ExamGecko
Home Home / MuleSoft / MCD - Level 2

MCD - Level 2: MuleSoft Certified Developer - Level 2 (Mule 4)

MuleSoft Certified Developer - Level 2 (Mule 4)
Vendor:

MuleSoft

MuleSoft Certified Developer - Level 2 (Mule 4) Exam Questions: 60
MuleSoft Certified Developer - Level 2 (Mule 4)   2.370 Learners
Take Practice Tests
Comming soon
PDF | VPLUS

This study guide should help you understand what to expect on the exam and includes a summary of the topics the exam might cover and links to additional resources. The information and materials in this document should help you focus your studies as you prepare for the exam.

Related questions

Refer to the exhibit.

What is the result if ''Insecure'' selected as part of the HTTP Listener configuration?

A.
The HTTP Listener will trust any certificate presented by the HTTP client
A.
The HTTP Listener will trust any certificate presented by the HTTP client
Answers
B.
The HTTP Lister will accept any unauthenticated request
B.
The HTTP Lister will accept any unauthenticated request
Answers
C.
The HTTP listener will only accept HTTP requests
C.
The HTTP listener will only accept HTTP requests
Answers
D.
Mutual TLS authentication will be enabled between this HTTP Listener and an HTTP client
D.
Mutual TLS authentication will be enabled between this HTTP Listener and an HTTP client
Answers
Suggested answer: C

Explanation:

Based on the exhibit below, if 'Insecure' is selected as part of the HTTP Listener configuration, the HTTP listener will only accept HTTP requests. This means that no TLS context will be configured for this listener and no encryption or authentication will be applied to incoming requests. The protocol attribute of this listener will be set to HTTP instead of HTTPS.

Reference: https://docs.mulesoft.com/http-connector/1.6/http-listener-ref#insecure

asked 18/09/2024
Paul Aronen
45 questions

Which statement is true when using XML SDK for creating custom message processors?

A.
Properties are fields defined by an end user of the XML SDK component and serve as a global configuration for the entire Mule project in which they are used
A.
Properties are fields defined by an end user of the XML SDK component and serve as a global configuration for the entire Mule project in which they are used
Answers
B.
An XML SDK provides both inbound and outbound operations
B.
An XML SDK provides both inbound and outbound operations
Answers
C.
Operations can be reused in recursive calls
C.
Operations can be reused in recursive calls
Answers
D.
All operations are public
D.
All operations are public
Answers
Suggested answer: D

Explanation:

When using XML SDK for creating custom message processors, all operations are public by default and can be used by any Mule application that imports them. There is no way to make an operation private or protected in XML SDK.

Reference: https://docs.mulesoft.com/mule-sdk/1.1/xml-sdk#operations

asked 18/09/2024
Ntombifuthi Shabangu
28 questions

Refer to the exhibit.

What is the result of the Mule Maven Plugin configuration of the value of property its,keystorePassoword in CloudHub 2.0?

A.
CloudHub encrypts the value
A.
CloudHub encrypts the value
Answers
B.
The Mule server encrypts the value
B.
The Mule server encrypts the value
Answers
C.
Anypoint Studio secures the value
C.
Anypoint Studio secures the value
Answers
D.
Runtime Manager masks the value
D.
Runtime Manager masks the value
Answers
Suggested answer: D

Explanation:

The result of the Mule Maven Plugin configuration of the value of property its,keystorePassword in CloudHub 2.0 is that Runtime Manager masks the value. This means that Runtime Manager hides or obscures the value from anyone who views it in Runtime Manager or Anypoint Platform.

Reference: https://docs.mulesoft.com/runtime-manager/runtime-manager-agent-for-mule4#properties-tab

asked 18/09/2024
Rosalba Scalera
48 questions

A custom policy needs to be developed to intercept all cutbound HTTP requests made by Mule applications.

Which XML element must be used to intercept outbound HTTP requests?

A.
It is not possible to intercept outgoing HTTP requests, only inbound requests
A.
It is not possible to intercept outgoing HTTP requests, only inbound requests
Answers
B.
http-policy:source
B.
http-policy:source
Answers
C.
htt-policy:operation
C.
htt-policy:operation
Answers
D.
http-policy:processor
D.
http-policy:processor
Answers
Suggested answer: D

Explanation:

The http-policy:processor element is used to intercept outbound HTTP requests made by Mule applications. It allows customizing the request before it is sent to the target API and modifying the response after it is received from the target API.

Reference: https://docs.mulesoft.com/api-manager/2.x/policy-mule4-custom-policy#policy-xml-file

asked 18/09/2024
Courage Marume
35 questions

A Flight Management System publishes gate change notification events whenever a flight's arrival gate changes. Other systems, including Baggage Handler System. Inflight Catering System and Passenger Notifications System, must each asynchronously receive the same gate change notification to process the event according.

Which configuration is required in Anypoint MQ to achieve this publish/subscribe model?

A.
Publish each client subscribe directly to the exchange. Have each client subscribe directly to the queue.
A.
Publish each client subscribe directly to the exchange. Have each client subscribe directly to the queue.
Answers
B.
Publish the gate change notification to an Anypoint MC queue Have each client subscribe directly to the queue
B.
Publish the gate change notification to an Anypoint MC queue Have each client subscribe directly to the queue
Answers
C.
Publish the gate change notification to an Anypoint MQ queue. Create different anypoint MQ exchange meant for each of the other subscribing systems Bind the queue with each of the exchanges
C.
Publish the gate change notification to an Anypoint MQ queue. Create different anypoint MQ exchange meant for each of the other subscribing systems Bind the queue with each of the exchanges
Answers
D.
Publish the gate change notification to an Anypoint MQ exchanhe. Create different Anypoint MQ queues meant for each of the other subscribing systems. Bind the exchange with each of the queues.
D.
Publish the gate change notification to an Anypoint MQ exchanhe. Create different Anypoint MQ queues meant for each of the other subscribing systems. Bind the exchange with each of the queues.
Answers
Suggested answer: D

Explanation:

To achieve a publish/subscribe model using Anypoint MQ, where each system receives the same gate change notification event, the developer should publish the gate change notification to an Anypoint MQ exchange, create different Anypoint MQ queues meant for each of the other subscribing systems, and bind the exchange with each of the queues. An exchange is a message routing agent that can send messages to different queues based on predefined criteria. By binding an exchange with multiple queues, each queue receives a copy of every message sent to that exchange. Therefore, each system can subscribe to its own queue and receive every gate change notification event.

Reference: https://docs.mulesoft.com/anypoint-mq/3.x/anypoint-mq-exchanges

asked 18/09/2024
Gerson Rodrigo Menendez
36 questions

A Mule API receives a JSON payload and updates the target system with the payload. The developer uses JSON schemas to ensure the data is valid.

How can the data be validation before posting to the target system?

A.
Use a DataWeave 2.09 transform operation, and at the log of the DataWeave script, add: %dw 2.0 Import.json-moduls
A.
Use a DataWeave 2.09 transform operation, and at the log of the DataWeave script, add: %dw 2.0 Import.json-moduls
Answers
B.
Using the DataWeave if Else condition test the values of the payload against the examples included in the schema
B.
Using the DataWeave if Else condition test the values of the payload against the examples included in the schema
Answers
C.
Apply the JSON Schema policy in API Manager and reference the correct schema in the policy configuration
C.
Apply the JSON Schema policy in API Manager and reference the correct schema in the policy configuration
Answers
D.
Add the JSON module dependency and add the validate-schema operation in the flow, configured to reference the schema
D.
Add the JSON module dependency and add the validate-schema operation in the flow, configured to reference the schema
Answers
Suggested answer: D

Explanation:

To validate the data before posting to the target system, the developer should add the JSON module dependency and add the validate-schema operation in the flow, configured to reference the schema. The JSON module provides a validate-schema operation that validates a JSON payload against a JSON schema and throws an error if the payload is invalid.

Reference: https://docs.mulesoft.com/json-module/1.1/json-validate-schema

asked 18/09/2024
Sathish M
48 questions

A system API that communicates to an underlying MySQL database is deploying to CloudHub. The DevOps team requires a readiness endpoint to monitor all system APIs.

Which strategy should be used to implement this endpoint?

A.
Create a dedicated endpoint that responds with the API status and reachability of the underlying systems
A.
Create a dedicated endpoint that responds with the API status and reachability of the underlying systems
Answers
B.
Create a dedicated endpoint that responds with the API status and health of the server
B.
Create a dedicated endpoint that responds with the API status and health of the server
Answers
C.
Use an existing resource endpoint of the API
C.
Use an existing resource endpoint of the API
Answers
D.
Create a dedicated endpoint that responds with the API status only
D.
Create a dedicated endpoint that responds with the API status only
Answers
Suggested answer: A

Explanation:

To implement a readiness endpoint to monitor all system APIs, the developer should create a dedicated endpoint that responds with the API status and reachability of the underlying systems. This way, the DevOps team can check if the system API is ready to receive requests and if it can communicate with its backend systems without errors.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/deployment-strategies#readiness-probes

asked 18/09/2024
Mihail Galabov
32 questions

A developer deploys an API to CloudHub and applies an OAuth policy on API Manager. During testing, the API response is slow, so the developer reconfigures the API so that the out-of-the-box HTTP Caching policy is applied first, and the OAuth API policy is applied second.

What will happen when an HTTP request is received?

A.
In case of a cache hit, both the OAuth and HTTP Caching policies are evaluated; then the cached response is returned to the caller
A.
In case of a cache hit, both the OAuth and HTTP Caching policies are evaluated; then the cached response is returned to the caller
Answers
B.
In case of a cache it, only the HTTP Caching policy is evaluating; then the cached response is returned to the caller
B.
In case of a cache it, only the HTTP Caching policy is evaluating; then the cached response is returned to the caller
Answers
C.
In case of a cache miss, only the HTTP Caching policy is evaluated; then the API retrieves the data from the API implementation, and the policy stores the data to be cached in Object Store
C.
In case of a cache miss, only the HTTP Caching policy is evaluated; then the API retrieves the data from the API implementation, and the policy stores the data to be cached in Object Store
Answers
D.
In case of a cache miss, both the OAuth and HTTP Caching policies are evaluated; then the API retrieves the data from the API implementation, and the policy does not store the data in Object Store
D.
In case of a cache miss, both the OAuth and HTTP Caching policies are evaluated; then the API retrieves the data from the API implementation, and the policy does not store the data in Object Store
Answers
Suggested answer: B

Explanation:

When an HTTP request is received and the HTTP Caching policy is applied first, it checks if there is a cached response for that request in Object Store. If there is a cache hit, meaning that a valid cached response exists, then only the HTTP Caching policy is evaluated and the cached response is returned to the caller without invoking the OAuth policy or the API implementation. If there is a cache miss, meaning that no valid cached response exists, then both the HTTP Caching policy and the OAuth policy are evaluated before invoking the API implementation.

Reference: https://docs.mulesoft.com/api-manager/2.x/http-caching-policy#policy-ordering

asked 18/09/2024
Isidre Piguillem
42 questions

Multiple individual Mute application need to use the Mule Maven plugin to deploy to CloudHub.

The plugin configuration should .. reused where necessary and anything project, specific should be property-based.

Where should the Mule Maven details be configured?

A.
A parent pom.xml
A.
A parent pom.xml
Answers
B.
Settings, xml
B.
Settings, xml
Answers
C.
Pom, xml
C.
Pom, xml
Answers
D.
A Bill of Materials (BOM) parent pm
D.
A Bill of Materials (BOM) parent pm
Answers
Suggested answer: A

Explanation:

To reuse Mule Maven plugin configuration across multiple individual Mule applications, the developer should use a parent pom.xml file. A parent pom.xml file defines common configuration for one or more child projects that inherit from it. The developer can specify common properties and dependencies for all child projects in the parent pom.xml file, such as Mule Maven plugin configuration, and then reference them in each child project's pom.xml file using placeholders.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/mmp-concept#parent-pom https://maven.apache.org/guides/introduction/introduction-to-the-pom.html#Project_Inheritance

asked 18/09/2024
Dinu Jose Varghese
38 questions

An API has been built to enable scheduling email provider. The front-end system does very little data entry validation, and problems have started to appear in the email that go to patients. A validate-customer'' flow is added validate the data.

What is he expected behavior of the 'validate-customer'' flow?

A.
If only the email address Is invalid a VALIDATION.INVALID_EMAIL error is raised
A.
If only the email address Is invalid a VALIDATION.INVALID_EMAIL error is raised
Answers
B.
If the email address is invalid, processing continues to see if the appointment data and customer name are also invalid
B.
If the email address is invalid, processing continues to see if the appointment data and customer name are also invalid
Answers
C.
If the appointment date and customer name are invalid, a SCHEDULE:INVALID_APPOINTMENT_DATE error is raised
C.
If the appointment date and customer name are invalid, a SCHEDULE:INVALID_APPOINTMENT_DATE error is raised
Answers
D.
If all of the values are invalid the last validation error is raised:SCHEDULE:INVALID_CUSTOMER_NAME
D.
If all of the values are invalid the last validation error is raised:SCHEDULE:INVALID_CUSTOMER_NAME
Answers
Suggested answer: A

Explanation:

The validate-customer flow uses an until-successful scope to validate each field of the customer data. The until-successful scope executes its processors until they succeed or exhausts the maximum number of retries. If any processor fails, it raises an error and stops executing the remaining processors. Therefore, if only the email address is invalid, a VALIDATION.INVALID_EMAIL error is raised and the validation of appointment date and customer name is skipped.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/until-successful-scope

asked 18/09/2024
Jason Wang
40 questions