Salesforce-MuleSoft-Platform-Architect Exam Questions With Explanations

The best Salesforce-MuleSoft-Platform-Architect practice exam questions with research based explanations of each question will help you Prepare & Pass the exam!

Over 15K Students have given a five star review to SalesforceKing

Why choose our Practice Test

By familiarizing yourself with the Salesforce-MuleSoft-Platform-Architect exam format and question types, you can reduce test-day anxiety and improve your overall performance.

Up-to-date Content

Ensure you're studying with the latest exam objectives and content.

Unlimited Retakes

We offer unlimited retakes, ensuring you'll prepare each questions properly.

Realistic Exam Questions

Experience exam-like questions designed to mirror the actual Salesforce-MuleSoft-Platform-Architect test.

Targeted Learning

Detailed explanations help you understand the reasoning behind correct and incorrect answers.

Increased Confidence

The more you practice, the more confident you will become in your knowledge to pass the exam.

Study whenever you want, from any place in the world.

Salesforce Salesforce-MuleSoft-Platform-Architect Exam Sample Questions 2025

Start practicing today and take the fast track to becoming Salesforce Salesforce-MuleSoft-Platform-Architect certified.

21524 already prepared
Salesforce Spring 25 Release
152 Questions
4.9/5.0

When using CloudHub with the Shared Load Balancer, what is managed EXCLUSIVELY by the API implementation (the Mule application) and NOT by Anypoint Platform?

A. The assignment of each HTTP request to a particular CloudHub worker

B. The logging configuration that enables log entries to be visible in Runtime Manager

C. The SSL certificates used by the API implementation to expose HTTPS endpoints

D. The number of DNS entries allocated to the API implementation

C.   The SSL certificates used by the API implementation to expose HTTPS endpoints

Explanation:

This question tests the understanding of the shared responsibility model in CloudHub, specifically when using the default Shared Load Balancer. It distinguishes between what MuleSoft manages as part of the platform and what is the customer's responsibility.

Why C is Correct: With the CloudHub Shared Load Balancer, SSL/TLS termination occurs at the load balancer layer, which is managed by MuleSoft. However, if the Mule application itself needs to expose an HTTPS endpoint (e.g., for a web service listener, or for mutual TLS where the app acts as a server), the SSL certificates for that application listener are managed by the application developer. They must be bundled within the application's keystore or configured via the application's properties. This is exclusively the responsibility of the API implementation and is not managed by the Anypoint Platform UI or APIs.

Why A is Incorrect: The assignment of HTTP requests to a particular CloudHub worker is performed by the CloudHub Shared Load Balancer, which is a core platform service managed entirely by Anypoint Platform. The developer has no control over this routing logic.

Why B is Incorrect: The logging configuration that enables logs to be visible in Runtime Manager is managed via Anypoint Platform. You configure log levels, appenders, and filters through the Runtime Manager UI or the CloudHub API. While the application code writes the logs, the platform controls their collection, aggregation, and presentation in the console.

Why D is Incorrect: The DNS entries for a CloudHub application are managed by Anypoint Platform. Each application receives a *.cloudhub.io domain (e.g., myapp.us-east-2.cloudhub.io). The platform's infrastructure handles the DNS resolution to the Shared Load Balancer. Custom domain names (CNAMEs) are also configured within the Runtime Manager UI or API, not within the application.

Key Concept: Shared Load Balancer Responsibilities
MuleSoft Manages: Load balancing, TLS termination at the LB, DNS, platform logging infrastructure, worker provisioning/placement.

Customer Manages: Application code, business logic, internal SSL certificates (if the app exposes HTTPS), application-level logging statements, and data within the application.

Reference:
CloudHub documentation on the Shared Load Balancer explains that it provides TLS termination. For applications that need to "present a certificate to their clients" (e.g., for mutual TLS), the application must be configured with a keystore, which is the developer's responsibility. This is a clear example of a responsibility that resides with the API implementation.

An existing Quoting API is defined in RAML and used by REST clients for interacting with the quoting engine. Currently there is a resource defined in the RAML that allows the creation of quotes; however, a new requirement was just received to allow for the updating of existing quotes.
Which two actions need to be taken to facilitate this change so it can be processed?
Choose 2 answers

A. Update the API implementation to accommodate the new update request

B. Remove the old client applications and create new client applications to account for the changes

C. Update the RAML with new method details for the update request

D. Deprecate existing versions of the API in Exchange

E. Add a new API policy to API Manager to allow access to the updated endpoint

A.   Update the API implementation to accommodate the new update request
C.   Update the RAML with new method details for the update request

Explanation:

Why these two are correct

To support updating existing quotes, both the API contract and the runtime behavior must change:

C. Update the RAML
The RAML defines the API contract.
Adding support for updating quotes means adding a new method (typically PUT or PATCH) to the appropriate resource.
This ensures clients understand how to call the new functionality.

A. Update the API implementation
Once the RAML is updated, the backend implementation must support the new operation.
Without implementation support, the API would be non-functional even if the RAML is updated.

These two steps together ensure the API is both correctly defined and functionally implemented.

Why the other options are incorrect

B. Remove old client applications
❌ Not required. Adding a new method is backward compatible and does not require existing clients to be removed or recreated.

D. Deprecate existing versions of the API
❌ Not necessary for adding a new operation. Deprecation is used when breaking changes are introduced, not when extending functionality.

E. Add a new API policy
❌ Policies control runtime behavior (security, rate limiting, etc.), not API functionality or resource definitions.

🧠 Exam takeaway
Adding functionality = update the RAML + update the implementation
Versioning or deprecation is only required for breaking changes, not additive ones.

A circuit breaker strategy is planned in order to meet the goal of improved response time and demand on a downstream API.

*Circuit Open: More than 10 errors per minute for three minutes
*Circuit Half-Open: One error per minute
*Circuit Closed: Less than one error per minute for five minutes

Out of several proposals from the engineering team, which option will meet this goal?

A. Create a custom policy that implements the circuit breaker and includes policy template expressions for the required settings

B. Create Anypoint Monitoring alerts for Circuit Open/Closed configurations, and then implement a retry strategy for Circuit Half-Open configuration

C. Add the Circuit Breaker policy to the API instance, and configure the required settings

D. Implement the strategy in a Mule application, and provide the settings in the YAML configuration

C.   Add the Circuit Breaker policy to the API instance, and configure the required settings

Explanation:

Why C is correct
Anypoint Platform provides a built-in Circuit Breaker policy that is specifically designed to:

Protect downstream systems
Improve response times during failures
Control request flow based on error thresholds and time windows

The scenario describes classic circuit breaker behavior with:

Open state → error threshold exceeded
Half-open state → limited trial traffic
Closed state → healthy traffic

These behaviors are natively supported by the Circuit Breaker policy, including:

Error thresholds
Time windows
Reset and half-open behavior

This makes option C the simplest, most performant, and officially supported solution.

Why the other options are incorrect

A. Custom policy
Unnecessary complexity
Harder to maintain and govern
Reinvents functionality already provided out-of-the-box

MuleSoft strongly encourages using built-in policies whenever possible.

B. Monitoring alerts plus retry strategy
Alerts are reactive, not enforcement mechanisms
Retry policies can increase load, not reduce it
Does not implement true circuit breaker behavior

D. Implement in Mule application logic
Violates separation of concerns
Harder to standardize and govern
Less reusable across APIs

Circuit breakers are cross-cutting operational concerns, best handled at the policy layer, not in application code.

Exam takeaway
If the requirement involves failure thresholds, resilience, or protecting downstream systems, and there is a built-in policy, always choose the policy-based solution.

A Platform Architect inherits a legacy monolithic SOAP-based web service that performs a number of tasks, including showing all policies belonging to a client. The service connects to two back-end systems — a life-insurance administration system and a general-insurance administration system — and then queries for insurance policy information within each system, aggregates the results, and presents a SOAP-based response to a user interface (UI).
The architect wants to break up the monolithic web service to follow API-led conventions. Which part of the service should be put into the process layer?

A. Combining the insurance policy information from the administration systems

B. Presenting the SOAP-based response to the UI

C. Authenticating and maintaining connections to each of the back-end administration systems

D. Querying the data from the administration systems

A.   Combining the insurance policy information from the administration systems

Explanation:

In API-led connectivity, the process layer is where you put business logic and orchestration—the “how” of delivering a business capability by coordinating multiple systems. In your legacy SOAP service, the key “process” behavior is that it:

- calls the life-insurance system,
- calls the general-insurance system,
- aggregates/combines policy data from both, and
- returns the combined result.

That aggregation step is classic Process API responsibility: it composes data from multiple System APIs into a single business-oriented result (“show all policies for a client”), applying rules such as merging, filtering, sorting, deduping, and handling cross-system consistency.

Why the other options belong elsewhere

B. Presenting the SOAP-based response to the UI
This is experience-layer work: shaping the API contract for a particular consumer (in this case, a SOAP UI consumer). An Experience API can expose SOAP if needed (or translate to REST/JSON for modern channels).

C. Authenticating and maintaining connections to each back-end system
This is system-layer responsibility: connectivity, credentials, protocol details, and system-specific access patterns belong in System APIs that abstract each system-of-record.

D. Querying the data from the administration systems
Also system-layer. Each backend should be wrapped by its own System API that handles queries to that system in a stable, reusable way.

✅ Process layer = orchestration + aggregation across systems → Option A

A customer wants to host their MuleSoft applications in CloudHub 1.0, and these applications should be available at the domain https://api.acmecorp.com.
After creating a dedicated load balancer (DLB) called acme-dib-prod, which further action must the customer take to complete the configuration?

A. Configure the DLB with a TLS certificate for api.acmecorp.com and create an A record for api.acmecorp.com to the public IP addresses associated with their DLB

B. Configure the DLB with a TLS certificate for api.acmecorp.com and create a CNAME record from api.acmecorp.com to acme-dib-prod.|lb.anypointdns.net

C. Configure the DLB with a TLS certificate for acme-dib-prod.Jb.anypointdns.net and create a CNAME record from api.acmecorp:com to acme-dlb-prod.lb.anypointdns.net

D. Configure the DLB with a TLS certificate for aplacmecorp.com and create a CNAME record from api.aomecorp.com to acme-dib-prod.ei.cloubhub.io

B.   Configure the DLB with a TLS certificate for api.acmecorp.com and create a CNAME record from api.acmecorp.com to acme-dib-prod.|lb.anypointdns.net

Explanation:

This question outlines the standard process for configuring a Custom Domain for CloudHub applications using a Dedicated Load Balancer (DLB). The goal is to have applications accessible via https://api.acmecorp.com.

Step-by-Step Rationale:

1. Configure the DLB with a TLS certificate for api.acmecorp.com: The DLB terminates TLS/SSL traffic. To serve a custom domain (api.acmecorp.com) over HTTPS, you must upload or generate a valid TLS certificate (via Let's Encrypt or your own CA) for that exact domain to the DLB configuration in Runtime Manager. This ensures secure connections.

2. Create a CNAME record from api.acmecorp.com to acme-dlb-prod.lb.anypointdns.net: This is the DNS configuration step. The DLB is accessible via a default MuleSoft-provided domain: .lb.anypointdns.net. To point your custom domain to it, you create a CNAME record (an alias) in your domain's DNS (e.g., at your registrar like GoDaddy or Route 53). This tells the internet that api.acmecorp.com is an alias for the DLB's hostname.

Important Notes:
The DLB name in the CNAME target must be exactly as provisioned (e.g., acme-dlb-prod.lb.anypointdns.net).

Option B correctly uses the anypointdns.net domain, which is the standard domain for CloudHub 2.0 DLBs. (For CloudHub 1.0, the domain was cloudhub.io, but the question refers to "CloudHub 1.0" in a legacy sense; the modern configuration uses anypointdns.net).

Why the Other Options Are Incorrect:

A. ❌ ...create an A record for api.acmecorp.com to the public IP addresses associated with their DLB: While possible, this is not the recommended or standard practice. DLB IP addresses can change (e.g., during maintenance or scaling). The CNAME to the stable hostname is the resilient, MuleSoft-recommended approach, as the hostname will always resolve to the current IPs.

B. ❌ Configure the DLB with a TLS certificate for acme-dlb-prod.lb.anypointdns.net...: The TLS certificate must be for the custom domain the user will access (api.acmecorp.com), not for the internal DLB hostname. A certificate for acme-dlb-prod.lb.anypointdns.net would cause a certificate name mismatch error when users visit api.acmecorp.com.

C. ❌ Configure the DLB with a TLS certificate for api.acmecorp.com and create a CNAME record... to acme-dlb-prod.elb.cloudhub.io: This uses the old cloudhub.io domain pattern, which was for Shared Load Balancer (SLB) configurations in CloudHub 1.0. For a Dedicated Load Balancer (DLB), the correct domain is lb.anypointdns.net. Also, the SLB pattern would be ..elb.cloudhub.io. This option mixes incorrect patterns.

Reference:
MuleSoft Documentation - "Configure a Custom Domain for Dedicated Load Balancers": Explicitly states the steps: 1) Add the custom domain and TLS certificate to the DLB, and 2) Create a CNAME DNS record from your custom domain to the DLB's lb.anypointdns.net hostname.

Prep Smart, Pass Easy Your Success Starts Here!

Transform Your Test Prep with Realistic Salesforce-MuleSoft-Platform-Architect Exam Questions That Build Confidence and Drive Success!