Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

MuleSoft MCD-Level-2 - MuleSoft Certified Developer - Level 2 (Mule 4)

Page: 2 / 2
Total 60 questions

Refer to the exhibit.

A Mule application pom.xml configures the Maven Resources plugin to exclude parsing binary files in the project’s src/main/resources/certs directory.

Which configuration of this plugin achieves a successful build?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Which type of cache invalidation does the Cache scope support without having to write any additional code?

A.

Write-through invalidation

B.

White-behind invalidation

C.

Time to live

D.

Notification-based invalidation

Which statement is true about using mutual TLS to secure an application?

A.

Mutual TLS requires a hardware security module to be used

B.

Mutual TLS authenticates the identity of the server before the identity of the client

C.

Mutual TLS ensures only authorized end users are allowed to access an endpoint

D.

Mutual TLS increases the encryption strength versus server-side TLS alone

A Mule API receives a JSON payload and updates the target system with the payload. The developer uses JSON schemas to ensure the data is valid.

How can the data be validation before posting to the target system?

A.

Use a DataWeave 2.09 transform operation, and at the log of the DataWeave script, add:

%dw 2.0

Import.json-moduls

B.

Using the DataWeave if Else condition test the values of the payload against the examples included in the schema

C.

Apply the JSON Schema policy in API Manager and reference the correct schema in the policy configuration

D.

Add the JSON module dependency and add the validate-schema operation in the flow, configured to reference the schema

An order processing system is composed of multiple Mule application responsible for warehouse, sales and shipping. Each application communication using Anypoint MQ. Each message must be correlated against the original order ID for observability and tracing.

How should a developer propagate the order ID as the correlation ID across each message?

A.

Use the underlying HTTP request of Anypoint MQ to set the ‘X-CORRELATION_ID’ header to the order ID

B.

Set a custom Anypoint MQ user property to propagate the order ID and set the correlation ID in the receiving applications.

C.

Use the default correlation ID, Anypoint MQ will sutomatically propagate it.

D.

Wrap all Anypoint MQ Publish operations within a With CorrelationID scope from the Tracing module, setting the correlation ID to the order ID

A healthcare portal needs to validate the token that it sends to a Mule API. The developer plans to implement a custom policy using the HTTP Policy Transform Extension to match the token received in the header from the heathcare portal.

Which files does the developer need to create in order to package the custom policy?

A.

Deployable ZIP file, YAML configuration file

B.

JSON properties file, YAML configuration file

C.

JSON properties file, XML template file

D.

XML template file, YAML configuration file

Which statement is true when working with correlation IDS?

A.

The HTTP Listener regenerates correlation IDs regardless of the HTTP request

B.

The Anypoint MQ Connector automatically propagates correlation IDS

C.

The HTTP Listener generates correlation IDS unless a correlation ID is received in the HTTP request

D.

The VM Connector does not automatically propagate correction IDs

When registering a client application with an existing API instance or API Group instance, what is required to manually approve or reject request access?

A.

To configure the SLA tier for the application and have the role of Organization Administrator, API Manager Environment Administrator, or the Manage Contacts permission

B.

To configure the SLA tier for the application and have the Exchange Administrator permission

C.

To configure the SLA tier for the application

D.

To only have Exchange Administrator permission