mulesoft MCIA 破釜沉舟备考 2023.04.14.11

news2025/2/28 17:18:40

mulesoft MCIA 破釜沉舟备考 2023.04.14.11

  • 1. To implement predictive maintenance on its machinery equipment, ACME Tractors has installed thousands of IoT sensors that will send data for each machinery asset as sequences of JMS messages, in near real-time, to a JMS queue named SENSOR_DATA on a JMS server.
  • 2. The ABC company has an Anypoint Runtime Fabric on VMs/Bare Metal (RTF-VM) appliance installed on its own customer-hosted AWS infrastructure.
  • 3. When designing an upstream API and its implementation, the development team has been advised to not set timeouts when invoking downstream API.
  • 4. An organization is creating a Mule application that will be deployed to CloudHub.
  • 5. A company wants its users to log in to Anypoint Platform using the company's own internal user credentials.
  • 6. Additional nodes are being added to an existing customer-hosted Mule runtime cluster to improve performance.
  • 7. A new upstream API Is being designed to offer an SLA of 500 ms median and 800 ms maximum (99th percentile) response time.

在这里插入图片描述

1. To implement predictive maintenance on its machinery equipment, ACME Tractors has installed thousands of IoT sensors that will send data for each machinery asset as sequences of JMS messages, in near real-time, to a JMS queue named SENSOR_DATA on a JMS server.

The Mule application contains a JMS Listener operation configured to receive incoming messages from the JMS servers SENSOR_DATA JMS queue. The Mule application persists each received JMS message, then sends a transformed version of the corresponding Mule event to the machinery equipment back-end systems.
The Mule application will be deployed to a multi-node, customer-hosted Mule runtime cluster. Under normal conditions, each JMS message should be processed exactly once.
How should the JMS Listener be configured to maximize performance and concurrent message processing of the JMS queue?

A. Set numberOfConsumers = 1
Set primaryNodeOnly = false

B. Set numberOfConsumers = 1
Set primaryNodeOnly = true

C. Set numberOfConsumers to a value greater than one
Set primaryNodeOnly = true

D. Set numberOfConsumers to a value greater than one
Set primaryNodeOnly = false

Answer: D


2. The ABC company has an Anypoint Runtime Fabric on VMs/Bare Metal (RTF-VM) appliance installed on its own customer-hosted AWS infrastructure.

Mule applications are deployed to this RTF-VM appliance. As part of the company standards, the Mule application logs must be forwarded to an external log management tool (LMT).
Given the company’s current setup and requirements, what is the most idiomatic (used for its intended purpose) way to send Mule application logs to the external LMT?

A. In RTF-VM, install and configure the external LTM’s log-forwarding agent

B. In RTF-VM, edit the pod configuration to automatically install and configure an Anypoint Monitoring agent

C. In each Mule application, configure custom Log4j settings

D. In RTF-VM. configure the out-of-the-box external log forwarder

Answer: A


3. When designing an upstream API and its implementation, the development team has been advised to not set timeouts when invoking downstream API.

Because the downstream API has no SLA that can be relied upon. This is the only donwstream API dependency of that upstream API. Assume the downstream API runs uninterrupted without crashing.

What is the impact of this advice?

A. The invocation of the downstream API will run to completion without timing out.

B. An SLA for the upstream API CANNOT be provided.

C. A default timeout of 500 ms will automatically be applied by the Mule runtime in which the upstream API implementation executes.

D. A load-dependent timeout of less than 1000 ms will be applied by the Mule runtime in which the downstream API implementation executes.

Answer: B


4. An organization is creating a Mule application that will be deployed to CloudHub.

The Mule application has a property named dbPassword that stores a database user’s password. The organization’s security standards indicate that the dbPassword property must be hidden from every Anypoint Platform user after the value is set in the Runtime Manager Properties tab.

What configuration in the Mule application helps hide the dbPassword property value in Runtime Manager?

A. Use secure::dbPassword as the property placeholder name and store the cleartext (unencrypted) value in a secure properties placeholder file

B. Use secure::dbPassword as the property placeholder name and store the property encrypted value in a secure properties placeholder file

C. Add the dbPassword property to the secureProperties section of the pom.xml file

D. Add the dbPassword property to the secureProperties section of the mule-artifact.json file

Answer: B
Reference: https://docs.mulesoft.com/runtime-manager/secure-application-properties
在这里插入图片描述


5. A company wants its users to log in to Anypoint Platform using the company’s own internal user credentials.

To achieve this, the company needs to integrate an external identity provider (IdP) with the
company’s Anypoint Platform master organization, but SAML 2.0 CANNOT be used.

Besides SAML 2.0, what single-sign-on standard can the company use to integrate the IdP with their Anypoint Platform master organization?

A. SAML 1.0
B. OAuth 2.0
C. Basic Authentication
D. OpenID Connect

Answer: D
Explanation:
As the Anypoint Platform organization administrator, you can configure identity management in Anypoint
Platform to set up users for single sign-on (SSO).
Configure identity management using one of the following single sign-on standards:

  1. OpenID Connect: End user identity verification by an authorization server including SSO
  2. SAML 2.0: Web-based authorization including cross-domain SSO

6. Additional nodes are being added to an existing customer-hosted Mule runtime cluster to improve performance.

Mule applications deployed to this cluster are invoked by API clients through a load
balancer.
What is also required to carry out this change?

A. A new load balancer must be provisioned to allow traffic to the new nodes in a round-robin fashion

B. External monitoring tools or log aggregators must be configured to recognize the new nodes

C. API implementations using an object store must be adjusted to recognize the new nodes and persist to them

D. New firewall rules must be configured to accommodate communication between API clients and the new nodes

Answer: B
Explanation:

  • Clustering is a group of servers or mule runtime which acts as a single unit.
  • Mulesoft Enterprise Edition supports scalable clustering to provide high availability for the Mulesoft application.
  • In simple terms, virtual servers composed of multiple nodes and they communicate and share
    information through a distributed shared memory grid.
  • By default, Mulesoft ensures the High availability of applications if clustering implemented.
  • Let’s consider the scenario one of the nodes in cluster crashed or goes down and under maintenance. In such cases, Mulesoft will ensure that requests are processed by other nodes in the cluster. Mulesoft clustering also ensures that the request is load balanced between all the nodes in a cluster.
  • Clustering is only supported by on-premise Mule runtime and it is not supported in Cloudhub.
    Correct answer is External monitoring tools or log aggregators must be configured to recognize the new nodes
  • Rest of the options are automatically taken care of when a new node is added in cluster.
    Reference: https://docs.mulesoft.com/runtime-manager/cluster-about

7. A new upstream API Is being designed to offer an SLA of 500 ms median and 800 ms maximum (99th percentile) response time.

The corresponding API implementation needs to sequentially invoke 3 downstream APIs of very similar complexity. The first of these downstream APIs offers the following SLA for its response time: median: 100 ms, 80th percentile: 500 ms, 95th percentile: 1000 ms.

If possible, how can a timeout be set in the upstream API for the invocation of the first downstream API to meet the new upstream API’s desired SLA?

A. Set a timeout of 100 ms; that leaves 400 ms for the other two downstream APIs to complete

B. Do not set a timeout; the Invocation of this API Is mandatory and so we must wait until it responds

C. Set a timeout of 50 ms; this times out more invocations of that API but gives additional room for retries

D. No timeout is possible to meet the upstream API’s desired SLA; a different SLA must be negotiated with the first downstream API or invoke an alternative API

Answer: D


本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.coloradmin.cn/o/426599.html

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈,一经查实,立即删除!

相关文章

惠普Probook455电脑开机突然卡住无法进入桌面

惠普Probook455电脑开机突然卡住无法进入桌面解决方法分享。最近有用户使用的惠普Probook455电脑在开机的时候,电脑一直卡在开机的界面上,无法进入到系统中。无论是重启还是安全模式都无法解决问题。那么遇到这个情况怎么去进行问题的解决,来…

C++---状态压缩dp---炮兵阵地(每日一道算法2023.4.16)

注意事项: 本题为"状态压缩dp—蒙德里安的梦想"和"状态压缩dp—小国王"和"状态压缩dp—玉米田"的近似题,建议先阅读这三篇文章并理解。 题目: 司令部的将军们打算在 NM 的网格地图上部署他们的炮兵部队。 一个…

GoogleTest+VS code编译和编写简单测试用例

目录前言一、安装gtest二、 编译gtest与运行单元测试第一种编译方式第二种编译方式前言 在B站看了非常多Gtest的教学视频,CSDN上gtest博客也特别多,但是都非常陈旧或者根本不是用vscode。本篇目的在于,说明如何在vscode上编写简单单元测试。…

day01_Java概述丶环境搭建

Java背景知识 Java概述 概述:计算机语言就是人与计算机之间进行信息交流沟通的一种特殊语言。所谓计算机编程语言,就是人们可以使用编程语言对计算机下达命令,让计算机完成人们需要的功能。 Java语言:是美国Sun公司&#xff08…

Siamese network

文章目录一、相似性度量1. 欧氏距离2. 马氏距离二、Siamese network1. Siamese network 基础架构2. 损失函数3. 不同的Siamese network3.1. 行人重识别3.2 其他应用场景一、相似性度量 相似性度量是机器学习中一个非常基础的概念,是评定两个事物之间相似程度的一种度…

E: 仓库 “http://mirrors.aliyun.com/ubuntu eoan Release” 没有 Release 文件 —— 解决方案

Ubuntu 20.04 更新的时候,遇到如下问题: 可以通过修改源,来进行修复: 1、登录如下网址:LUGs repo file generator 2、选择对应的 Ubuntu 版本,这里我是 Ubuntu 20.04 点击 Download,会下载一个 …

DUBBO注册中心

注册中心上保存四种类型的数据: providers: 服务提供者目录,记录着服务提供者的ip、端口等信息。 consumers: 服务消费者目录,记录服务消费者的元数据信息,服务提供者并不会用到服务消费者的信息,这里要记录消费者的信息,是给服务治理中心(dubbo-admin)使用的。 route…

五分钟排查Linux的健康状态

五分钟排查Linux的健康状态1. CPU1.1 top命令1.2 什么是负载1.3 vmstat2. 内存2.1 观测命令2.2 CPU缓存2.3 HugePage2.4 预先加载3. I/O3.1 观测命令3.2 零拷贝4. 网络参考:《Linux运维实战》、xjjdog 操作系统作为所有程序的载体,对应用的性能影响是非常…

论文阅读 | Interpolated Convolutional Networks for 3D Point Cloud Understanding

前言:ICCV2019点云特征提取点卷积InterpoConv Interpolated Convolutional Networks for 3D Point Cloud Understanding 引言 点云是不规则、无序、且稀疏的 处理这样的点云数据有两大类方法 第一:voxel化 directly rasterize irregular point clouds…

《Netty》从零开始学netty源码(三十八)之PoolSubPage

PoolSubPage 上一节中我们提到了PooledByteBufAllocator类,先看下netty中有关内存的类关系: 从图中可以看到PoolSubPage为最小单位,所以我们先从最小的开始分析,先看下它的属性值: 为了更好的理解这些属性的意义&…

表情包MD编辑器简单使用

🌷1 表情包 ⭐️(1)常规表情图标 😀 😁 😂 😃 😄 😅 😆 😉 😊 😋 😎 😍 😘 &#x1…

(Deep Learning)交叉验证(Cross Validation)

交叉验证(Cross Validation) 交叉验证(Cross Validation)是一种评估模型泛化性能的统计学方法,它比单次划分训练集和测试集的方法更加稳定、全面。 交叉验证不但可以解决数据集中数据量不够大的问题,也可以…

CSS中flex属性的的使用以及应用场景有哪些

文章目录一. flex属性?(虚假的) --- 这里主要是回顾1.1 flex-grow1.2 flex-shrink1.3 flex-basis二. flex属性 ! (真正的!!!)三. flex一些常见的值, 以及使用场景3.1 flex:initial 使用场景3.2 flex:0 和 flex:node 适用场景3.3 flex:1 和 flex:auto3.4 总结一. flex属性?(虚…

54 openEuler搭建Mariadb数据库服务器-Mariadb介绍

文章目录54 openEuler搭建Mariadb数据库服务器-Mariadb介绍54.1 MariaDB的架构54.2 MariaDB的存储引擎54 openEuler搭建Mariadb数据库服务器-Mariadb介绍 MariaDB数据库管理系统是MySQL的一个分支,主要由开源社区在维护,采用GPL授权许可。MariaDB的目的…

零售数据分析操作篇14:利用内存计算做销售筛选分析

各位数据的朋友,大家好,我是老周道数据,和你一起,用常人思维数据分析,通过数据讲故事。 上一讲讲了图表间联动的应用场景,即当我们点击某个图表时,会影响其他图表一起变化,而变化背…

Vue3 Element-plus el-menu无限级菜单组件封装

对于element中提供给我们的el-menu组件最多可以实现三层嵌套,如果多一层数据只能自己通过变量去加一层,如果加了两层、三层这种往往是行不通的,所以只能进行封装 效果图一、定义数据 MenuData.ts export default [{id: "1",name:…

spring boot 访问HTML

HTML整合spring boot简介默认文件路径访问自定义文件路径访问或通过Controller控制器层跳转访问简介 SpringBoot默认的页面映射路径(即模板文件存放的位置)为“classpath:/templates/*.html”。静态文件路径为“classpath:/static/”,其中可…

三菱FX3U PLC计米轮功能块(完整ST代码)

计米轮功能块(wheel_FB)详细计米、测速原理请参看下面的博客: PLC高速脉冲输入计米轮模块(编码器测速/计米详细讲解)_RXXW_Dor的博客-CSDN博客线缆行业单绞机PLC控制算法详细解读可以参看下面的文章链接:线缆行业单绞机控制算法(详细图解+代码)_RXXW_Dor的博客-CSDN博客在…

大佬入局AI,职场人有新机会了?

卸任搜狗CEO一年半后,王小川宣布在AI大模型领域创业,与前搜狗COO茹立云联合成立人工智能公司百川智能,打造中国版的OpenAI,并对媒体表示:“追上ChatGPT水平,我觉得今年内可能就能够实现,但对于G…

第六天 CUDA内存管理

操作内存分配和数据复制过程概述 在gpu上开辟一块空间,并把地址记录在mem_device上在cpu上开辟一块空间,并把地址记录在mem_host上,并修改了该地址所指区域的第二个值把mem_host所指区域的数据都复制到mem_device的所指区域在cpu上开辟一块空…