MCPA - Level 1 Exam QuestionsBrowse all questions from this exam

MCPA - Level 1 Exam - Question 1


What API policy would LEAST likely be applied to a Process API?

Show Answer
Correct Answer: D

A Process API is designed to orchestrate and integrate various systems and services. It is usually not exposed directly to external consumers, making security policies such as JSON threat protection less critical. JSON threat protection is more relevant for Experience APIs, which are exposed directly to end-users and need to handle potential threats from various sources. Custom circuit breakers, client ID enforcement, and rate limiting are more relevant for maintaining the reliability and scalability of the Process API.

Discussion

9 comments
Sign in to comment
Sparks1Option: D
Jul 8, 2021

Ans should be D, option A doesnt even exists in Policy

Pavan_NagineniOption: D
Jul 24, 2021

Yes Anshwer should be D as JSON threat protection is usually needed on Exp APIs that can least ranked on Process APIs

Outdoor25Option: D
Dec 29, 2021

Should be D. JSON threat protection is usually needed for Experience APIs.

cabide
Apr 18, 2022

then that is why A is the LEAST needed

AndreDiasOption: C
Jul 19, 2022

And why not C (Rate Limiting)? Since we are talking about a Process API, that can be consumed by several Experience APIs and even other Process APIs, I believe we don't want to reject any request if a certain limit is achieved. In resume, in my point of view a Process API should always be available and not with a limited access to.

Lambert_Lambert_ty___
Jul 25, 2023

You can have SLA-based rate limiting ot set priorities among different experience APIs. Also, rate limiting might be based on the performance of system APIs or back end systems.

ChrisC41Option: D
Nov 16, 2022

D. JSON threat protection

AB317Option: D
Jul 31, 2021

Answer: D

calazansOption: D
Jun 10, 2022

D. JSON threat protection

Mentor123Option: D
Nov 1, 2023

There is no hard and fast rule to apply fix policy to fix layer of API in API-Led connectivity approach. It totally depends on your Organization and the consumer of Experience APIs. But Yes There are couple of recommendation given by MuleSoft team. Let me cite for you. For Exp API IP Whitelisting TLS Mutual (Either through DLB) SLA Based Policy i.e Rate Limiting XML/JSON Threat protection Client Id Enforcement OAuth based Policy JWT based For Process API: SLA Based Rate Limiting to apply Quality of Service for Selected tier IP Whitelisting Rate Limiting Spike Control If you are directly exposing the process API to consumer you can go ahead with the same policy like Experience API Answer D

Mentor123Option: C
Nov 1, 2023

There is no hard and fast rule to apply fix policy to fix layer of API in API-Led connectivity approach. It totally depends on your Organization and the consumer of Experience APIs. But Yes There are couple of recommendation given by MuleSoft team. Let me cite for you. For Exp API IP Whitelisting TLS Mutual (Either through DLB) SLA Based Policy i.e Rate Limiting XML/JSON Threat protection Client Id Enforcement OAuth based Policy JWT based For Process API: SLA Based Rate Limiting to apply Quality of Service for Selected tier IP Whitelisting Rate Limiting Spike Control If you are directly exposing the process API to consumer you can go ahead with the same policy like Experience API