Salesforce-MuleSoft-Platform-Integration-Architect Exam Questions With Explanations

The best Salesforce-MuleSoft-Platform-Integration-Architect practice exam questions with research based explanations of each question will help you Prepare & Pass the exam!

Over 15K Students have given a five star review to SalesforceKing

Why choose our Practice Test

By familiarizing yourself with the Salesforce-MuleSoft-Platform-Integration-Architect exam format and question types, you can reduce test-day anxiety and improve your overall performance.

Up-to-date Content

Ensure you're studying with the latest exam objectives and content.

Unlimited Retakes

We offer unlimited retakes, ensuring you'll prepare each questions properly.

Realistic Exam Questions

Experience exam-like questions designed to mirror the actual Salesforce-MuleSoft-Platform-Integration-Architect test.

Targeted Learning

Detailed explanations help you understand the reasoning behind correct and incorrect answers.

Increased Confidence

The more you practice, the more confident you will become in your knowledge to pass the exam.

Study whenever you want, from any place in the world.

Salesforce Salesforce-MuleSoft-Platform-Integration-Architect Exam Sample Questions 2025

Start practicing today and take the fast track to becoming Salesforce Salesforce-MuleSoft-Platform-Integration-Architect certified.

22734 already prepared
Salesforce Spring 25 Release
273 Questions
4.9/5.0

An application load balancer routes requests to a RESTful web API secured by Anypoint Flex Gateway. Which protocol is involved in the communication between the load balancer and the Gateway?

A. SFTP

B. HTTPS

C. LDAP

D. SMTP

B.   HTTPS

Explanation
In a standard deployment involving a load balancer and a RESTful web API, the communication follows a well-defined pattern.

Why B is Correct (HTTPS):
The Application Load Balancer (ALB) is a public-facing endpoint that receives requests from clients over the internet. Its primary role is to route these requests to the appropriate backend targets.

Anypoint Flex Gateway is the component that secures, manages, and proxies the requests to the actual backend API implementation. It acts as the backend target for the load balancer.

The communication between the load balancer and the Gateway is the internal routing of an HTTP/S request. Therefore, the protocol used is HTTPS (or HTTP). Using HTTPS ensures that the traffic is encrypted even on the internal network between the load balancer and the Gateway, which is a security best practice.

Why the Other Options are Incorrect:

A. SFTP (SSH File Transfer Protocol):
This is a protocol for secure file transfer. It is not used for routing real-time API requests between a load balancer and an API gateway.

C. LDAP (Lightweight Directory Access Protocol):
This is a protocol used for accessing and maintaining distributed directory information services, such as user authentication against a directory server. It is not used for general API request routing.

D. SMTP (Simple Mail Transfer Protocol):
This is the standard protocol for sending and receiving email. It has no relation to the task of routing web API requests.

Key Reference

Network Architecture for APIs:
The flow is: Client -> (HTTPS) -> Load Balancer -> (HTTPS) -> Flex Gateway -> (Protocol to Backend Service).

The communication between the load balancer and the gateway is part of the web request/response cycle, which inherently uses HTTP/HTTPS.

In summary, the protocol involved in the communication between a load balancer and a RESTful API gateway like Anypoint Flex Gateway is HTTPS, as it is responsible for carrying the web traffic that the gateway is designed to process.

A mule application is deployed to a Single Cloudhub worker and the public URL appears in Runtime Manager as the APP URL. Requests are sent by external web clients over the public internet to the mule application App url. Each of these requests routed to the HTTPS Listener event source of the running Mule application. Later, the DevOps team edits some properties of this running Mule application in Runtime Manager. Immediately after the new property values are applied in runtime manager, how is the current Mule application deployment affected and how will future web client requests to the Mule application be handled?

A. Cloudhub will redeploy the Mule application to the OLD Cloudhub worker New web client requests will RETURN AN ERROR until the Mule application is redeployed to the OLD Cloudhub worker

B. CloudHub will redeploy the Mule application to a NEW Cloudhub worker New web client requests will RETURN AN ERROR until the NEW Cloudhub worker is available

C. Cloudhub will redeploy the Mule application to a NEW Cloudhub worker New web client requests are ROUTED to the OLD Cloudhub worker until the NEW Cloudhub worker is available.

D. Cloudhub will redeploy the mule application to the OLD Cloudhub worker New web client requests are ROUTED to the OLD Cloudhub worker BOTH before and after the Mule application is redeployed.

D.   Cloudhub will redeploy the mule application to the OLD Cloudhub worker New web client requests are ROUTED to the OLD Cloudhub worker BOTH before and after the Mule application is redeployed.

Explanation:
This question tests the understanding of how CloudHub handles application updates (specifically property changes) for a single-worker deployment. CloudHub uses a zero-downtime rolling update strategy.

Why D is Correct:
When you change application properties in Runtime Manager for a running application, CloudHub initiates a redeployment to apply the changes. The key points are:

Redeployment to the Same Worker:
For a single-worker application, CloudHub does not provision a new worker. It redeploys the application to the same (old) worker.

Zero-Downtime Routing:
During the redeployment process, the CloudHub router (the component that directs traffic from the public URL to your worker) continues to accept requests. It holds these requests in a queue while the application is restarting on the same worker.

Seamless Handling:
Once the application has finished restarting and is healthy, the router forwards the queued requests to it. From the client's perspective, the request might take slightly longer, but it will not receive an error. There is no downtime.

This process ensures that property updates can be applied with minimal disruption.

Why the Other Options Are Incorrect:

A. ...redeploy to OLD worker... requests will RETURN AN ERROR:
This is incorrect because CloudHub's router buffers requests during the restart, preventing errors for clients.

B. ...redeploy to a NEW worker... requests will RETURN AN ERROR:
This is incorrect on two counts. First, for a single-worker app, CloudHub typically restarts the application on the same worker, not a new one. Second, even when scaling to multiple workers (where a new worker might be added), the routing layer still manages the transition without causing errors for clients.

C. ...redeploy to a NEW worker... requests are ROUTED to the OLD worker...:
This is incorrect because, as explained above, a property update for a single-worker app does not involve a new worker. The redeployment happens on the original worker.

Reference:
MuleSoft Documentation: Update App Properties in CloudHub - The documentation confirms that updating properties causes the application to restart and that "While your application restarts, the CloudHub load balancer queues requests to your application and forwards them after your application is running."

Conclusion: CloudHub is designed for operational ease. Changing properties for a single-worker application triggers a restart on the same worker, and the built-in load balancer ensures this happens without causing errors for incoming client requests by temporarily queuing them.

An API client is implemented as a Mule application that includes an HTTP Request operation using a default configuration. The HTTP Request operation invokes an external API that follows standard HTTP status code conventions, which causes the HTTP Request operation to return a 4xx status code. What is a possible cause of this status code response?

A. An error occurred inside the external API implementation when processing the HTTP request that was received from the outbound HTTP Request operation of the Mule application

B. The external API reported that the API implementation has moved to a different external endpoint

C. The HTTP response cannot be interpreted by the HTTP Request operation of the Mule application after it was received from the external API

D. The external API reported an error with the HTTP request that was received from the outbound HTTP Request operation of the Mule application

D.   The external API reported an error with the HTTP request that was received from the outbound HTTP Request operation of the Mule application

Explanation
HTTP status codes are grouped into classes:
4xx (Client Error): These status codes indicate that the error seems to have been caused by the client. In this scenario, the client is the Mule application making the outbound HTTP Request. The server is the external API.

5xx (Server Error): These status codes indicate that the server is aware that it has encountered an error or is otherwise incapable of performing the request. Let's analyze the options based on this distinction:

Why D is Correct:
A 4xx status code means the external API server received the request but found it to be invalid or malformed in some way. The error is on the client's (Mule app's) side. Common causes include:

400 Bad Request: The request (headers, body, or syntax) was malformed.

401 Unauthorized: Missing or invalid authentication credentials.

403 Forbidden: The credentials are valid, but they don't have permission for the resource.

404 Not Found: The requested URL path does not exist.

405 Method Not Allowed: Using an incorrect HTTP method (e.g., GET on an endpoint that only allows POST).

All of these are reports from the external API about a problem with the request sent by the Mule application's HTTP Request operation.

Why the Other Options are Incorrect:

A. An error occurred inside the external API implementation when processing the HTTP request...
Incorrect. This description is the definition of a 5xx (Server Error) status code (e.g., 500 Internal Server Error). The server acknowledges that the request was valid, but it failed to process it due to an internal problem. This is the opposite of a 4xx error.

B. The external API reported that the API implementation has moved to a different external endpoint
Incorrect. This scenario is described by 3xx (Redirection) status codes, such as 301 Moved Permanently or 302 Found. A 4xx code is an error, not a redirection instruction.

C. The HTTP response cannot be interpreted by the HTTP Request operation of the Mule application after it was received from the external API
Incorrect. This describes a potential problem within the Mule application after the HTTP response has been successfully received. For example, a transformation error when trying to parse the response body. In this case, the HTTP Request operation itself would have received a valid HTTP response (likely with a 200 OK status code). The failure would occur later in the Mule flow, and it would result in a Mule error (like a TRANSFORM error), not an HTTP 4xx status code from the external server.

Key Takeaway
The HTTP Request operation in Mule acts as an HTTP client. A 4xx status code is a clear message from the server that the client's request was faulty. Troubleshooting should focus on the request being sent from the Mule app: the URL, HTTP method, headers, query parameters, and request body.

A company is designing a mule application to consume batch data from a partner's ftps server The data files have been compressed and then digitally signed using PGP. What inputs are required for the application to securely consumed these files?

A. ATLS context Key Store requiring the private key and certificate for the company PGP public key of partner PGP private key for the company

B. ATLS context first store containing a public certificate for partner ftps server and the PGP public key of the partner TLS contact Key Store containing the FTP credentials

C. TLS context trust or containing a public certificate for the ftps server The FTP username and password The PGP public key of the partner

D. The PGP public key of the partner The PGP private key for the company The FTP username and password

D.   The PGP public key of the partner The PGP private key for the company The FTP username and password

Explanation
The process involves two separate security operations:

Secure File Transfer (FTPS):
This ensures the data is encrypted during transit between the partner's server and the Mule application. FTPS is FTP over TLS/SSL. Authentication for this step is typically done with a username and password (though client certificates are also possible). The "Trust Store" for validating the server's certificate is often handled automatically if the server uses a certificate from a public Certificate Authority (CA).

File Content Security (PGP):
This ensures the data is authentic and intact after it is transferred. The file was signed and compressed by the partner before upload.

Digital Signature Verification:
To verify the partner's signature, the Mule application needs the partner's PGP public key. This proves the file came from the partner and hasn't been tampered with.

Decryption (if applicable):
The problem states the files were "digitally signed using PGP." It does not explicitly say they were encrypted. However, a common practice is to sign and encrypt. If the files are also encrypted for the company's eyes only, then the Mule application would need the company's own PGP private key to decrypt them. Since the question asks for what is needed to "securely consume" and mentions both compression and signing, it's prudent to assume decryption is part of the process. The private key is essential for this.

Why Option D is Correct:
It correctly identifies the credentials for both layers:

FTPS Layer:
The FTP username and password

PGP Layer:
The PGP public key of the partner (for verification) and The PGP private key for the company (for decryption, if required).

Why the other options are incorrect:

A. A TLS context Key Store...PGP keys:
This is incorrect because it mixes the two layers. A TLS Key Store is for the FTPS connection (transport layer) and contains X.509 certificates, not PGP keys. PGP keys are used by the application after the file is downloaded, completely separate from the TLS handshake.

B. A TLS context trust store...PGP public key...TLS contact Key Store...:
This option is convoluted and incorrect. It incorrectly suggests storing a PGP key in a TLS trust store. It also redundantly mentions TLS components without clearly separating the need for FTP credentials. The phrase "TLS contact Key Store" is not standard terminology.

C. TLS context trust store...FTP username and password...PGP public key:
This is the most tempting distractor. It gets the FTPS part mostly right (though a trust store is often not needed if the server uses a well-known CA). However, it is missing the company's PGP private key. Without the private key, the application cannot decrypt the file if it was encrypted, which is a critical part of secure consumption. The PGP public key alone is only sufficient for signature verification.

Reference

MuleSoft Documentation: SFTP Connector > Using PGP
While this refers to SFTP, the principles for PGP file processing are identical. The documentation explains the need for both the public key for verification and the private key for decryption.

MuleSoft Documentation: FTPS Connector
This documentation shows that the FTPS connector configuration requires authentication credentials (username/password) and allows for TLS configuration, which is separate from the PGP processing that would happen in a subsequent step in the flow.

A Mule application uses the Database connector. What condition can the Mule application automatically adjust to or recover from without needing to restart or redeploy the Mule application?

A. One of the stored procedures being called by the Mule application has been renamed

B. The database server was unavailable for four hours due to a major outage but is now fully operational again

C. The credentials for accessing the database have been updated and the previous credentials are no longer valid

D. The database server has been updated and hence the database driver library/JAR needs a minor version upgrade

B.   The database server was unavailable for four hours due to a major outage but is now fully operational again

Explanation:
This answer is correct due to the connection pooling and retry mechanisms inherent in the Mule Database connector and the Mule runtime.

Connection Pooling:
The Database connector uses a pool of connections. When the database server becomes unavailable, active connections will fail. The pool will identify these as bad connections.

Automatic Recovery:
Once the database server comes back online, the Mule application will automatically recover when the next database operation is attempted. The connection pool will either:

Re-establish new connections to the database to replace the failed ones in the pool.

The connector's built-in reconnection strategy will periodically attempt to reconnect. Once successful, operations will resume normally.

No Restart Required:
This entire process of failure and recovery is handled dynamically by the runtime. As long as the application itself is still running, it can regain connectivity to the database without any intervention.

Analysis of Other Options:

A. One of the stored procedures being called by the Mule application has been renamed:
This is a application-level configuration error. The Mule application has a static configuration (the name of the stored procedure) that is now incorrect. The application will throw an error every time it tries to call the procedure. To fix this, the Mule application's configuration must be updated and the application must be redeployed.

C. The credentials for accessing the database have been updated and the previous credentials are no longer valid:
This is a configuration change. The database credentials are typically defined in the Mule application's configuration properties. When these properties change, the application cannot authenticate. The connection pool will fail to establish new connections. The application must be updated with the new credentials and redeployed (or, if using externalized configuration like CloudHub properties, the properties must be updated, which may trigger a runtime refresh, but a simple credential change in a properties file often requires a restart to be picked up by the connection pool).

D. The database server has been updated and hence the database driver library/JAR needs a minor version upgrade:
This requires a code/dependency change. The correct JDBC driver JAR must be included with the Mule application. Changing a dependency necessitates rebuilding the application and redeploying it.

Key Concepts/References:

Resilience and Fault Tolerance: Mule applications are designed to be resilient to temporary failures in external systems. The reconnection strategy is a key feature for this.

Connection Management: Understanding how connection pools work and their lifecycle is crucial. Pools can recover from network-level outages but not from configuration errors.

Types of Changes:

Runtime/Transient Failures: (e.g., network timeout, database restart). Auto-recovery is possible.

Configuration/Static Changes: (e.g., credentials, object names). Redeployment is required.

Dependency/Code Changes: (e.g., driver version, business logic). Rebuild and redeployment are required.

Prep Smart, Pass Easy Your Success Starts Here!

Transform Your Test Prep with Realistic Salesforce-MuleSoft-Platform-Integration-Architect Exam Questions That Build Confidence and Drive Success!