Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Salesforce Salesforce-MuleSoft-Developer-II - Salesforce Certified MuleSoft Developer 2 (SP25)

A developer has created the first version of an API designed for business partners to work commodity prices.

What should developer do to allow more than one major version ofthe same API to be exposed by the implementation?

A.

In Design Center, open the RAML and modify each operation to include the major version number

B.

In Anypoint Studio, generate scaffolding from the RAML, and the modify the in the generated flows to include a parameter to replace the version number

C.

In Design Center, open the RAML and modify baseUn to include a variable that indicates the version number

D.

In Anypoint Studio, generate scaffolding from the RAML, and then modify the flownames generated by APIKit to include a variable with the major version number

Refer to the exhibit.

Based on the code snippet, schema,json file, and payload below, what is the outcome of the given code snippet when a request is sent with the payload?

A.

The Mule flow will execute successfully with status code 200, and the response will be the JSON sent in request

B.

The Mule flow will execute successfully with status code 204

C.

The Mule flow will throw the exception ‘JSON:SCHEMA_NOT_HONOURED

D.

The Mule flow will execute successfully with status code 200m and a response will display themessage ‘’ Age in years which must equal to or greater than zero.’’

Which pattern should be used to invoke multiple HTTP APIs in parallel and roll back failed requests in sequence?

A.

A database as a transactional outbox and an Until Successful router to retry any requests

B.

A Parallel for Each scope with each HTTP request wrapped in a Try scope

C.

Scatter-Gather as central Saga orchestrator for all API request with compensating actions for failing routes

D.

VM queues as a reliability pattern with error handlers to roll back any requests

The HTTP Request operation raises an HTTP CONNECTIVITY error.

Which HTTP status code and body arereturned to the web client?

A.

HTTP Status Code:200.

Body ‘Error in processing your request

B.

HTTP Status Code:500.

Body ‘The HTTP CONNECTIVITY Error description

C.

HTTP Status Code:500.

Body ‘Error in processing your request

D.

HTTP Status Code:500.

Body ‘Error in processing your request

A Mule application need to invoice an API hosted by an externalsystem to initiate a process. The external API takes anywhere between one minute and 24 hours to compute its process.

Which implementation should be used to get response data from the external API after it completes processing?

A.

Use an HTTP Connector toinvoke the API and wait for a response

B.

Use a Scheduler to check for a response every minute

C.

Use an HTTP Connector inside Async scope to invoice the API and wait for a response

D.

Expose an HTTP callback API in Mule and register it with the external system

An order processing system is composed of multiple Mule application responsible for warehouse, sales and shipping. Each application communication using Anypoint MQ. Each message must be correlated against the original order ID for observabilityand tracing.

How should a developer propagate the order ID as the correlation ID across each message?

A.

Use the underlying HTTP request of Anypoint MQ to set the ‘X-CORRELATION_ID’ header to the order ID

B.

Set a custom Anypoint MQ user property to propagate the order ID and set the correlation ID in the receiving applications.

C.

Use the default correlation ID, Anypoint MQ will sutomatically propagate it.

D.

Wrap all Anypoint MQ Publish operations within a With CorrelationID scope from the Tracing module, setting the correlation ID to the order ID

Refer to the exhibit.

What is the result of the Mule Maven Plugin configuration of the value of propertyits,keystorePassoword in CloudHub 2.0?

A.

CloudHub encrypts the value

B.

The Mule server encrypts the value

C.

Anypoint Studio secures the value

D.

Runtime Manager masks the value

What is the MuleSoft recommended method to encrypt sensitive property data?

A.

The encryption key and sensitive data should be different for each environment

B.

The encryption key should be identical for all environments

C.

The encryption keyshould be identical for all environments and the sensitive data should be different for each environment

D.

The encryption key should be different for each environment and the sensitive data should be the same for all environments