. The primary node Alice fails for an hour and then is restarted. After the Alice node completely restarts, from what node are the files polled, and what node is now the primary node for the cluster?

  • A. Files are polled from the Bob node Bob is now the primary node
  • B. Files are polled from the Bob node Alice is now the primary node
  • C. Files are polled from the Alice node Alice is now the primary node
  • D. Files are polled from the Alice node Bob is now the primary node
Show Answer
Correct Answer:
A. Files are polled from the Bob node Bob is now the primary node
Question 10

An XA transaction is being configured that involves a JMS connector listening for incoming JMS messages. What is the meaning of the timeout attribute of the XA transaction, and what happens after the timeout expires?

  • A. The time that is allowed to pass without the transaction being ended explicitly After the timeout, the transaction is forcefully rolled-back
  • B. The time that is allowed to pass for stale JMS consumer threads to be destroyed After the timeout, a new JMS consumer thread is created
  • C. The time that is allowed to pass between receiving JMS messages on the same JMS connection After the timeout, a new JMS connection is established
  • D. The time that is allowed to pass between committing the transaction and the completion of the Mule flow After the timeout, flow processing triggers an error
Show Answer
Correct Answer:
A. The time that is allowed to pass without the transaction being ended explicitly After the timeout, the transaction is forcefully rolled-back
Question 11

A new Mule application under development must implement extensive data transformation logic. Some of the data transformation functionality is already available as external transformation services that are mature and widely used across the organization; the rest is highly specific to the new Mule application. The organization follows a rigorous testing approach, where every service and application must be extensively acceptance tested before it is allowed to go into production. What is the best way to implement the data transformation logic for this new Mule application while minimizing the overall testing effort?

  • A. Implement transformation logic in the new Mule application using DataWeave, replicating the transformation logic of existing transformation services
  • B. Implement transformation logic in the new Mule application using DataWeave, invoking existing transformation services when possible
  • C. Extend the existing transformation services with new transformation logic and invoke them from the new Mule application
  • D. Implement and expose all transformation logic as microservices using DataWeave, so it can be reused by any application component that needs it, including the new Mule application
Show Answer
Correct Answer:
B. Implement transformation logic in the new Mule application using DataWeave, invoking existing transformation services when possible
Question 12

What operation can be performed through a JMX agent enabled in a Mule application?

  • A. View object store entries
  • B. Replay an unsuccessful message
  • C. Deploy a Mule application
  • D. Set a particular log4j2 log level to TRACE
Show Answer
Correct Answer:
D. Set a particular log4j2 log level to TRACE
Question 13

A Mule application is built to support a local transaction for a series of operations on a single database. The Mule application has a Scatter-Gather that participates in the local transaction. What is the behavior of the Scatter-Gather when running within this local transaction?

  • A. Execution of each route within the Scatter-Gather occurs sequentially Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations
  • B. Execution of all routes within the Scatter-Gather occurs in parallel Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations
  • C. Execution of each route within the Scatter-Gather occurs sequentially Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations
  • D. Execution of each route within the Scatter-Gather occurs in parallel Any error that occurs inside the Scatter-Gather will NOT result in a rollback of any of the database operations
Show Answer
Correct Answer:
A. Execution of each route within the Scatter-Gather occurs sequentially Any error that occurs inside the Scatter-Gather will result in a rollback of all the database operations
Question 14

An organization has various integrations implemented as Mule applications. Some of these Mule applications are deployed to customer-hosted Mule runtimes (on- premises) while others execute in the MuleSoft-hosted runtime plane (CloudHub). To perform the integration functionality, these Mule applications connect to various backend systems, with multiple applications typically needing to access the same backend systems. How can the organization most effectively avoid creating duplicates in each Mule application of the credentials required to access the backend systems?

  • A. Create a Mule domain project that maintains the credentials as Mule domain-shared resources Deploy the Mule applications to the Mule domain, so the credentials are available to the Mule applications
  • B. Configure or create a credentials service that returns the credentials for each backend system, and that is accessible from customer-hosted and MuleSoft- hosted Mule runtimes Have the Mule applications load the properties at startup by invoking that credentials service
  • C. Store the credentials in properties files in a shared folder within the organization's data center Have the Mule applications load properties files from this shared location at startup
  • D. Segregate the credentials for each backend system into environment-specific properties files Package these properties files in each Mule application, from where they are loaded at startup
Show Answer
Correct Answer:
B. Configure or create a credentials service that returns the credentials for each backend system, and that is accessible from customer-hosted and MuleSoft- hosted Mule runtimes Have the Mule applications load the properties at startup by invoking that credentials service
Question 15

An organization has implemented a continuous integration (CI) lifecycle that promotes Mule applications through code, build, and test stages. To standardize the organization's CI journey, a new dependency control approach is being designed to store artifacts that include information such as dependencies, versioning, and build promotions. To implement these process improvements, the organization will now require developers to maintain all dependencies related to Mule application code in a shared location. What is the most idiomatic (used for its intended purpose) type of system the organization should use in a shared location to standardize all dependencies related to Mule application code?

  • A. MuleSoft-managed repository at repository.mulesoft.org
  • B. binary artifact repository
  • C. API Community Manager
  • D. The Anypoint Object Store service at cloudhub.io
Show Answer
Correct Answer:
B. binary artifact repository
Question 16

A Mule application currently writes to two separate SQL Server database instances across the internet using a single XA transaction. It is proposed to split this one transaction into two separate non-XA transactions with no other changes to the Mule application. What non-functional requirement can be expected to be negatively affected when implementing this change?

  • A. Throughput
  • B. Availability
  • C. Response time
  • D. Consistency
Show Answer
Correct Answer:
D. Consistency
Question 17

An organization's security requirements mandate centralized control at all times over authentication and authorization of external applications when invoking web APIs managed on Anypoint Platform. What Anypoint Platform feature is most idiomatic (used for its intended purpose), straightforward, and maintainable to use to meet this requirement?

  • A. Client management configured in access management
  • B. Identity management configured in access management
  • C. Enterprise Security module coded in Mule applications
  • D. External access configured in API Manager
Show Answer
Correct Answer:
A. Client management configured in access management
Question 18

A global organization operates datacenters in many countries. There are private network links between these datacenters because all business data (but NOT metadata) must be exchanged over these private network connections. The organization does not currently use AWS in any way. The strategic decision has just been made to rigorously minimize IT operations effort and investment going forward. What combination of deployment options of the Anypoint Platform control plane and runtime plane(s) best serves this organization at the start of this strategic journey?

  • A. MuleSoft-hosted Anypoint Platform control plane CloudHub Shared Worker Cloud in multiple AWS regions
  • B. MuleSoft-hosted Anypoint Platform control plane Customer-hosted runtime plane in multiple AWS regions
  • C. MuleSoft-hosted Anypoint Platform control plane Customer-hosted runtime plane in each datacenter
  • D. Anypoint Platform - Private Cloud Edition Customer-hosted runtime plane in each datacenter
Show Answer
Correct Answer:
C. MuleSoft-hosted Anypoint Platform control plane Customer-hosted runtime plane in each datacenter
Question 19

An organization is evaluating using the CloudHub Shared Load Balancer (SLB) vs. creating a CloudHub dedicated load balancer (DLB). They are evaluating how this choice affects the various types of certificates used by CloudHub-deployed Mule applications, including MuleSoft-provided, customer-provided, or Mule application-provided certificates. What type of restrictions exist on the types of certificates that can be exposed by the CloudHub Shared Load Balancer (SLB) to external web clients over the public Internet?

  • A. Only underlying Mule application certificates are exposed (pass-through)
  • B. Only customer-provided self-signed certificates are exposed
  • C. Only MuleSoft-provided certificates are exposed
  • D. Only customer-provided wildcard certificates are exposed
Show Answer
Correct Answer:
C. Only MuleSoft-provided certificates are exposed
Question 20

In Anypoint Platform, a company wants to configure multiple identity providers (IdPs) for multiple lines of business (LOBs). Multiple business groups, teams, and environments have been defined for these LOBs. What Anypoint Platform feature can use multiple IdPs across the company’s business groups, teams, and environments?

  • A. MuleSoft-hosted (CloudHub) dedicated load balancers
  • B. Client (application) management
  • C. Virtual private clouds
  • D. Permissions
Show Answer
Correct Answer:
B. Client (application) management

Aced these? Get the Full Exam

Download the complete MCIA - Level 1 study bundle with 68+ questions in a single printable PDF.