Black Friday Biggest Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

MuleSoft MCD-Level-2 Dumps

Page: 1 / 6
Total 60 questions

MuleSoft Certified Developer - Level 2 (Mule 4) Questions and Answers

Question 1

A system API that communicates to an underlying MySQL database is deploying to CloudHub. The DevOps team requires a readiness endpoint to monitor all system APIs.

Which strategy should be used to implement this endpoint?

Options:

A.

Create a dedicated endpoint that responds with the API status and reachability of the underlying systems

B.

Create a dedicated endpoint that responds with the API status and health of the server

C.

Use an existing resource endpoint of the API

D.

Create a dedicated endpoint that responds with the API status only

Question 2

When registering a client application with an existing API instance or API Group instance, what is required to manually approve or reject request access?

Options:

A.

To configure the SLA tier for the application and have the role of Organization Administrator, API Manager Environment Administrator, or the Manage Contacts permission

B.

To configure the SLA tier for the application and have the Exchange Administrator permission

C.

To configure the SLA tier for the application

D.

To only have Exchange Administrator permission

Question 3

A developer deploys an API to CloudHub and applies an OAuth policy on API Manager. During testing, the API response is slow, so the developer reconfigures the API so that the out-of-the-box HTTP Caching policy is applied first, and the OAuth API policy is applied second.

What will happen when an HTTP request is received?

Options:

A.

In case of a cache hit, both the OAuth and HTTP Caching policies are evaluated; then the cached response is returned to the caller

B.

In case of a cache it, only the HTTP Caching policy is evaluating; then the cached response is returned to the caller

C.

In case of a cache miss, only the HTTP Caching policy is evaluated; then the API retrieves the data from the API implementation, and the policy stores the data to be cached in Object Store

D.

In case of a cache miss, both the OAuth and HTTP Caching policies are evaluated; then the API retrieves the data from the API implementation, and the policy does not store the data in Object Store

Question 4

Refer to the exhibit.

What is the result if ‘’Insecure’’ selected as part of the HTTP Listener configuration?

as

Options:

A.

The HTTP Listener will trust any certificate presented by the HTTP client

B.

The HTTP Lister will accept any unauthenticated request

C.

The HTTP listener will only accept HTTP requests

D.

Mutual TLS authentication will be enabled between this HTTP Listener and an HTTP client

Question 5

When implementing a synchronous API where the event source is an HTTP Listener, a developer needs to return the same correlation ID back to the caller in the HTTP response header.

How can this be achieved?

Options:

A.

Enable the auto-generate CorrelationID option when scaffolding the flow

B.

Enable the CorrelationID checkbox in the HTTP Listener configuration

C.

Configure a custom correlation policy

D.

NO action is needed as the correlation ID is returned to the caller in the response header by default

Question 6

A company has been using CI/CD. Its developers use Maven to handle build and deployment activities.

What is the correct sequence of activities that takes place during the Maven build and deployment?

Options:

A.

Initialize, validate, compute, test, package, verify, install, deploy

B.

Validate, initialize, compile, package, test, install, verify, verify, deploy

C.

Validate, initialize, compile, test package, verify, install, deploy

D.

Validation, initialize, compile, test, package, install verify, deploy

Question 7

Refer to the exhibit.

as

Based on the code snippet, schema,json file, and payload below, what is the outcome of the given code snippet when a request is sent with the payload?

Options:

A.

The Mule flow will execute successfully with status code 200, and the response will be the JSON sent in request

B.

The Mule flow will execute successfully with status code 204

C.

The Mule flow will throw the exception ‘JSON:SCHEMA_NOT_HONOURED

D.

The Mule flow will execute successfully with status code 200m and a response will display the message ‘’ Age in years which must equal to or greater than zero.’’

Question 8

The Center for Enablement team published a common application as a reusable module to the central Nexus repository.

How can the common application be included in all API implementations?

Options:

A.

Download the common application from Naxus and copy it to the src/main/resources folder in the API

B.

Copy the common application’s source XML file and out it in a new flow file in the src/main/mule folder

C.

Add a Maven dependency in the PCM file with multiple-plugin as

D.

Add a Maven dependency in the POM file with jar as

Question 9

Which type of cache invalidation does the Cache scope support without having to write any additional code?

Options:

A.

Write-through invalidation

B.

White-behind invalidation

C.

Time to live

D.

Notification-based invalidation

Question 10

A Mule application defines as SSL/TLS keystore properly ‘tis,keystore.keyPassword’’ as secure.

How can this property be referenced to access its value within the application?

Options:

A.

#{secure::tiskeystore,keyPassowrd}

B.

${secure::tiskeystore,keyPassowrd}

C.

${secure::tiskeystore,keyPassowrd}

D.

p{secure::tiskeystore,keyPassowrd}

Question 11

An order processing system is composed of multiple Mule application responsible for warehouse, sales and shipping. Each application communication using Anypoint MQ. Each message must be correlated against the original order ID for observability and tracing.

How should a developer propagate the order ID as the correlation ID across each message?

Options:

A.

Use the underlying HTTP request of Anypoint MQ to set the ‘X-CORRELATION_ID’ header to the order ID

B.

Set a custom Anypoint MQ user property to propagate the order ID and set the correlation ID in the receiving applications.

C.

Use the default correlation ID, Anypoint MQ will sutomatically propagate it.

D.

Wrap all Anypoint MQ Publish operations within a With CorrelationID scope from the Tracing module, setting the correlation ID to the order ID

Question 12

Refer to the exhibit.

A Mute Object Store is configured with an entry TTL of one second and an expiration interval of 30 seconds.

What is the result of the flow if processing between os’store and os:retrieve takes 10 seconds?

as

Options:

A.

nullPayload

B.

originalPayload

C.

OS:KEY_NOT_FOUND

D.

testPayload

Question 13

Two APIs are deployed to a two-node on-prem cluster. Due to a requirements change, the two APIs must communicate to exchange data asynchronously.

Options:

A.

If the two APIs use the same domain, the VM Connector can be leveraged

B.

The VM Connector is used to inter-application communication, so it is not possible to use the VM Connector

C.

Instead of using the VM Connector use directly

D.

It is not possible to use the VM Connector since the APIs are running in a cluster mode and each mode has it own set of VM Queues

Question 14

A healthcare portal needs to validate the token that it sends to a Mule API. The developer plans to implement a custom policy using the HTTP Policy Transform Extension to match the token received in the header from the heathcare portal.

Which files does the developer need to create in order to package the custom policy?

Options:

A.

Deployable ZIP file, YAML configuration file

B.

JSON properties file, YAML configuration file

C.

JSON properties file, XML template file

D.

XML template file, YAML configuration file

Question 15

A Mule application contain two policies Policy A and Policy A has order1, and Policy B has order 2. Policy A Policy B, and a flow are defined by he configuration below.

as

When a HTTP request arrives at the Mule application’s endpoint, what will be the execution order?

Options:

A.

A1, B1, F1, B2, A2

B.

B1, A1, F1, A2, B2

C.

F1, A1, B1, B2, A2

D.

F1, B1, A1, A2, B2

Question 16

A developer has created the first version of an API designed for business partners to work commodity prices.

What should developer do to allow more than one major version of the same API to be exposed by the implementation?

Options:

A.

In Design Center, open the RAML and modify each operation to include the major version number

B.

In Anypoint Studio, generate scaffolding from the RAML, and the modify the in the generated flows to include a parameter to replace the version number

C.

In Design Center, open the RAML and modify baseUn to include a variable that indicates the version number

D.

In Anypoint Studio, generate scaffolding from the RAML, and then modify the flow names generated by APIKit to include a variable with the major version number

Question 17

A custom policy needs to be developed to intercept all cutbound HTTP requests made by Mule applications.

Which XML element must be used to intercept outbound HTTP requests?

Options:

A.

It is not possible to intercept outgoing HTTP requests, only inbound requests

B.

http-policy:source

C.

htt-policy:operation

D.

http-policy:processor

Question 18

Refer to the exhibit.

What is the result of the Mule Maven Plugin configuration of the value of property its,keystorePassoword in CloudHub 2.0?

as

Options:

A.

CloudHub encrypts the value

B.

The Mule server encrypts the value

C.

Anypoint Studio secures the value

D.

Runtime Manager masks the value

Page: 1 / 6
Total 60 questions