Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Salesforce Salesforce-MuleSoft-Developer-II - Salesforce Certified MuleSoft Developer 2 (SP25)

A developer is working on a project that requires encrypting all data before sending it to a backend application. To accomplish this, the developer will use PGP encryption in the Mule 4 Cryptography module.

What is required to encrypt the data before sending it to the backend application?

A.

The application needs to configure HTTPS TLS context information to encrypt the data

B.

The application needs to both the private and public keys to encrypt the data

C.

The application needs the public key from the backend service to encrypt the data

D.

The application needs the private key from the backend service to encrypt the data

A company has been using CI/CD. Its developers use Maven to handle build and deployment activities.

What is the correct sequence of activities that takes place during the Maven build and deployment?

A.

Initialize, validate, compute, test, package, verify, install, deploy

B.

Validate, initialize, compile, package, test, install, verify, verify, deploy

C.

Validate, initialize, compile, test package, verify, install, deploy

D.

Validation, initialize, compile, test, package, install verify, deploy

A Mule implementation uses a HTTP Request within an Unit Successful scope to connect to an API.

How should a permanent error response like HTTP:UNAUTHORIZED be handle inside Until Successful to reduce latency?

A.

Configure retrying until a MULERETRY_EXHAUSTED error is raised or the API responds back with a successful response.

B.

In Until Successful configuration, set the retry count to 1 for error type HTTP: UNAUTHORIZED.

C.

Put the HTTP Request inside a try scope in Unit Successful.

In the error handler, use On Error Continue to catch permanent errors like HTTP UNAUTHORIZED.

D.

Put the HTTP Request inside a try scope in Unit Successful.

In the error handler, use On Error Propagate to catch permanent errors like HTTP UNAUTHORIZED.

Which pattern can a web API use to notify its client of state changes as soon as they occur?

A.

HTTP Webhock

B.

Shared database trigger

C.

Schedule Event Publisher

D.

ETL data load

Refer to the exhibit.

What action must be performed to log all the errors raised by the VM Connector?

A.

Add inside the Logger tag

B.

Add inside the Appenders tag

C.

Configure inside the VM Connector configuration

D.

Nothing, as error-level events are automatically logged

Which type of cache invalidation does the Cache scope support without having to write any additional code?

A.

Write-through invalidation

B.

White-behind invalidation

C.

Time to live

D.

Notification-based invalidation

A Mule application deployed to multiple Cloudhub 2.0 replicas needs to temporarily persist large files over 10MB between flow executions, and routinely needs to query whether the file data exists on separate executions.

How can this be achieved?

A.

Store the contents of the file on separate storage, and store the key and location of the file Object using Object Store v2

B.

Use an in-memory Object Store

C.

Store the key and full contents of the file in an Object Store

D.

Store the key and full contents of the file, caching the filename and location between requests

Two APIs are deployed to a two-node on-prem cluster. Due to a requirements change, the two APIs must communicate to exchange data asynchronously.

A.

If the two APIs use the same domain, the VM Connector can be leveraged

B.

The VM Connector is used to inter-applicationcommunication, so it is not possible to use the VM Connector

C.

Instead of using the VM Connector use directly

D.

It is not possible to use the VM Connector since the APIs are running in a cluster mode and each mode has it own set of VM Queues

Which configurations are required for HTTP Listener to enable mTLS authentication?

A.

Set an appropriate reconnection strategy and use persistent connections for the listener

B.

Set an appropriate keystore configuration and use persistent connections for the listener

C.

Set an appropriate keystore and truststore configuration for the listener

D.

Set an appropriate truststore configuration and reconnection strategy for the listener

Refer to the exhibits.

Bioinfo System API is implemented and published to Anypoint Exchange. Adeveloper wants to invoke this API using its REST Connector.

What should be added to the POM?

A)

B)

C)

D)

E)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E