Salesforce-MuleSoft-Platform-Integration-Architect Exam Questions With Explanations
The best Salesforce-MuleSoft-Platform-Integration-Architect practice exam questions with research based explanations of each question will help you Prepare & Pass the exam!
Over 15K Students have given a five star review to SalesforceKing
Why choose our Practice Test
By familiarizing yourself with the Salesforce-MuleSoft-Platform-Integration-Architect exam format and question types, you can reduce test-day anxiety and improve your overall performance.
Up-to-date Content
Ensure you're studying with the latest exam objectives and content.
Unlimited Retakes
We offer unlimited retakes, ensuring you'll prepare each questions properly.
Realistic Exam Questions
Experience exam-like questions designed to mirror the actual Salesforce-MuleSoft-Platform-Integration-Architect test.
Targeted Learning
Detailed explanations help you understand the reasoning behind correct and incorrect answers.
Increased Confidence
The more you practice, the more confident you will become in your knowledge to pass the exam.
Study whenever you want, from any place in the world.
Salesforce Salesforce-MuleSoft-Platform-Integration-Architect Exam Sample Questions 2025
Start practicing today and take the fast track to becoming Salesforce Salesforce-MuleSoft-Platform-Integration-Architect certified.
22734 already prepared
Salesforce Spring 25 Release273 Questions
4.9/5.0
An organization has decided on a cloud migration strategy to minimize the organization's
own IT resources. Currently the organization has all of its new applications running on its
own premises and uses an on-premises load balancer that exposes all APIs under the
base URL (https://api.rutujar.com).
As part of migration strategy, the organization is planning to migrate all of its new applications and load balancer CloudHub.
What is the most straightforward and cost-effective approach to Mule application
deployment and load balancing that preserves the public URL's?
A. Deploy the Mule application to Cloudhub
Create a CNAME record for base URL( httpsr://api.rutujar.com) in the Cloudhub shared
load balancer that points to the A record of theon-premises load balancer
Apply mapping rules in SLB to map URLto their corresponding Mule applications
B. Deploy the Mule application to Cloudhub
Update a CNAME record for base URL ( https://api.rutujar.com) in the organization's DNS
server to point to the A record of the Cloudhub dedicated load balancer
Apply mapping rules in DLB to map URLto their corresponding Mule applications
C. Deploy the Mule application to Cloudhub
Update a CNAME record for base URL ( https://api.rutujar.com) in the organization's DNS
server to point to the A record of the CloudHub shared load balancer
Apply mapping rules in SLB to map URLto their corresponding Mule applications
D. For each migrated Mule application, deploy an API proxy application to Cloudhub with
all traffic to the mule applications routed through a Cloud Hub Dedicated load balancer
(DLB)
Update a CNAME record for base URL ( https://api.rutujar.com) in the organization's DNS
server to point to the A record of the CloudHub dedicated load balancer
Apply mapping rules in DLB to map each API proxy application who is responding new
application
Update a CNAME record for base URL ( https://api.rutujar.com) in the organization's DNS server to point to the A record of the CloudHub shared load balancer
Apply mapping rules in SLB to map URLto their corresponding Mule applications
Explanation
The goal is to migrate the load balancer and applications to CloudHub while preserving the public base URL (https://api.rutujar.com) in the most straightforward and cost-effective way. Let's break down the key terms:
CloudHub Shared Load Balancer (SLB):
A free, multi-tenant load balancer provided by MuleSoft for all CloudHub applications. It gives your application a default URL like yourapp.cloudhub.io.
CloudHub Dedicated Load Balancer (DLB):
A paid, single-tenant load balancer that you can fully customize, including attaching your own SSL certificates and defining custom domain names. It is required for using a custom domain like api.rutujar.com
CNAME Record:
A DNS record that aliases one domain name to another (e.g., api.rutujar.com -> yourapp.us-e2.cloudhub.io).
A Record:
A DNS record that points a domain name to an IP address.
The critical insight is that to use a custom domain like api.rutujar.com in CloudHub, you must use a Dedicated Load Balancer (DLB). The Shared LB (SLB) does not support custom domains.
Why Option C is Incorrect (and why this is tricky):
Option C suggests using the Shared LB (SLB) with the custom domain api.rutujar.com. This is not possible. You cannot point a CNAME for your custom domain to the Shared LB's domain. The Shared LB is only for the default *.cloudhub.io URLs. Therefore, Option C describes an invalid configuration and is the incorrect answer.
Re-evaluating the Options for the Correct Answer:
Given that Option C is invalid, we must find the most straightforward and cost-effective option that uses a Dedicated Load Balancer (DLB), as it is the only way to preserve the custom domain.
A. ...CNAME...points to the A record of the on-premises load balancer:
This keeps the load balancer on-premises, contradicting the requirement to migrate it to CloudHub. It creates a complex hybrid proxy setup and is not straightforward.
B. ...CNAME...points to the A record of the Cloudhub dedicated load balancer (DLB)...:
This is a valid and standard approach. You provision a DLB, get its static IP address (the "A record"), and update your DNS's CNAME (or preferably an A record directly) for api.rutujar.com to point to that IP. You then configure mapping rules in the DLB to route traffic to the correct CloudHub applications. This is straightforward.
D. For each migrated Mule application, deploy an API proxy application...:
This is overly complex and not cost-effective. It suggests creating a separate API proxy application for each backend Mule application, all behind a DLB. This is unnecessary. The DLB can route based on paths (e.g., /orders, /customers) directly to the corresponding CloudHub workers without needing an intermediate proxy app, which would incur additional vCore costs.
Correct Answer (Based on valid configurations)
B. Deploy the Mule application to Cloudhub.
Update a CNAME record for base URL ( https://api.rutujar.com) in the organization's DNS server to point to the A record of the Cloudhub dedicated load balancer. Apply mapping rules in DLB to map URL to their corresponding Mule applications.
Explanation for B:
This is the standard, prescribed method for using a custom domain with CloudHub.
Dedicated Load Balancer (DLB):
A DLB is provisioned, providing a static IP address.
DNS Update:
The organization updates its DNS for api.rutujar.com to point to the DLB's IP address (this is typically done with an A record, not a CNAME to an A record, but the intent is correct).
Path-Based Routing:
Mapping rules are configured in the DLB to route incoming requests for specific paths (e.g., https://api.rutujar.com/orders/**) to the correct CloudHub application hosting that API.
Cost-Effectiveness:
It uses the necessary paid component (the DLB) but does so without introducing unnecessary and expensive intermediate applications (like in option D). It is the most straightforward architecture for this migration goal.
Reference
MuleSoft Documentation: Dedicated Load Balancer
This documentation explains that a DLB is required for custom domains and details how to configure DNS and path-based routing rules. It clearly states that the Shared LB does not support this functionality.
Refer to the exhibit. Anypoint Platform supports role-based access control (RBAC) to features of the platform. An organization has configured an external Identity Provider for identity management with Anypoint Platform. What aspects of RBAC must ALWAYS be controlled from the Anypoint Platform control plane and CANNOT be controlled via the external Identity Provider?
A. Controlling the business group within Anypoint Platform to which the user belongs
B. Assigning Anypoint Platform permissions to a role
C. Assigning Anypoint Platform role(s) to a user
D. Removing a user's access to Anypoint Platform when they no longer work for the organization
Explanation:
When an external IdP (like Okta, Azure AD) is connected, there is a division of responsibilities:
Identity Provider (IdP) manages:
User identities, authentication, and basic group memberships.
Anypoint Platform manages:
The definition of its own roles, the permissions associated with those roles, and the mapping of IdP groups to Anypoint Platform roles.
Why B is Correct:
The specific permissions within Anypoint Platform (e.g., "Deploy Applications," "View API Analytics," "Manage Client Applications") are features defined by the platform itself. The external IdP has no knowledge of these platform-specific permissions. Therefore, the act of creating a role and assigning a set of these specific permissions to it must always be done within Anypoint Platform.
Why A is Incorrect:
The business group a user belongs to can be controlled via the external IdP. This is a common and recommended practice. You can create a group in your IdP (e.g., "Anypoint-Platform-Dev-Group") and then map that IdP group to a specific business group within Anypoint Platform's access management settings. The user's membership in the IdP group controls their business group assignment in Anypoint.
Why C is Incorrect:
Assigning Anypoint Platform role(s) to a user can also be controlled via the external IdP. This is done through group mappings. You create a group in the IdP (e.g., "Anypoint-Platform-Administrators") and map that group to an Anypoint Platform role (e.g., "Organization Administrator") within Anypoint Platform. When a user is added to the IdP group, they automatically inherit the mapped Anypoint role.
Why D is Incorrect:
Removing a user's access is a primary function of the external IdP. When a user is deprovisioned or disabled in the IdP, they will no longer be able to authenticate and access Anypoint Platform. This is a key benefit of using an external IdP for identity management.
Reference/Link:
MuleSoft Documentation - Manage Federated Access: This page explains the configuration, showing that you map IdP Groups to Anypoint Platform Roles. This demonstrates that role assignment (C) is handled via the IdP group mapping, while the definition of the role and its permissions (B) is done in Anypoint.
Core Concept: The external IdP manages who you are (identity and group membership). Anypoint Platform manages what you can do (the permissions available and which sets of permissions constitute a role). The link between the two is the group-to-role mapping.
How are the API implementation , API client, and API consumer combined to invoke and process an API ?
A. The API consumer creates an API implementation , which receives API invocations from an API such that they are processed for an API client
B. The API consumer creates an API client which sends API invocations to an API such that they are processed by an API implementation
C. An API client creates an API consumer, which receives API invocation from an API such that they are processed for an API implementation
D. The API client creates an API consumer which sends API invocations to an API such that they are processed by API implementation
Explanation:
This question is about the logical sequence and relationship between three key concepts in API management:
API Consumer:
This is the entity (a user, an organization, or an application) that needs to use the API. They are the "who."
API Client:
This is the software that the API Consumer uses to actually make the call to the API. It is the "how." For example, the API Consumer might be a developer who writes code that creates an API Client (like a piece of code using a REST template) to invoke the API
API Implementation:
This is the backend service or Mule application that contains the business logic and runs the API. It is the "what" that processes the request.
The correct sequence is:
The API Consumer (e.g., a developer) develops or configures an API Client (the actual code or tool that makes the HTTP request). This API Client then sends invocations (API requests) to the API's endpoint. These requests are routed (typically through an API Gateway) to the API Implementation, which processes them and returns a response.
Let's evaluate why the other options are incorrect:
A. The API consumer creates an API implementation...:
This is incorrect. The API Consumer is the user of the API, not the creator of its backend implementation. The implementation is created by the API provider.
C. An API client creates an API consumer...:
This is incorrect and illogical. The API Client is a tool used by the Consumer. The Client cannot create the Consumer. This reverses the relationship.
D. The API client creates an API consumer...:
This is also incorrect for the same reason as C. The dependency is one-way: the Consumer uses the Client, not the other way around.
References:
MuleSoft Documentation: API Manager Basics - The documentation on managing client applications clarifies that an "API Consumer" (e.g., a business group) registers an "API Client" (a client application) to obtain credentials. This client application then invokes the API, which is processed by the underlying implementation.
MuleSoft Documentation: API-Led Connectivity - The model distinguishes between the API interface (what the client calls) and the implementation (the System API or backend that fulfills the request).
Key Takeaway: The correct relationship is that an API Consumer employs an API Client to invoke an API, which is ultimately processed by the API Implementation. This清晰地 separates the roles of the user, the tool used for access, and the backend service logic.
A rale limiting policy has been applied to a soap VI.2 API published in Clondhub. The API implementation catches errors in a global error handler on error propagate in the main flow for HTTP: RETRY_EXHAUSTED with HTTP status set to 429 and any with the HTTP status set to 500. What is the expected H1TP status when the client exceeds the quota of the API calls?
A. HTTP status 429 as defined in the HTTP:RETRY EXHAUSTED error handler in the API
B. HTTP status 500 as defined in the ANY error handler in the API since an API:RETRY_EXHAUSTED will be generated
C. HTTP status 401 unauthorized for policy violation
D. HTTP status 400 from the rate-limiting policy violation since the call does not reach the back-end
Explanation:
When a rate-limiting policy is applied to a SOAP v1.2 API published in CloudHub, and the client exceeds the API call quota, the rate-limiting policy triggers a specific error condition. In MuleSoft, when the rate limit is exceeded, the API Gateway typically generates an API:RETRY_EXHAUSTED error. The global error handler in the API implementation is configured to catch this HTTP:RETRY_EXHAUSTED error and return an HTTP status code of 429 (Too Many Requests), as explicitly stated in the question.
Here’s a breakdown of why the other options are incorrect:
B. HTTP status 500 as defined in the ANY error handler in the API since an API:RETRY_EXHAUSTED will be generated:
This is incorrect because the global error handler explicitly maps HTTP:RETRY_EXHAUSTED to HTTP status 429. The ANY error handler (which catches unhandled errors and returns HTTP 500) would only apply if the error is not specifically handled by the HTTP:RETRY_EXHAUSTED handler. Since the error is explicitly caught, the 429 status takes precedence.
C. HTTP status 401 unauthorized for policy violation:
This is incorrect because HTTP 401 (Unauthorized) is typically used for authentication failures, such as invalid credentials. Rate-limiting violations do not relate to authentication but rather to exceeding allowed request quotas, which aligns with HTTP 429.
D. HTTP status 400 from the rate-limiting policy violation since the call does not reach the back-end:
This is incorrect because HTTP 400 (Bad Request) is used for malformed requests or invalid client input. Rate-limiting violations are specifically handled with HTTP 429 in MuleSoft, as this status code is designed for cases where the client has sent too many requests in a given time frame.
References:
MuleSoft Documentation: MuleSoft’s API Manager and rate-limiting policies specify that exceeding the rate limit results in an HTTP 429 status code. The HTTP:RETRY_EXHAUSTED error is mapped to this status when configured in the error handler.
HTTP Status Codes (RFC 7231): The HTTP 429 (Too Many Requests) status code is defined in RFC 6585 as the appropriate response for rate-limiting violations.
MuleSoft Error Handling: The MuleSoft documentation on error handling explains how global error handlers can map specific errors (like HTTP:RETRY_EXHAUSTED) to custom HTTP status codes.
An organization is creating a Mule application that will be deployed to CloudHub. The Mule application has a property named dbPassword that stores a database user’s password. The organization's security standards indicate that the dbPassword property must be hidden from every Anypoint Platform user after the value is set in the Runtime Manager Properties tab. What configuration in the Mule application helps hide the dbPassword property value in Runtime Manager?
A. Use secure::dbPassword as the property placeholder name and store the cleartext (unencrypted) value in a secure properties placeholder file
B. Use secure::dbPassword as the property placeholder name and store the property encrypted value in a secure properties placeholder file
C. Add the dbPassword property to the secureProperties section of the pom.xml file
D. Add the dbPassword property to the secureProperties section of the mule-artifact.json file
Explanation:
This question tests the knowledge of securing sensitive properties for Mule applications deployed to CloudHub using Runtime Manager. The requirement is to hide the property value from Platform users after it is set in the Runtime Manager UI.
Why D is correct:
The mule-artifact.json file is the deployment descriptor for a Mule application. It contains a secureProperties section. When you list a property name (e.g., dbPassword) in this array, it instructs Runtime Manager to treat that property as sensitive.
Effect:
After you enter the value for dbPassword in the Runtime Manager Properties tab for an application and save it, the value becomes masked (displayed as dots ••••••). This prevents any user with access to Runtime Manager from viewing the cleartext password, thus meeting the security standard.
Let's examine why the other options are incorrect:
A & B. Use secure::dbPassword as the property placeholder name...:
This is incorrect. The secure:: prefix is used for a different purpose: when you want the Mule application to decrypt a value that is already stored in an encrypted format within a properties file. It does not control how the property is displayed or handled within Runtime Manager's UI. The question is about hiding the value in Runtime Manager, not about encrypting it within a file.
C. Add the dbPassword property to the secureProperties section of the pom.xml file:
This is incorrect. The pom.xml file is used by Maven for building the application. While there are Maven plugins for handling secrets, the secureProperties configuration that Runtime Manager recognizes for masking values in the UI is defined in the mule-artifact.json file, not in pom.xml.
References/Key Concepts:
mule-artifact.json:
The official MuleSoft documentation on Application Descriptor explains the secureProperties attribute.
Securing Properties in Runtime Manager:
The specific procedure for securing properties in CloudHub involves adding the property key to the secureProperties array in the mule-artifact.json file.
Property Masking:
This is the key feature. Once a property is designated as secure in the descriptor, its value is masked in the Runtime Manager UI, application logs, and the Anypoint Platform CLI.
Prep Smart, Pass Easy Your Success Starts Here!
Transform Your Test Prep with Realistic Salesforce-MuleSoft-Platform-Integration-Architect Exam Questions That Build Confidence and Drive Success!