Salesforce-MuleSoft-Platform-Architect Practice Test

Salesforce Spring 25 Release -
Updated On 1-Jan-2026

152 Questions

Refer to the exhibit.



A developer is building a client application to invoke an API deployed to the STAGING environment that is governed by a client ID enforcement policy. What is required to successfully invoke the API?

A. The client ID and secret for the Anypoint Platform account owning the API in the STAGING environment

B. The client ID and secret for the Anypoint Platform account's STAGING environment

C. The client ID and secret obtained from Anypoint Exchange for the API instance in the STAGING environment

D. A valid OAuth token obtained from Anypoint Platform and its associated client ID and secret

C.   The client ID and secret obtained from Anypoint Exchange for the API instance in the STAGING environment

Explanation:

This question tests the practical steps for a client application to authenticate when calling an API protected by a Client ID Enforcement Policy. The process is part of MuleSoft's API consumer onboarding workflow.

Correct Process:

API Publisher Action: In the STAGING environment of API Manager, the API is configured with a Client ID Enforcement policy. The publisher must also define one or more "applications" in API Manager or Exchange that represent the consuming client apps.

Consumer Action (Developer): The developer of the client application goes to the API's portal page in Anypoint Exchange, navigates to the STAGING environment, and requests access. Upon approval, they can view or generate unique client_id and client_secret credentials specifically for their application to access that API instance in that environment.

API Invocation: The client application includes these environment-specific and API-specific credentials in the HTTP request, typically as a Basic Auth header (Authorization: Basic <base64(client_id:client_secret)>) or as parameters.

These credentials are tied to the specific API instance in a specific environment (STAGING), not to a general platform account.

Why the Other Options Are Incorrect:

A. The client ID and secret for the Anypoint Platform account owning the API: This refers to the platform account credentials used to log into Anypoint Platform. These are not for API authentication and should never be embedded in a client application.

B. The client ID and secret for the Anypoint Platform account's STAGING environment: There is no such thing as a general "account environment" credential. Credentials are issued per API application contract, not per environment for an entire account.

D. A valid OAuth token obtained from Anypoint Platform and its associated client ID and secret: This describes the OAuth 2.0 Client Credentials grant flow. While one valid method, it is not the only requirement and is more specific than needed. The Client ID Enforcement policy can be satisfied by either:

Direct Basic Auth (using the client_id and client_secret as username/password – Option C).
OAuth 2.0 Token (where the client uses its client_id/secret to first get a token from Anypoint Platform, then sends the token).

The question asks what is "required to successfully invoke." The fundamental requirement is the client_id and client_secret pair issued for that API in STAGING. Option C is the direct and most complete answer covering the credential source. Option D describes a specific authentication mechanism using those credentials.

Reference:
MuleSoft Documentation - "Client ID Enforcement Policy": Explains that to call an API with this policy, a consumer must "supply the client ID and client secret that they receive when they register their application in Anypoint Exchange or API Manager."

API Consumer Onboarding Flow: The standard process shows a developer requesting access in Exchange, getting approved, and receiving credentials that are specific to the API and environment.

Which out-of-the-box key performance indicator measures the success of a typical Center for Enablement and is immediately available in responses from Anypoint Platform APIs?

A. Per business group, the ratio of the number of production APT implementations deployed using a C1/CD pipeline to the number of production API implementations deployed manually

B. Per deployed API implementation, the amount of bandwidth consumed each day

C. Per published API, the number of developers that downloaded s version of the API specification

D. Per published API, the number of consumers that requested access to the API and have been approved in the Production environment

D.   Per published API, the number of consumers that requested access to the API and have been approved in the Production environment

Explanation:

This question focuses on the success metrics for a Center for Enablement (C4E) that are immediately available via Anypoint Platform APIs. The C4E's primary goal is to drive API consumption and reuse, transforming IT into an enabler. Therefore, the most direct measure of success is adoption by consumers.

Why Option D is the Correct KPI:

Measures Active Consumption: The number of consumers who have requested and been granted access to a published API in Production is a strong, tangible indicator that the API provides business value and is being actively integrated into solutions. It moves beyond just publishing assets to tracking actual usage.

Available via Anypoint Platform APIs: This data is accessible via the Anypoint Platform APIs, specifically the Access Management API or API Manager API, which can list applications (consumers) contracted to an API in a given environment. This makes it an "out-of-the-box" metric that can be automated and reported on.

Aligns with C4E Objectives: A core C4E function is to manage the API lifecycle and facilitate consumption. Tracking approved consumers directly measures the effectiveness of the enablement and self-service model.

Why the Other Options Are Incorrect:

A. Ratio of CI/CD vs. manual deployments: While automation is a best practice, this ratio is a measure of operational maturity and efficiency, not a direct measure of the C4E's success in enabling the business. A high ratio doesn't necessarily mean APIs are being consumed or providing business value.

B. Bandwidth consumed per API: This is an infrastructure/performance metric, not a business-centric success metric. High bandwidth could indicate success or could be due to inefficient payloads. More importantly, this data is typically gathered from network monitoring tools or runtime analytics, not as a primary, immediate KPI from Platform APIs for measuring C4E success.

C. Number of developers who downloaded an API spec: This measures interest and discovery (a good leading indicator) but not actual consumption. A developer might download a spec for evaluation but never implement it. The C4E's ultimate goal is working integrations, not just spec downloads. This data might be available from Exchange analytics, but it's a weaker KPI than approved production contracts.

Reference:
MuleSoft C4E Success Metrics: Official guidance emphasizes tracking API consumption as a key success metric. This is often measured by the number of client applications contracted to APIs in production, as this represents real, live integrations delivering value.

Anypoint Platform APIs - API Manager: The API Manager's REST API provides endpoints to retrieve information about applications (consumers) and their contracts, enabling the automation of KPI tracking for approved consumers.

A Platform Architect inherits a legacy monolithic SOAP-based web service that performs a number of tasks, including showing all policies belonging to a client. The service connects to two back-end systems — a life-insurance administration system and a general-insurance administration system — and then queries for insurance policy information within each system, aggregates the results, and presents a SOAP-based response to a user interface (UI).
The architect wants to break up the monolithic web service to follow API-led conventions. Which part of the service should be put into the process layer?

A. Combining the insurance policy information from the administration systems

B. Presenting the SOAP-based response to the UI

C. Authenticating and maintaining connections to each of the back-end administration systems

D. Querying the data from the administration systems

A.   Combining the insurance policy information from the administration systems

Explanation:

In API-led connectivity, the process layer is where you put business logic and orchestration—the “how” of delivering a business capability by coordinating multiple systems. In your legacy SOAP service, the key “process” behavior is that it:

- calls the life-insurance system,
- calls the general-insurance system,
- aggregates/combines policy data from both, and
- returns the combined result.

That aggregation step is classic Process API responsibility: it composes data from multiple System APIs into a single business-oriented result (“show all policies for a client”), applying rules such as merging, filtering, sorting, deduping, and handling cross-system consistency.

Why the other options belong elsewhere

B. Presenting the SOAP-based response to the UI
This is experience-layer work: shaping the API contract for a particular consumer (in this case, a SOAP UI consumer). An Experience API can expose SOAP if needed (or translate to REST/JSON for modern channels).

C. Authenticating and maintaining connections to each back-end system
This is system-layer responsibility: connectivity, credentials, protocol details, and system-specific access patterns belong in System APIs that abstract each system-of-record.

D. Querying the data from the administration systems
Also system-layer. Each backend should be wrapped by its own System API that handles queries to that system in a stable, reusable way.

✅ Process layer = orchestration + aggregation across systems → Option A

Which statement is true about Spike Control policy and Rate Limiting policy?

A. All requests are rejected after the limit is reached in Rate Limiting policy, whereas the requests are queued in Spike Control policy after the limit is reached

B. In a clustered environment, the Rate Limiting.and Spike Control policies are applied to each node in the cluster

C. To protect Experience APIs by limiting resource consumption, Rate Limiting policy must be applied

D. In order to apply Rate Limiting and Spike Control policies, a contract to bind client application and API is needed for both

A.   All requests are rejected after the limit is reached in Rate Limiting policy, whereas the requests are queued in Spike Control policy after the limit is reached

Explanation:

Why A is true
Rate Limiting and Spike Control both protect an API from excessive traffic, but they behave differently once a limit is hit:

Rate Limiting policy: once the configured quota for the time window is reached, subsequent requests are rejected (they do not reach the backend). MuleSoft’s Rate Limiting policy documentation describes that after the quota is reached, later requests are rejected and typically return HTTP 429 for HTTP APIs.
Spike Control policy: Spike Control is designed to smooth short-term bursts (“spikes”). MuleSoft’s Spike Control policy documentation indicates that when the API exceeds the configured limit, the request can be retried/reattempted and is rejected only after a specified number of reattempts, returning HTTP 429. This “reattempt” behavior is effectively what the exam questions usually describe as “queued” (the policy regulates spikes by delaying/reattempting before ultimately rejecting if the backlog/limit condition persists).

So, conceptually:
Rate Limiting = hard quota per time window (reject once exceeded)
Spike Control = burst smoothing (allow brief overages via delay/reattempt; reject only if it can’t be absorbed)

That maps directly to option A.

Why the other options are not correct

B. “In a clustered environment, Rate Limiting and Spike Control policies are applied to each node”
Rate limiting can be configured to behave cluster-wide (shared quota across nodes) when the policy is “clusterized/clusterizable”; otherwise it behaves per node and effectively multiplies the allowance. Since it’s not inherently “per node” in all cases, this statement is not universally true.

C. “To protect Experience APIs… Rate Limiting must be applied”
There is no “must.” You can protect Experience APIs using either Rate Limiting or Spike Control depending on whether you need a strict quota or burst smoothing (and often you use both in combination).

D. “A contract is needed for both Rate Limiting and Spike Control”
A contract is required for Rate Limiting SLA-based (because it enforces limits per client contract), but not for all rate limiting use cases and not inherently for spike control. MuleSoft docs also note rate limiting can be applied even for “uncontrolled clients” (not requiring contracts).

An organization makes a strategic decision to move towards an IT operating model that emphasizes consumption of reusable IT assets using modern APIs (as defined by MuleSoft).
What best describes each modern API in relation to this new IT operating model?

A. Each modern API has its own software development lifecycle, which reduces the need for documentation and automation

B. Each modem API must be treated like a product and designed for a particular target audience (for instance, mobile app developers)

C. Each modern API must be easy to consume, so should avoid complex authentication mechanisms such as SAML or JWT D

D. Each modern API must be REST and HTTP based

B.   Each modem API must be treated like a product and designed for a particular target audience (for instance, mobile app developers)

Explanation:

In MuleSoft’s IT Operating Model, modern APIs are not just technical interfaces — they are products. This means they must be designed, documented, and managed with a clear target audience in mind, whether that’s mobile developers, web developers, or partner teams. Treating APIs like products ensures they are:

Discoverable → Published in Anypoint Exchange with proper metadata and documentation.
Reusable → Designed for consumption across multiple projects and LoBs.
Well-governed → Managed through API Manager with policies, SLAs, and monitoring.
Consumer-focused → Tailored to the needs of specific audiences, ensuring adoption and value.

This product mindset is what makes the IT Operating Model effective: APIs are created once, reused many times, and consumed at the rate of production.

❌ Why not the other options?
A. Each modern API has its own SDLC, reducing need for documentation/automation
Incorrect. APIs do have their own lifecycle, but documentation and automation are critical, not reduced. Documentation is essential for discoverability and reuse.

C. APIs must avoid complex authentication like SAML/JWT
Incorrect. Security is a nonfunctional requirement. APIs must support strong authentication and authorization mechanisms. Avoiding them would compromise compliance and security.

D. APIs must be REST and HTTP based
Incorrect. While REST/HTTP are common, modern APIs can also use GraphQL, gRPC, or event-driven patterns. MuleSoft’s definition of modern APIs is not limited to REST/HTTP.

🔗 References:
MuleSoft Whitepaper: Modern APIs and the IT Operating Model
MuleSoft Docs: API-led Connectivity and IT Operating Model

Salesforce-MuleSoft-Platform-Architect Exam Questions - Home Previous
Page 5 out of 31 Pages