New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Salesforce Certified MuleSoft Hyperautomation Developer (Mule-Dev-202) Exam - Topic 8 Question 19 Discussion

Actual exam question for Salesforce's Salesforce Certified MuleSoft Hyperautomation Developer (Mule-Dev-202) exam
Question #: 19
Topic #: 8
[All Salesforce Certified MuleSoft Hyperautomation Developer (Mule-Dev-202) Questions]

AnyAirlines releases a new REST API that exposes access to an RPA process. The RPA process can only handle a limited number of interactions per second before the API begins returning errors.

Which policy should AnyAirlines apply to prevent the API from being overloaded?

Show Suggested Answer Hide Answer
Suggested Answer: C

To prevent an API from being overloaded, the Spike Control policy is suitable. It helps manage sudden bursts of traffic by limiting the rate at which requests are processed. Here's how it works:

Preventing Overloads:

Spike Control smooths out bursts of incoming requests by enforcing a rate limit over a short period, protecting the backend systems from being overwhelmed by excessive traffic.

Configuration:

Apply the Spike Control policy to the API to define the maximum number of requests allowed within a specific timeframe.

This ensures that the API can handle a limited number of interactions per second, preventing errors due to overload.

Implementation:

In Anypoint Platform, configure the Spike Control policy to the desired thresholds, ensuring the RPA process can handle the load effectively without errors.


Anypoint Platform Spike Control Documentation

Contribute your Thoughts:

0/2000 characters
Miss
3 months ago
Definitely not JSON threat protection, that's irrelevant here.
upvoted 0 times
...
Darrin
3 months ago
Surprised they didn't mention caching options!
upvoted 0 times
...
Keneth
3 months ago
Client ID Enforcement seems unnecessary for this.
upvoted 0 times
...
Jolanda
4 months ago
I think Spike Control could work too.
upvoted 0 times
...
Ben
4 months ago
Rate Limiting - SLA is the way to go!
upvoted 0 times
...
Lavera
4 months ago
I feel like we had a similar question about API management, and rate limiting was definitely the answer there too.
upvoted 0 times
...
Jackie
4 months ago
Client ID enforcement sounds familiar, but I don't think it directly addresses the issue of overloading the API.
upvoted 0 times
...
Delfina
4 months ago
I'm not entirely sure, but I think spike control might be relevant since it deals with sudden bursts of traffic.
upvoted 0 times
...
Dyan
5 months ago
I remember we discussed rate limiting in class, and it seems like the best option here to manage the number of interactions.
upvoted 0 times
...
Moira
5 months ago
I'm a bit confused by the different choices. JSON threat protection and Client ID Enforcement don't seem directly relevant to the problem. I'm leaning towards Spike Control, but I'll double-check the details.
upvoted 0 times
...
Irene
5 months ago
Okay, let's see. The key is to find a policy that can handle the limited number of interactions per second. I think Rate Limiting - SLA is the best option here.
upvoted 0 times
...
Jarvis
5 months ago
Hmm, I'm not sure about this one. I'll have to think it through carefully. Maybe Spike Control could work, but I'm not totally confident.
upvoted 0 times
...
Joaquin
5 months ago
This seems like a straightforward API protection question. I'd go with Rate Limiting - SLA to prevent the API from being overloaded.
upvoted 0 times
...
Teresita
1 year ago
I'm feeling spicy - C. Spike Control! Gotta keep those API requests from getting too hot to handle.
upvoted 0 times
...
Lachelle
1 year ago
B. Rate Limiting - SLA is the way to go. Don't want the flight attendants to start handing out free in-flight entertainment, if you catch my drift.
upvoted 0 times
Alfreda
1 year ago
Zena: True, but Rate Limiting is more specific to this scenario.
upvoted 0 times
...
Dottie
1 year ago
User 3: C) Spike Control could also help prevent overload.
upvoted 0 times
...
Zena
1 year ago
User 2: Agreed, we need to control the number of interactions per second.
upvoted 0 times
...
Edda
1 year ago
User 1: B) Rate Limiting - SLA
upvoted 0 times
...
...
Fidelia
1 year ago
D. Client ID Enforcement, of course. Gotta keep those API keys on lock-down, you know what I'm saying?
upvoted 0 times
...
Louis
1 year ago
C. Spike Control all the way! Ain't nobody got time for those pesky API errors.
upvoted 0 times
Karol
1 year ago
C) Spike Control
upvoted 0 times
...
Sharan
1 year ago
B) Rate Limiting - SLA
upvoted 0 times
...
Tennie
1 year ago
A) JSON threat protection
upvoted 0 times
...
...
Jesusita
1 year ago
Client ID Enforcement could also be useful to track and limit the number of interactions from each client.
upvoted 0 times
...
Paris
1 year ago
I believe Spike Control could also be a good option to prevent sudden spikes in interactions.
upvoted 0 times
...
Robt
1 year ago
I agree with Cecilia, Rate Limiting - SLA would help prevent the API from being overloaded.
upvoted 0 times
...
Dottie
1 year ago
Hmm, I'd go with B. Rate Limiting - SLA to prevent that API from getting overloaded. Gotta keep those flights running smoothly, right?
upvoted 0 times
Blair
1 year ago
Let's go with Rate Limiting - SLA then. It's the best option for this situation.
upvoted 0 times
...
Whitney
1 year ago
Definitely, we don't want any errors causing disruptions.
upvoted 0 times
...
Darci
1 year ago
Agreed, we need to make sure the API can handle the traffic.
upvoted 0 times
...
Susana
1 year ago
I think B is the way to go. Rate Limiting - SLA will help prevent overload.
upvoted 0 times
...
...
Cecilia
1 year ago
I think the best policy would be Rate Limiting - SLA.
upvoted 0 times
...

Save Cancel