ExamGecko
Home / MuleSoft / MCD - Level 2
Ask Question

MCD - Level 2: MuleSoft Certified Developer - Level 2 (Mule 4)

Vendor:
Exam Questions:
60
 Learners
  2.370
Last Updated
February - 2025
Language
English
2 Quizzes
PDF | VPLUS

This study guide should help you understand what to expect on the exam and includes a summary of the topics the exam might cover and links to additional resources. The information and materials in this document should help you focus your studies as you prepare for the exam.

MuleSoft MCD - Level 2 Practice Tests

Related questions

Refer to the exhibit.

What is the result if ''Insecure'' selected as part of the HTTP Listener configuration?

MuleSoft MCD - Level 2 image Question 16 52806 09182024213621000000

The HTTP Listener will trust any certificate presented by the HTTP client
The HTTP Listener will trust any certificate presented by the HTTP client
The HTTP Lister will accept any unauthenticated request
The HTTP Lister will accept any unauthenticated request
The HTTP listener will only accept HTTP requests
The HTTP listener will only accept HTTP requests
Mutual TLS authentication will be enabled between this HTTP Listener and an HTTP client
Mutual TLS authentication will be enabled between this HTTP Listener and an HTTP client
Suggested answer: C
Explanation:

Based on the exhibit below, if 'Insecure' is selected as part of the HTTP Listener configuration, the HTTP listener will only accept HTTP requests. This means that no TLS context will be configured for this listener and no encryption or authentication will be applied to incoming requests. The protocol attribute of this listener will be set to HTTP instead of HTTPS.

Reference: https://docs.mulesoft.com/http-connector/1.6/http-listener-ref#insecure

asked 18/09/2024
Paul Aronen
45 questions

Which statement is true when using XML SDK for creating custom message processors?

Properties are fields defined by an end user of the XML SDK component and serve as a global configuration for the entire Mule project in which they are used
Properties are fields defined by an end user of the XML SDK component and serve as a global configuration for the entire Mule project in which they are used
An XML SDK provides both inbound and outbound operations
An XML SDK provides both inbound and outbound operations
Operations can be reused in recursive calls
Operations can be reused in recursive calls
All operations are public
All operations are public
Suggested answer: D
Explanation:

When using XML SDK for creating custom message processors, all operations are public by default and can be used by any Mule application that imports them. There is no way to make an operation private or protected in XML SDK.

Reference: https://docs.mulesoft.com/mule-sdk/1.1/xml-sdk#operations

asked 18/09/2024
Ntombifuthi Shabangu
28 questions

Refer to the exhibit.

What is the result of the Mule Maven Plugin configuration of the value of property its,keystorePassoword in CloudHub 2.0?

MuleSoft MCD - Level 2 image Question 36 52826 09182024213621000000

CloudHub encrypts the value
CloudHub encrypts the value
The Mule server encrypts the value
The Mule server encrypts the value
Anypoint Studio secures the value
Anypoint Studio secures the value
Runtime Manager masks the value
Runtime Manager masks the value
Suggested answer: D
Explanation:

The result of the Mule Maven Plugin configuration of the value of property its,keystorePassword in CloudHub 2.0 is that Runtime Manager masks the value. This means that Runtime Manager hides or obscures the value from anyone who views it in Runtime Manager or Anypoint Platform.

Reference: https://docs.mulesoft.com/runtime-manager/runtime-manager-agent-for-mule4#properties-tab

asked 18/09/2024
Rosalba Scalera
48 questions

A custom policy needs to be developed to intercept all cutbound HTTP requests made by Mule applications.

Which XML element must be used to intercept outbound HTTP requests?

It is not possible to intercept outgoing HTTP requests, only inbound requests
It is not possible to intercept outgoing HTTP requests, only inbound requests
http-policy:source
http-policy:source
htt-policy:operation
htt-policy:operation
http-policy:processor
http-policy:processor
Suggested answer: D
Explanation:

The http-policy:processor element is used to intercept outbound HTTP requests made by Mule applications. It allows customizing the request before it is sent to the target API and modifying the response after it is received from the target API.

Reference: https://docs.mulesoft.com/api-manager/2.x/policy-mule4-custom-policy#policy-xml-file

asked 18/09/2024
Courage Marume
35 questions

A Flight Management System publishes gate change notification events whenever a flight's arrival gate changes. Other systems, including Baggage Handler System. Inflight Catering System and Passenger Notifications System, must each asynchronously receive the same gate change notification to process the event according.

Which configuration is required in Anypoint MQ to achieve this publish/subscribe model?

Publish each client subscribe directly to the exchange. Have each client subscribe directly to the queue.
Publish each client subscribe directly to the exchange. Have each client subscribe directly to the queue.
Publish the gate change notification to an Anypoint MC queue Have each client subscribe directly to the queue
Publish the gate change notification to an Anypoint MC queue Have each client subscribe directly to the queue
Publish the gate change notification to an Anypoint MQ queue. Create different anypoint MQ exchange meant for each of the other subscribing systems Bind the queue with each of the exchanges
Publish the gate change notification to an Anypoint MQ queue. Create different anypoint MQ exchange meant for each of the other subscribing systems Bind the queue with each of the exchanges
Publish the gate change notification to an Anypoint MQ exchanhe. Create different Anypoint MQ queues meant for each of the other subscribing systems. Bind the exchange with each of the queues.
Publish the gate change notification to an Anypoint MQ exchanhe. Create different Anypoint MQ queues meant for each of the other subscribing systems. Bind the exchange with each of the queues.
Suggested answer: D
Explanation:

To achieve a publish/subscribe model using Anypoint MQ, where each system receives the same gate change notification event, the developer should publish the gate change notification to an Anypoint MQ exchange, create different Anypoint MQ queues meant for each of the other subscribing systems, and bind the exchange with each of the queues. An exchange is a message routing agent that can send messages to different queues based on predefined criteria. By binding an exchange with multiple queues, each queue receives a copy of every message sent to that exchange. Therefore, each system can subscribe to its own queue and receive every gate change notification event.

Reference: https://docs.mulesoft.com/anypoint-mq/3.x/anypoint-mq-exchanges

asked 18/09/2024
Gerson Rodrigo Menendez
36 questions

A Mule API receives a JSON payload and updates the target system with the payload. The developer uses JSON schemas to ensure the data is valid.

How can the data be validation before posting to the target system?

Use a DataWeave 2.09 transform operation, and at the log of the DataWeave script, add: %dw 2.0 Import.json-moduls
Use a DataWeave 2.09 transform operation, and at the log of the DataWeave script, add: %dw 2.0 Import.json-moduls
Using the DataWeave if Else condition test the values of the payload against the examples included in the schema
Using the DataWeave if Else condition test the values of the payload against the examples included in the schema
Apply the JSON Schema policy in API Manager and reference the correct schema in the policy configuration
Apply the JSON Schema policy in API Manager and reference the correct schema in the policy configuration
Add the JSON module dependency and add the validate-schema operation in the flow, configured to reference the schema
Add the JSON module dependency and add the validate-schema operation in the flow, configured to reference the schema
Suggested answer: D
Explanation:

To validate the data before posting to the target system, the developer should add the JSON module dependency and add the validate-schema operation in the flow, configured to reference the schema. The JSON module provides a validate-schema operation that validates a JSON payload against a JSON schema and throws an error if the payload is invalid.

Reference: https://docs.mulesoft.com/json-module/1.1/json-validate-schema

asked 18/09/2024
Sathish M
48 questions

A system API that communicates to an underlying MySQL database is deploying to CloudHub. The DevOps team requires a readiness endpoint to monitor all system APIs.

Which strategy should be used to implement this endpoint?

Create a dedicated endpoint that responds with the API status and reachability of the underlying systems
Create a dedicated endpoint that responds with the API status and reachability of the underlying systems
Create a dedicated endpoint that responds with the API status and health of the server
Create a dedicated endpoint that responds with the API status and health of the server
Use an existing resource endpoint of the API
Use an existing resource endpoint of the API
Create a dedicated endpoint that responds with the API status only
Create a dedicated endpoint that responds with the API status only
Suggested answer: A
Explanation:

To implement a readiness endpoint to monitor all system APIs, the developer should create a dedicated endpoint that responds with the API status and reachability of the underlying systems. This way, the DevOps team can check if the system API is ready to receive requests and if it can communicate with its backend systems without errors.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/deployment-strategies#readiness-probes

asked 18/09/2024
Mihail Galabov
32 questions

A developer deploys an API to CloudHub and applies an OAuth policy on API Manager. During testing, the API response is slow, so the developer reconfigures the API so that the out-of-the-box HTTP Caching policy is applied first, and the OAuth API policy is applied second.

What will happen when an HTTP request is received?

In case of a cache hit, both the OAuth and HTTP Caching policies are evaluated; then the cached response is returned to the caller
In case of a cache hit, both the OAuth and HTTP Caching policies are evaluated; then the cached response is returned to the caller
In case of a cache it, only the HTTP Caching policy is evaluating; then the cached response is returned to the caller
In case of a cache it, only the HTTP Caching policy is evaluating; then the cached response is returned to the caller
In case of a cache miss, only the HTTP Caching policy is evaluated; then the API retrieves the data from the API implementation, and the policy stores the data to be cached in Object Store
In case of a cache miss, only the HTTP Caching policy is evaluated; then the API retrieves the data from the API implementation, and the policy stores the data to be cached in Object Store
In case of a cache miss, both the OAuth and HTTP Caching policies are evaluated; then the API retrieves the data from the API implementation, and the policy does not store the data in Object Store
In case of a cache miss, both the OAuth and HTTP Caching policies are evaluated; then the API retrieves the data from the API implementation, and the policy does not store the data in Object Store
Suggested answer: B
Explanation:

When an HTTP request is received and the HTTP Caching policy is applied first, it checks if there is a cached response for that request in Object Store. If there is a cache hit, meaning that a valid cached response exists, then only the HTTP Caching policy is evaluated and the cached response is returned to the caller without invoking the OAuth policy or the API implementation. If there is a cache miss, meaning that no valid cached response exists, then both the HTTP Caching policy and the OAuth policy are evaluated before invoking the API implementation.

Reference: https://docs.mulesoft.com/api-manager/2.x/http-caching-policy#policy-ordering

asked 18/09/2024
Isidre Piguillem
42 questions

Multiple individual Mute application need to use the Mule Maven plugin to deploy to CloudHub.

The plugin configuration should .. reused where necessary and anything project, specific should be property-based.

Where should the Mule Maven details be configured?

A parent pom.xml
A parent pom.xml
Settings, xml
Settings, xml
Pom, xml
Pom, xml
A Bill of Materials (BOM) parent pm
A Bill of Materials (BOM) parent pm
Suggested answer: A
Explanation:

To reuse Mule Maven plugin configuration across multiple individual Mule applications, the developer should use a parent pom.xml file. A parent pom.xml file defines common configuration for one or more child projects that inherit from it. The developer can specify common properties and dependencies for all child projects in the parent pom.xml file, such as Mule Maven plugin configuration, and then reference them in each child project's pom.xml file using placeholders.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/mmp-concept#parent-pom https://maven.apache.org/guides/introduction/introduction-to-the-pom.html#Project_Inheritance

asked 18/09/2024
Dinu Jose Varghese
38 questions

An API has been built to enable scheduling email provider. The front-end system does very little data entry validation, and problems have started to appear in the email that go to patients. A validate-customer'' flow is added validate the data.

What is he expected behavior of the 'validate-customer'' flow?

MuleSoft MCD - Level 2 image Question 11 52801 09182024213621000000

If only the email address Is invalid a VALIDATION.INVALID_EMAIL error is raised
If only the email address Is invalid a VALIDATION.INVALID_EMAIL error is raised
If the email address is invalid, processing continues to see if the appointment data and customer name are also invalid
If the email address is invalid, processing continues to see if the appointment data and customer name are also invalid
If the appointment date and customer name are invalid, a SCHEDULE:INVALID_APPOINTMENT_DATE error is raised
If the appointment date and customer name are invalid, a SCHEDULE:INVALID_APPOINTMENT_DATE error is raised
If all of the values are invalid the last validation error is raised:SCHEDULE:INVALID_CUSTOMER_NAME
If all of the values are invalid the last validation error is raised:SCHEDULE:INVALID_CUSTOMER_NAME
Suggested answer: A
Explanation:

The validate-customer flow uses an until-successful scope to validate each field of the customer data. The until-successful scope executes its processors until they succeed or exhausts the maximum number of retries. If any processor fails, it raises an error and stops executing the remaining processors. Therefore, if only the email address is invalid, a VALIDATION.INVALID_EMAIL error is raised and the validation of appointment date and customer name is skipped.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/until-successful-scope

asked 18/09/2024
Jason Wang
40 questions